From 0bce0e16144c348edaec9364ec1436573ce3dd4e Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Mon, 21 Mar 2022 20:18:07 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/kutt/0.0.1/CHANGELOG.md | 10 + incubator/kutt/0.0.1/CONFIG.md | 7 + incubator/kutt/0.0.1/Chart.lock | 12 + incubator/kutt/0.0.1/Chart.yaml | 37 + incubator/kutt/0.0.1/README.md | 39 + incubator/kutt/0.0.1/app-readme.md | 3 + incubator/kutt/0.0.1/charts/common-9.1.6.tgz | Bin 0 -> 42858 bytes .../kutt/0.0.1/charts/postgresql-7.0.6.tgz | Bin 0 -> 81737 bytes incubator/kutt/0.0.1/charts/redis-2.0.5.tgz | Bin 0 -> 74829 bytes incubator/kutt/0.0.1/helm-values.md | 67 + incubator/kutt/0.0.1/ix_values.yaml | 85 + incubator/kutt/0.0.1/questions.yaml | 2369 +++++++++++++++++ incubator/kutt/0.0.1/security.md | 1100 ++++++++ incubator/kutt/0.0.1/templates/_secrets.tpl | 20 + .../kutt/0.0.1/templates/common copy.yaml | 8 + incubator/kutt/0.0.1/values.yaml | 0 incubator/kutt/item.yaml | 4 + 17 files changed, 3761 insertions(+) create mode 100644 incubator/kutt/0.0.1/CHANGELOG.md create mode 100644 incubator/kutt/0.0.1/CONFIG.md create mode 100644 incubator/kutt/0.0.1/Chart.lock create mode 100644 incubator/kutt/0.0.1/Chart.yaml create mode 100644 incubator/kutt/0.0.1/README.md create mode 100644 incubator/kutt/0.0.1/app-readme.md create mode 100644 incubator/kutt/0.0.1/charts/common-9.1.6.tgz create mode 100644 incubator/kutt/0.0.1/charts/postgresql-7.0.6.tgz create mode 100644 incubator/kutt/0.0.1/charts/redis-2.0.5.tgz create mode 100644 incubator/kutt/0.0.1/helm-values.md create mode 100644 incubator/kutt/0.0.1/ix_values.yaml create mode 100644 incubator/kutt/0.0.1/questions.yaml create mode 100644 incubator/kutt/0.0.1/security.md create mode 100644 incubator/kutt/0.0.1/templates/_secrets.tpl create mode 100644 incubator/kutt/0.0.1/templates/common copy.yaml create mode 100644 incubator/kutt/0.0.1/values.yaml create mode 100644 incubator/kutt/item.yaml diff --git a/incubator/kutt/0.0.1/CHANGELOG.md b/incubator/kutt/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..3c6bdb4b319 --- /dev/null +++ b/incubator/kutt/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### kutt-0.0.1 (2022-03-21) + +#### Feat + +* Add kutt ([#2239](https://github.com/truecharts/apps/issues/2239)) + diff --git a/incubator/kutt/0.0.1/CONFIG.md b/incubator/kutt/0.0.1/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/incubator/kutt/0.0.1/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/incubator/kutt/0.0.1/Chart.lock b/incubator/kutt/0.0.1/Chart.lock new file mode 100644 index 00000000000..cf2e252fc7e --- /dev/null +++ b/incubator/kutt/0.0.1/Chart.lock @@ -0,0 +1,12 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 9.1.6 +- name: postgresql + repository: https://truecharts.org/ + version: 7.0.6 +- name: redis + repository: https://truecharts.org + version: 2.0.5 +digest: sha256:8da90edb0f79f572ac97f1613c8a82daf94433f36c93cdbb48259cfad48875bf +generated: "2022-03-21T20:14:04.124963012Z" diff --git a/incubator/kutt/0.0.1/Chart.yaml b/incubator/kutt/0.0.1/Chart.yaml new file mode 100644 index 00000000000..0bac0a4a763 --- /dev/null +++ b/incubator/kutt/0.0.1/Chart.yaml @@ -0,0 +1,37 @@ +apiVersion: v2 +appVersion: "2.7.4" +dependencies: +- name: common + repository: https://truecharts.org + version: 9.1.6 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 7.0.6 +- condition: redis.enabled + name: redis + repository: https://truecharts.org + version: 2.0.5 +deprecated: false +description: A free and open source personal finance manager +home: https://github.com/truecharts/apps/tree/master/charts/stable/kutt +icon: https://truecharts.org/_static/img/appicons/kutt.png +keywords: +- kutt +- link +- short +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: kutt +sources: +- https://github.com/thedevs-network/kutt +type: application +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - productivity + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/kutt/0.0.1/README.md b/incubator/kutt/0.0.1/README.md new file mode 100644 index 00000000000..77fd14f0cf9 --- /dev/null +++ b/incubator/kutt/0.0.1/README.md @@ -0,0 +1,39 @@ +# Introduction + +A free and open source personal finance manager + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 7.0.6 | +| https://truecharts.org | common | 9.1.6 | +| https://truecharts.org | redis | 2.0.5 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/kutt/0.0.1/app-readme.md b/incubator/kutt/0.0.1/app-readme.md new file mode 100644 index 00000000000..cc381c8e1e8 --- /dev/null +++ b/incubator/kutt/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +A free and open source personal finance manager + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/kutt/0.0.1/charts/common-9.1.6.tgz b/incubator/kutt/0.0.1/charts/common-9.1.6.tgz new file mode 100644 index 0000000000000000000000000000000000000000..db63793f154731db3975d243fcdfc735ae09e40a GIT binary patch literal 42858 zcmV)mK%T!JiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{YjuPwhU|t7SRS-R$qWPTKl3aeQJYz4z|j z<3J=NVNH=N0Lsz2`R>1iR{|tRQGRQ?Yu>w!MFNAtU@$Wn31SW(ffoBtwFM zXls!y(F80QOX;N7n`5@frrjV}_87@fAj7p)FZ&0J+uWV-sz zUtbNngK@Xt>3`E&LL4)QV?+cnw1haC036Sf|I7h*6EbfB5JTQyivR#*B+Ah*RFK6L z25g<8iAJxr(zv|r4!YykV~xL>|0@_}h(3@2sGa|VLBBsdEYAPK!PESIl;;`fbin%* z#h=bj0ZmbWXE*>s63_5FBaqMa)-&**A)3J~V!ZGP0 zbuM760b3xT3V*7Uj(F!6I(v0S{+%dDO|uHpO6gBwdDFw zx`4xj@njn8!-Mg37z|z>z|nLRpo3t1IGgr^VgKc9|3!a)d@vlKX}CWahqEC(4972~ zqv65yWiWa%-S0QXAkCr(q)CK>bqk1JXX3{MoXk!Wc19589cl?^KVyP^$RG)~rTR4{ zXwEBE(>;gXkmLqt186p(SA%Z9JM0e!{g;E0q4yy~quGo8;KlxngBK_q?;pOLj%P1s zhvV4`G#kwZ)6wB*IvftCFZu_EsQ+>>h5hLW9n8kVmoHy7!C@;>rzBZ2h@)*Ot?N}2 z+CXkdXI*|XEQiX&?x;J|s3?NKyFA~U4ApHYGHBE zKM40n`+XE127_?4KSSZ*MK}!ygTuq=;TQ$e@hsRs91jNj(_l0R_eUWd?)QUHe+Wk} z4h|Z$T}|Di=o+r6qHB=O3PZ+R6deW8xmMT+XTlU>wb4&iH1@C<-z{T5u8pTdf7ijFGthCY&Z*t zXc(e#Fq#ef19&ifdDtHv9PSTC`vH7`rh{=feG!Dy!(e06+lk$TvN=KYm+b|wsaYd> zbLdTluc^@lo~!0Y-C@qY`v-p+fH0g*;dC?{4_=P?+xluTii(+DvDW00&6Avi>0fhI*fn&B@X znTcPsEQUJk_!6C}!j5Y2Fm#lQgrz^;ku`SH=)Hxn>}5k;*QU#XEK ziV!hyQ4FUMQWI8x?Y4mW5KhF}t%yZl6!1k;SA72jBOHQ6EKDhYgd>$>n{0L{AuHIcMK-r=4(aoA~;3SHeh9iyY}gp&DtF~&6ZO{ zI3tIMVuC`DCLxv6Kf(c|6ELV@pe&se7$QI!feg*pqUiSt0j~`*bdUD|hq5PI#<0pM_yp>ZXt| zEl@!I%Sek4azr^0f>xN~BnAsixr7H1UScLjU4HmczJJSKPr!bwg&ox)g=(%LTy^1= z$|b-1zEUJBg(s91I7bl*SV91dqU4$i0gNDBgA@l>IGzItLOh!xk}n)X9I!ormuW&6 zjG2+yLY#shKAy7G_*TB(AmQMrW*lMXlVk&!JKr*K_ zwfSeO>QNZV8aOs02Czg!%EX)keE6qp4XxXH2F?gxLV}~Ur^DzABk;&=hx5U)Mgm;m zCHiL)qt?a$Ou)yBW2=zVcO3W{2%1L5PkDNDE?a5I4@J#1M=_GtiB^>gfV5neFtwGH zRCEf0q2L*03y@Jh)(aFZ!3q-0D^O7~g={ea-}JsI)#I%#63X@@&wPQ)G(r{EB|Fr@JcJTvUW*aHO4}B#D%BcZi`e-l`^b46hCBw{Ju^S{>iDpM*^w}b>#3#3n8yNF$CrUA|ZgFC8w9_ zGGEHlE_k1+5mYLC4$$XfAHj3$fTP<2~3YQc0xAG9Q!$pv`E9y>3zpg4@^WZ?2 z0P^R_*|F{ZqNWl69njWxT)#UQ_Itxoq4I|$W5}%%BFbxl#3EF8>;umq$@nnhBCQ@+?`(xl-0s+O+nBvYQeH6NGn)PMlCfWqdc$X?`fZG+-~ ztW!R*bIX5E>K~yeg(*7Y%UZsOdaY88~0Z41Uo*rb+7= zINAkzx$z8qw<}wFJptd`+<@)}BsjHu$~EQJuivzufn!sorG^B>tM5s&G`|7pcDpSU zuaty)20m$|Wd9XOx#FIYWNB0|pXG9iz$^VMNCk*QL0bhA5Ta$WCtZ26Fh@Yb1lKr< zz!b?s9T+Zg%n`XrBSX!LH}B5g9$mb-{B-p8>*PAV zh9m?>XD7Te7tcCy;wqaW5+jCa7bm?i322W&dPRFU=K7!$LIyi96$T_9ot`zU9X+fa z^d(Iw>ZD27!SO61OIeop@)Ji*jD+s%>HF7jE>Dl%z0s3whEWuLK(l<(i8p6r0mmmo zH%>ytsnBZaVb!Y(xmeYgDVW>&( ztU(P_foseBG+^QN6(8JA2;(^-Nk%(4B301Q7e1hv32`fUm?Flw@uFX7U(3%66zes1 zLfNU*&|nF#5TM*P5W)&E5XMw1%LIH@Cdv1hP{yaskFxIPmIb7^2FrDK+pgXQc;>W? zsjMjETf3qqUoCEdcUuNgK|Q;=_Ryqih5P#ST+@Z_nJpD_Elys^R0q=V$##ZLIDv-pT|n&@7N7eA0BOZA(X`;%sA8X?XKFcKd$W2th-3oc>w z+<6~=ND}rA(X<2Dt*S1B{bsqBly$(d+XIjS z7y}$*W=iaFLlMVwK7a8N0muN3DT7f2k~ms-Tk4nb*wTA$4e_M|3bEMY%jAxN;&idL z>bBHgj~4^I`3mE;XelowmW~{U5Q|t>NY(%|w4`0|hBxVy)*hb)Tp@tD;JuE)6%q#W z#R3&!@K3U@q4w>`crp?q(gi=F$TILikk5BcP8-RJo>+d+pmB$MmFoIchh+}Si|ZLl zrl=GJ(CIW0<m1Ex9ak_rIMDOu0b&%s+kR_5-(Vt}$H*C7?!son%A| zk_LWeU`r97%NqroB1U!e*A$7BE4b!n6<@g(b{uj<-9EQ3j?dbyeBpa>e3mzGG6N9& zcyV#2TEJAQF6|Ey;)#Fn@&B9~)xImcoI2nBo*`&m;`jKrQqQ?{{4qL6BcDojF4BQNYK&H)1Ri88GOBpAI$ z5nP|6Ac;dd0fWB!nj(UQk}bUF5;Dn{`Ea1#&mfL6f-V*WQI0VGlJB*K5Z{W|%{22f zyZQVe+-{&hvHLdc?vm}E`P~ov_r~z&QYUQ9?n;;VnVs4|@0ryV>?cOwhS6=J-7}l} zK;H+G7nyme-amULJ>N?NV+t?>3vMTaCH#Vy*^*;*@a=y8)!?AdSB1Q;U?Ywt$Wkzs zj#kXXtf2lGRXuUW{Z>m_tk8+kahD!qY#{^J3miz_@eK2+kyvls#mF}lSYW{tQ3~hA zHwmr@W(>t$-JG-&>&!%ggd;3K*2fM^agVS1qXdQ>f@qSF0MQ;dAy9eMVrM#32s&B4d$UH}6QkBdi_lVO9L%XTEy;EZj$*zlTvYg~8QD@-~^%_wgG- z67u;sB7=@{QjNb>ViMpu=QO$J1!9CG-)UMPFeflTvn-0%kA%IzU9@^u(ig?`vbFZn zVrr|6M5_HjDze149^U}?$b*7fQ^7EldnX)C6*^{?aC|9A@e)Un=-rWTI7@z`!ED5O zBH}P`T+(IbEl^d%qtf!a@8Ff*PO<{9bWp;M&=EM6N`vlkbtE=1SkUcucP-&8c7?cx zSjvD$7=wWZvuC+@#lBM#N9+8vs0GOt3i*0hp&&u4A0@1vSSjgq&So?GMS|D5O%5HV z4k6qCXb(uEh17Pg)C4AsPwt-=VpVldxZ+h`&HnB=UZxS+d7Hp+3L_W?i0tkG{_{Ka zb5DDYPtNwhX%eC{8Q!H8x%n!+NZx4WirC)D=w8)eYSMzGoX8>s4_F&iN;GUTDR{MDB_3>nKa0HX0Ib=H;Swqj*jA zEUl2Q8)U4Y#RdUu!MUZ3l@zZOuoXhq;SK>J77_e;orJJSp)8kLydNwHlBjEaJI_)9 z!wNL`%vTwo_vF9l{Ev&{Gi647e0}!Wt}YiO{F7Rmr0_Zhkgsp@=(#uqbHsAFFQQR6 zD}DU%R(us&BHysGdM^>42Y%;YARm=xSl@CwFrlbs%~z0{|8XSUXnYOV=IU z&pGJNe8klGD-^25jWrBL!{OK*m5?4_YsG_O$`A}eGPBy@r9Y>l2{9U7KEf)TgHtF} zQ%?tjP&stAG8K!g9QPdSB0o6CDV0`JQ4HFsvbCTXC9VA&jY@4w-F5%aY!!0IVgsFb zFrR4}(@DuJRKZbPcyG1}g|EI^g2~U8;8MT~*5BX$-m+S)G*(raCe~_R^ls*=f>Uj- z>QJ)g=Bg%vBTh}UUac(Eaq)MwS4}9MUzX}t9^76v#H}+}k201-IKHxJC*$#Kp~#tg z4@?ub$V0;@M?hc!9m*@iE@R1C9AA}bZ?^sueXt3}CPWM@aTrF|kRW>mzsFxt_>O-; z;!}w-Vm2i+SzDITQjHOaX86kfa`l4BV1*P0NQYo^gw0tA1zAQmi!I6AP|Yb|!{k(g zX^QxYn8WA4RnvJ}CYCL)DL<!&JXvM~mg-PBFvbA6;7;qPF&x`ER z1>bRnEkj8~#4Z<)lC$^-q$*4ex}zhe>~d*=_=R*XqmG0YfSc(uG`CJ+n&%A?~6tHpK%lkt4A!E;-X4!A`oQ<`vMiqn$R63k9DVSRM|=lk=|drs7g0fC6e zf1vtRhR5eLTZn@=5k(T@9IsFesO**ORJnc@3uiG3!H$K-u3$|GI?keK55$QBNtmM| zphs-1^0~7}jHkla8`-7}LoTB_Hmj@no@*$Nz!Q{-LpcC_!BlW)5J9}$%LiQr^qB8_ z;yJ4mYi~&xI_5A$efU(w{`Q{-0r<{LF0S>6%s3FLCOeMMk z&%i)(+8=^7R**!=oZgZ*R*>{~^(XFlWbTkc4=vL~B>h*ksU2xv`j*4Ymg(! z>kaPXO?{HZld6SqgQ-ul_=zu?^F_rfskzsZiCELPoYLw+1g$UUhcO&Wz$&Ma|kZxU%*euE5Pf z2hOaYbyJ^j3G(xo6 zpaAZX_#s+Zi(4IHARH1YB1=rE@bAeJQNbd)j%8+|#WIm9fg*O67c4oC9&J3^;2G#G z*RSpVoZBf`bk&P>Dmr5Q)XEi`2HJmuJrmgU|{VYzAFRE9^XG3Yq(F${F^beI(wP(aOG~3 zDA-x*G^90bXYDThf!+O9e;>~2|5~`JrCVN(#3uzZMS<}2-oYQKWsCGX%3r(#&R(k7 zA)1(1KzqBTlX5idTc6}k+;ZK~S)VHSN^e~^VJ%%&M@($uFK4H@9FuLi(Q`E9MjYpm ze3(Ri`QcP`E6<4b2j<_0W?%1!tMHo5!>uyOH5+SLc=JH3)*Fs;5$e+jR|%*v7f>c3 zTF_`|@6A~BbVSGD;h|U7snL=V80End@AHVlE3}?~j3Qz-pn-|YTdq5El4NObx$c-E ztqt2=)^#t6%kqGL&sMY*jzhe{VFn{UGFSTk1d(@%G8hM_+maL(8)!OhCsmmjMcj%= zqG)@M_*?PP-UwkvekGAn8P6b4sWT5835ZMNdr0-ejh zw`hO(1D3y>ea>KkVA@gdIwH_lQT>$jh1`YX1P_v!G6JzkalVxjlL;DeJnx{D48`d| zO7T1v$(G_IM7?LRxLr&hVcl)ynlSglzzOM;ty0s3B!w!rY z?&vqWE&Z1VNtUEZl+4%XDW8(Zcf?emP!|W&<>_?YK!=JJIyo`8p-|O4HOWMm@XPrX zx}Jc);FzH~B7YU^p)3Bx=jvZ5BRHPRFV_nce~c+)n9fA*#KLzG7LyO#U!z?-6yuY_6*Mr76cR>r`}`=vkRlWOrmQv;GlJ#Y9%4aH#i7X|Yd+$J!h z3BWPe1>#)Uf(v{q;|VDsSj_5+)`# zMEAq0mc_EKl8Un=ijr%QKK~hrxVYE@F#JbGnLJDbDToo5>5!~tW^0uYT`n(3v<6cm zj-S98Lj-)2)A*aNNEF9MMC#oj%_d;f@AsE#gJCJIvU~9Z7Fo9BC|X4ag@OnDcR0_l zsIHk-v6w0fg93_Hh`@+XjSgP~>r{*~+{I+k3q?$iihHV!w}fG6a+%k*Y@$3rot>)Y zyWoU1Xd0+%wZ!>49M6(HEwC$ z^=;!FeLJ`!NAH=r3b(ULW4~j_%0b=&V3pbj5^Y}z<< zJ$0&}eFCulx@K9f`i#12FkgGh&BGAI3_}@3sS@LAzYcHg+)3jhW?cvF8W`M=RX!-4 zbY1RkCD~k`U(mLqakBtZHV;<3!cla7jajg;9P{XlxG^GBNt5a2$=PaTf>nKA$Hklo zN-FZMSV=B51q-QOD`@BrJSf&G##2R+mAlv+!Is%Lb$%lm1FijMX$&Y1Q2?!rek`w+ zSP?kxEVUBjy^>dn&E&;nCg4zDtd@H##|dGs&H5c9?8GDk@XQWMM)4|lk(6(40;R~} z{ECiHAYKmsR?8y6;Zrk*P)~VB$-9YhD=)CKk+Di+{=Y6qL47UnT|Iy+ zb$e%O$(_pS)oyuogOa-*?ObNK4Yfy#uh=kW zJ?(Gm2(O5|q9VjZ9;COzMWaMz?qCT>iEP9f3=Jp{nayR##GQ-AJ=5vH%*dAxh?Cfo z0!0L@FKrc4-|Ma@Z?RpGHb^aVfIxo%nHg7ZJaGNLK(UK5EAqoPe$HdX0%p4QU%i^4LhUR`Co208}tZXL59Hj`Hx&~Y&4(dm^r4?2Y4;&YB(AOP^VwS>f9JSqRMxWqVcGMVot%Z zSi37Pw-9+2@_ELMMiC+})^@7RE5ujnSBP>x3b+ZUlN4F4%hrlGywSn#$}gxUB!A=Y zjm&2*ZF=-26&HPB?e*gV7>KW1e{DkIs5&qz&5EA z3a2v*=kS5LCrl1qx9(KE=d3)h?K}4_1nRcO-YXBj>l5AE*<>k6mJH&^GRSh9EK26m z?L!wh1vX!ajQ_ zH&d)rq>{ltet64!{WiJ6;sa+6H`wCBWR?)TGdD*_r3IjBxv*6)qC}q%G>IdWk;5zW zzU}e?-u1fbxOF8>f4g}RBSsgAJd&yB1xYf_0^)USE_o6+E?r}`5H`nI65iX~&^Xl1 z4TI-HEF%o?`z`kuyuiA2V@k!*cT?AUMYBG6XsoYr8W0rHw&wZ3y_i{*E(mMj~s&?E?xi-M(9dS8LWIQS@;;wd8yq zPPgxts@SY!s__ z{|@)Z2Y(ujhJ(>~*dHGB|I{D$hx_|~0{wgLtM|z$gXB;BJGWKr+#lq*x#@k|5-QB( zfe|YzwQW0%GL#Y=%LGCT!x|#jKQzptLcLU?G)VI6@AEt4U1O@-`nLD=YwPC5ggdom zf$k!OZP5A3tq1-U&p`K+GwE0mpzGF@ z>+a^2zkY3XI-M3wv08^sfQ4OeHJl;_2dyg{hZ9gSqgqSEpo~}2A)Yrkc_##VYQbp` zEn+6WbBulkG3M%rff28&uNx6fU5MVPn`{AauufCjTMg9K8^`wMrlS9O1Q%adDk=bA z;qDtKNm=l#akAL7766tw{(wX}V_FHtDr12fC;;%wW&n8^3&6etfEdAnO=dsSNz9MW zK7M34!v7TN{S1+So1b%}$Tbe_ zcL~Lz{j;`*^4Q{ic5;~?lDtDd8{p-1RsZNHNu&S%t%dII=qc-e7)5u`^}c6={_h_Q z`>y^Uj0Oi!`u|ZLq5svr_>8ROnb6$9>i9q8t*YQe?FJDfd=-3QExZ)dcwAWhdB7kpuw#`t`U*cM8rLa7330kV1 z4{gTOLgTCKa~t9xS+tbrzd62fZ&F~x{2vSl`-S;`us<3<&Hu-E#QgstW^y5urI`#m z=bjFUQI{)MO<==6Rnu7B4PmA9gjO5Q%p)+KBk-J8*aOe=b48O^#z@Fty2edjy0lbK zCch~lA#tEq6P>SLTc&jHTbahp+A6fuzm>9a%2P6eKzV~|@21#p*MXGdsIa``c=5(d z__pneZAm4kk47f7yzoH#y%=B#t_^lV956nLX84Lt?iNT`6pUiS%pQ|AcwTFlS!UTE zP;~xFJZ1TBl5;+m{2va-Mf>kye|+#H{~zP2_5X08=6ZmHr&ut^xjFgg@%pHZu5H{t zhV9y3=ZbPuNEd~{!0$q7t zMY{U5kr&N6B<(!G79Q1jT3Bl55$LAHdhef6=|ZpgVLO+wEgJ{buQ_IUKa$=Q8h2EYdWzdt%WDC+-% z!^0>2{}|70^uJ+{`!xUz*d`W$Dg0yt{0o=>#J7Fp)KptH294*G5y;Sd&DXPfQQrQ5 zBm=g6KuisLZxO~J*olz^F9)()`jSKuj^`iKP=2IXd0D_e`^=GQH zbt*%VtO>O9XS&_TPTV|I;7$pX|TKc!YD?_Wz%#Ll(8(e^6z_Ddwqn{pa@vH}w4L zgCCaPU%x7N{WbGe`25vp%j2)%`278$PBm5by>_?INxox%MC0mgZ5Mf<;pwQa;@ph@s2=ng`wUn%48Hr1|=!&;@tE6-r z>5$1!*Z zN8ffnMZLUClknVfCDeA-DqG>S+fZKC;JB;BaHZ$Y5`z&n-jkA><8Dq4TW4?VI{!!H zr?I_q=$Fmqb7NK1%)ihH_*+|PfcD?*?ly&tY5>2{aBl-xq1>r!Kx4iK^0t~O$%?6D zEtHTsUY}b6n`?CdOLD$YwOC^F-t$=65aRrr^8u&R(uW*loPHN2!ByplZh%7q3X8aO z3SP;(^h_|iDsCldz#);Yz-mZ#JLpS*QfF-;-?&~a)%WU3o#x(0|8lMT#$XQ#ZH}MuxAr-f z{eR|o+hfK5?~nJ3{=b9KaQNi^dyGf;|ISg6#33YW`w%D>soIerB``#!crH|I1y{QK ztYebSX0Y6B7I4rPhDZ#flb9hg6It@DUEs=X#&Web=mKj-_JMQIQ>DZ5Bo@ZAiv4H% zc)ZAO-_5fz+RjN(6`~{Dp?Mt>ap(~{Ifi*+{94R7k#$=5b`j528jA~d+|3&=daE>U zhF3BD-xg%kRhtt{*Jy@XF$3EcsOhTBQPVXxp!QvcqcA@axP)mvTj$5+y46ga1IOQy5h7WvQ@8 z-P5qF;=ab^jkmv2(px;MavJ9%(9^sOQYb_7%N}Ydfd(dP5 zt%AqR|1lW$4@>z!4xi5dKgv@&|9_U}saMycihK5Mn+-r{A%8Gnx(YT10P2Xbvror% zc#TP>AE1IV;#Mm!ZFJQR`UUKm0|Eja@m&f<@nTnn@`-9H@uKK-$r)s|YsC<9 z_p1Olo&P@=4vX@CfAA##ALZF9|09edOFw+dZ(+UHgMiZH^n?fr&MZU**-=2^JIt6! zQz=fiSkXW-gh<^3@ga%O@95y5K-@htcyosXgH^{c%zMj}J#r`u{N=rT-B)_gv<$lz6qO)?O5kGBz?>0{(5}v^*{SK83$zsI0)0 zmxzlfaX0pBgF+Ua-MRyy z`u?z{=RftOWtIm>zjD1lx@6V)D)rg&-Do(s$@i%1R%Cn3&xktBHa{b(JJa-xsN1^- z$`5G<*ln(i{>DpzOPIOLQf~4eJKSMc`dOXzg55ou!4uZWSi+-S1lQI1>tulzcW` zUr(dNTlc&G@y!1`PT`)`02}82Xn!~;+W&_KPv?Ih<+(-vzjMVP_niUQ36N1mp0A9l zuBMjxLZp*V-`V6i{d|JOO(1A>;&06Mwr?ve@cef%0l=m9eU z+Eb}PD!@!McfLhJz-HO~Hf0R#rjRf!E;v=Nz4`u3smc+o2YT~}iTIR)KHYM<*XQpm zO}nZzd!9spmDBDi^Ikq`t9;A(LR&1w^Lr*{XcaJfmF}x+a~>}rD`ldBYYOZ6RbZQo zo?5;F76CdXhOzJc(|`;CZF&K9RqMMXM9$$EaVT#`Hk}u-uDEM|KrsB7V20j{2%lZ> zEBGZ#>@=YHwQUY)ab2-I{mGP2&%?dRj)VEgJ3EL@EI+IaYh$f)j;Wc?Fbt4&|!bw$gRt)1Sh9nvOU zFTl)i*v-A+g_!&temQ8=*8^)zRXwTF^;pVZ?(nG+TXjIjwVj)M$`zxiK-UkU9jL4h z!(5@Y*-TNK+Xih$GSmj`Ws=4046;QVv^)H@xM{Z?WRxY#HfXOb+!O}8btDVRb3l9Z zEi%>4uBu%O|AyK|I28n|-@IxUWr7F5ZTG7h?pBps&0=r6+l_`!NYQjOsuD=vc+=Z% zgi}S#+H|v}(NGY2--6eOA+qE$U7S>tcRxG(r2ki(sm`}cB^#{*?Z>gwsM^gm@$hyE zAkTP1O?XnC`L;g@9Bp`NZE?8=o-Y#0?A*Z$I)6{e`~HJu9^)BD!V1uMDl9p*yS-@mmT^zZsKwEvZTak~wHP4Pd6hvTCC z-#>h^{~zTs`+ts!fI}3(g1Ib`eo{ngHv;P{Vm{5)mG|a*3onH;q3t*f_16>ru}e^z zP|Omt24BBUY6>zq2VcLoCCsxdie%EKf;ZBwlbT|}p^bu!V7BJ=Hu@qGB#|sWq8}+D z6VTT`RoHaDh2qtuWvK@guij$1LFwp1Md!1wEnP_Fmsm8(!X3+9VS5qBP;{{=bcb(tClJOsIY`^W6Vaw9$YNY?~cqCwh{vQku z3-`Yd`}^blC;k5zkJ10{QxtzXI|TtjoNX|SsB*JVqy1&d?=7@{$tl!%gqeKX!w4n- zqHYhcV^8+`JC{(q=68uvI<6qa$OfI|!YJw$WetS4hNwutQ3XFO`F>|lBl#~C^~1^k z{o?wsKk7f7|9F(g$baR|-XUm)2#Nz7&%qqC+_>2-ECKLVNVoYGyE}f5`(tQ` zt!+K22t5}$Y+)@*7$)H477*NpTLE5^02W7iIl&3avVWI^Xaa@@W3B`kS}NVv0as{k z>{aRBOnoNolUMJL_EgD#o$Bt+&c6ooe>^JL{|Ei2`2Rd&iX+Uh4w!;rsH3Dh;PlPK<}KALH_p-56b?Z!>98fkMdN-f7y9;A2awXPqAAa`c+EY>ks@gU3ieFFQ1xw z;FzzRHnkC7TN&e3^IvCS7WSXYb^1{D-)J-_t^W_6?*D$2$Jl=+$G05sEq%Tw&9{}z zx_Scpl7d&dY>x%RcQC#EIjxRv(DB)B<+0W68r0Wt8BM^iaz{rj+_eR`U@X0iMAYA9 zDs~fJ_FweX$2my@_oMtGY+d_2$P7nFcCyEoY0rEY4f{`z6{#B~S6JIaL4;9kZv4qe zG;wb8DIV1b2uzWh`lS;V)$Pq`e%9e1$@J2UQnzrlfkB1?7rwY>Py~z>4mdrErmIm~P-m`4d4fd>=>aiMXlm&XG9{ zVsUE6_mAWM_;-Ic>whz-59R+E9PS^M{6A0m{~qV5^8eUZK0T)YC%^q^i{+!=|6{Lc z@8AF9Gjkr;|C7^Z>l1%wSzdkCFE7%l&-s;ArH(2vPDk_CTOal-dM56E>d*9J^-xFs z3Yz}G5B%MF^}1R9-!b^7f&YJhSX%$}2T$ie9_6Wx|B=jlPk}$)N!JmZZ_2@U2fyBv zy?D!~YW}a%xOXY;l6>&|kAwcOU(EkFJUDoo|Bvxh*?;OP(#JIY#C4>W)wj(xr#I#* z%65{XSl(=U>x)ry5WsJsn8vO#LGuifJKe)-1MxK2YGiS&(pcLX9!%t??{TCuUH`kf zyPuxIQz!q`H0WJQHhr-5|KM;`wEu?tPxpU4%2Or(^>H9M^gt^CXi``dmediZ3?wt} z(z*rXP}GE;(?wj8O8@f=Z{A!mlG(rHPxK+Chgk8ewjXi9Z+g4+dY|4gv5)R6z3*f` zPrBy!^)!Xv)D8p|tbObPE! z{D!_&!+r(8j+HR%KmNRGd&_mfZn2N|Lj19Z_~Qcg2e+YqHJ2s??D){rVmG6Ri0Qst zUoM4|UMD1!ltJ<8dy*_=tb(-T)Fq){^Ua(EpRAVg7V_nI2rKHrj?>8<8eO`81chBw zP?J$2Bfr*gs^#!-#>luyO2HT0($O`W1UvAu5niDfQF=y_sc6V~(KOznv!RuTjHYO0 z|2=H}kN$WtEXDsl<^O%0=K=D66xWWOhq@i~xh-y*Ms`21itPS$c6xdA@#4pc%&1;a zD@{ahGjaPXn2tv%4t^hDPIdF&_@(dY0o*wM$K~_CPw_vG^Hll&e%51uFCIW8GV0}q zwGHC;?&Ub$(Z6S0cBSyh0w#{HZ}$N_d{&QkbHAze^9be^oR5r{dDs7?fK6q7so$3BP_xIE8Qm};XZNwMi1gk88!5! zjQqZoawjj}{MYf@kFVdnK7DiX^ZO4!onM}ueHxY6sSLkB`+t2uR72X03$$xYmCelj zhj7mz7FY(!^}PRY=BRm~r)2-BbpQ8p?q5Hf;y(`e4+`;rhyB6R`tMPm+WTK&;r3S; z=^*@fFum8iU-cyuh4cYRydw0M`@II9CBJT) z#G%lb0DC_->uS7<*XdSCiLN9@sRjNzFU!&h>}YVijuW#=hcr_m)$$*G zVTi;qI*Az~GZ-NHVE(^RDgJMK_!R&BD9={%|BYe^V0fZh31k$b=kkc~!d@*F&08`Xe|b}?EyYeo#KZ(X3Dv%OLAybWyFnbxx;W{r25lv?lo@@* z7z`GCarzpG{BJmkJyHyR>2N_-yoOx7G`Gp>D_y0yn}Bb`SJ9KNU%&Y+EWzseuWuT= z`vH*p`9By8$HU_JkAuNe{MVyATibsp>f*SEu>Q;yWA|bEDPUV#e)he1ceeYAm+bux ztUjA6Wt-3b+Q8zo5PY5zyo6+ZuI~DqyaID;4@6%9SlVzg7u3k=g>9DSFk{JE9ADit zSe5SjJii3KibaZqFLbjs0Pgpif$*SE9uH5U1}zkssnnXj7?G2*2v6J;P(YSz+B68Ci zW+WOtXK)&MMWMYFVJ->P71X&h4QCmK*My@_Q)NT773yu^o_lx1*fD2;e0^2{DtCn9 zFP%SgUZ{eyTUrVknUBAq@Es1r2wg)W1$5hwn>bYwPf z(O7Z%wFl8xjw5&vh>854VlJ1;7KvBFu6>nF5s48)G$3Ic?7BGRn=K8|F{s?N;e1)_ zE|CkvxU3q%;;<~eBeL9bFqX~6VOci>%R5lNy8TMRZ_!+t<^^%;8Ga!vm(B|#uQt)k z&#`4#0L4H$zlIikRO%*CO@q|e*lwx6#kHF!M9eD&^Eyfp%JrSHWGg&Uwv_+f`J+nS zrZyuG&G41!bIwhCQA?7HiCY#KS*Hn(8EspU$kh5^-|}~jrea@QZ^kxl#u{hUj6L$D zP2+mU+7_NPy}GtHzm3kUS7ybx4t1*apCkP&t;F=uvZ$0j)kr-SSvPf;s{+sg;!f#2 z0(R95#+=ZpkI9y^wDYCU(U?GY!oOwD1^07mE->Dw#;C|x&G5O4PX7uFGN7Rei@ zxxjAYF98x)TKgKyy(b^g3iAo;mAZHax;Z+PC<+o->DZz{*2@ zIbwP1;;L}ZAS@V5^I;X&f!o<^tsQE4Rk$^J=CGw%5c$m1PPs;^jDC-q>Rxy5Fh%Lw zelHfUjL8o{Pft;|Q z=jkfg&Q*Osu3ZHsP8irhzxYeGJMDs#Oe0(NI_fXAO%{oe_r`cs65?1Rg;xE=a%gMpXAda`()wjB+>g(0f0!7O%UG#M5S0@z##_b8XLMZiJ zv~c(JPo3F%%eyW%E?2i+k-;E9l)g(sWNwrcYY5Y8^W9#5en2q%nP7(A#{p`Kqf?em z=fu|mk%U0jit2&F(t!PEvjKsviEnbFRt?L11R zFlvM6wu8iC85wMuGiCnULDeeeJ12Z^Tg27+U)$jiz5m-kJRB7D|I_~OV?A5zf4!&j z5E@^xT&>o(*Q0mQ_{DYYR@%O0uYP|kmG87)*5dZpN=QWuhOPp!ytUl$B8j0TG_BE5 zyL`@eqN;U2+lcay-QC*QLdB647JyBLyZUhpqP(aSwN5O2uTzjE6XV9@mfUgZ+f7Nr zk|2rPq1XlOA1^M>&W(q*-a)I$E-$R2G*}=`rv+mvt#D~dOf+8<8-JU?@H-g6I6%bU zzy~6Vrrj*YycN`CvmT71zm;VQFI_X+SD_xL z4Ak_3mY=Gq;)m0OB$X1y1fiZ$mqAX>wvFvBbvw{S_-gEm{tkarN&+bQ&u89jsw~$cUZLvRJ@$tO!>&5Yz z6&;}8Pr$|TSQ;eV ztUm7UnojChRu}XuOXvH2AifD9<0WELsZV#SK63@QtE5zf0+x`8PqxWV6|=HOz@@&3=j;o<)N zlmF*29^wD_fLKOib=i_wathX!J|A_5gX{Nc?8_;x@GbX+nlNW#MonHxuWJ6?KM%Xk zJnYm>#6r})$;;z5ET>y_B!0!s4}Gu`q1c7BYfn>={9;EtWlj?*W`w6qBgo0C-BADA z{xkjG_Wx;{_y;Z-t0QCyqFjW?sLD+=b30t1nH$~CYqa%X?HY4I@XFVe`iY`IMzkrjaiNTjnHv1$LzNk%e|;m|-Q%x+RsJLrSPl|1lhAFnl4%<@)8bH~z}I zo(05nwR0e+?;=UAIK(JPuCf%gSA#ZanJZnLhTM*-;{(Tuf$iuzTd#i3Nmi0jGw&)aqT# zh2l)Gz88chbDcB}whB#WYs&S-RBR&o8}aTRRW_9R8}T)B=JU6?_N)1-q-eWpmF*<8 zGl<#aR+gU3jg~1jMk^EC0dqf_@l+MKR1Bx~4i?AOVv2&)^#FNZ5(O2LDK#m+9Fgb) ztm3arfIFQ|Yy0Fd5@;coX`4OUQV17GqDZ+~2#mv{C|$tQYzYqRKpTxj!FlTVO--o3 zq_Y#I<9dDy-*mXTB%|{!BT?yi#iZB!^J?!UvZ!SLM|j!` z5MjMb{@?SvWqy~>rug5%a8R`Whl8j5uaENh?0-aFn2GyUJV4ceVfM`+ruFCTdBoG|O$+<@}oG<)M>E43td;oaCA7Ez;iSVX&l z(jb09h+W{|C$yG?_!Y3^oDm$)^ZNxH#lj(8p>-WZf>)5CrXX(~BRl!i^U%)*{eK_n zpEl-y9~_KJ_kTa#|N1zO-v1#Otq|biv^Rrl$;%l4&u{=40+_0#Wf?(X_2y4OMq2@| z4Ro0&>UW2W&Sgf~YlPC{Bwbrxvs|m`_*sbshxI-c7Qdt5enM-xyRY|hH)51GW`d*b zo?fN|Q53U0`oCi@8TAiI&!U`kHbz?RFi7DJuFx7J&M?#y-qH!bJ5qwSg&k)zqx*fz zD5vNqN=c=)J*g~Z_q(IjElIP*R5nu-;27X9$N5)UOShckeG&TRr5o3tCup?W0Xru6 zwMf3MMK;R}+1)sA>|V}DvNX2|2(zxXXB&F-T%jbGi=2AenC6`Ji!t^M>)OG{ zC5+9i)I2AucWp|RWtu9aCJ~=|HNx%5IQ%_7e*13$xdCXo&K@%Ur#~K+^1qJym9m{iC_E8FXQUkz%Bv!J|%8P$2PPtCVRg}Q6OH-r{a5r+f797tT)A@=tTD;=b z3))=`oFu;b&JEGzKN1{+_8w^80(OP(v?&d??EY^cChO+ElT7Ol0$^kO->_eb|LZ^9 z|M@77ykjqll56l&Hbu%urf&R7q#rayakp~ndo!+G<)G~FG#&ZcJ+>=Z?RIthdZt={ z3g;FJhA*&U7-5={Bqf*|FS*}OgxeLf7jM-oJC9u6DS14$twauv=Upz4WF~RfzfI9{ zg~)NTOhv-KzYMyAmu-(XZX-pzZYl?b!4xs*H0fPxN`b#X!IdEfWwO2XcI3#ji*^co zz0JDhq~+VKr=W_GCz&rn>XU_e`=?I+s}lrw_5f~@|NXN6?_l_p|L0L2+x}DMmA5nf z^d1MFd^-P$;Gdc!zT&$&-&?tD;yJlui<#~*2hu%CQ!U@cE>BuG@w~E^k8Oc{&=-v<9+cbUY=*O8U6y=ownZ!Zyk$_IRF|AW?2-i!7mw%@CQmV^goM9A&^2kwymzbeYUYCw3*qN@y5WhY>=Vfs` z7Z>#Ic3USiK%@qcK-3-1RB?lNht*y1Qv@=~@uUC>G?Snz2`hS93;|64u!U z;i&A~g0H~ps3mdK-??QvlUx#1-&kPzHt-wR0D=+ znZy)Tz!hK5(bixogAC2GNC5UhK34^Nusb!!Y8ilF1tT1SVw*dErn~JbjC@kLQbF@^ zZA+f~f1uqJ|25}d+Fw979_2SBc`5j| zmj@yg_*|c_>;kK)ql_hU6eGfCUYbxgCy4$MffQ1Dosf`<^WzAGD6E4Wq7=m;iUTZ8 zrf4u-9REXjQ|ekJD8%$m4GIX2+FC+_VK}{0YYIlOy+)3ky7{jYKt8Phcevl*AC>&S z2T$>zkMaoX=1$YwulH7^9ITd+s6aU@83i%F5hqlkceS-LiioGmPO`)-U-8MB#RTX} z-s>>0z04>Rl;EqQYl0anVr4hyfHEtR%mRTmVA~+OTg)U3q(PXCgD*YOz;*{ zCKE`x?y?_Z0Onzi9?;TomV<0n%1>l!oM0R$g0`Y# z{+7Kh_%Jc!>6Uj$t=inJpsRGEJ0z8_O4O9E8xhj7Eu$QM6)i2mjma3nX_<`hG_C<5Sme(=mY+{Ow}2 zVStLxfd6|f!u$;(< zlxce7x!RtgWyM7&qK&c#(8>J}VakMiX-D6>W*z0)b+ZqM^Xd#OyRmbVn(dq`f4?ao zzPCl3>ZPnNJ5$_Wb!ix)72Zs~4MehlY@m-U`8%gj&N3eLX zh-j_`Rb1`2M7-Y}anhWpt!Zh9?Ixemr0}#^E2Jc>Mw+4qdNUElmZ`|KR&27O3$8v9 zwd-*3;w)%dsVNGL8RNH%yGc4x$pj^{src#9hQ5Jnl3+GkVqTcH7;EPifFin%x+;zG z2Gyhn*k_(OEi@QfXJAzTUOt>UGnK8Za6G@2va*5yz7>`3VFNMD5h{scO*I3kP6VsM z&M2CrLB*M;3VTIw`P(*gPvhKd-j&jxj&dlRQ+c=sYo6Ey?O^mde`4vUb-3T-sgp*tym6rU+T&bXB0+#W3mywZ-i%XBxyC8o)?QhY~D{ z*9FBWTp>WSG>y;_#SBJ2kR(efU)v--wIyc&FxOC_F&6W8}P`kNSG(z@QI?eK0JioxeSb;?VRDXCF7sG+oTc0Sdp- z2n_m%mAD1Ta*AUa86v&IFp4U8TdRGWn`xHj92X>U0GZ3;&Y)Z5voNihvt`}@?J{z0 z8;?%OGF0Iaxi->ySsgb1_VR%71#&32<}L{hRU8_iW3~8r*MCb1XWrz)^Ue2azvSe7hhzhFRAD1ABKlu#*!suIDk>K7Ofl~on4;3 zxw!o9Irs*{u%gGWZULZ}W3>^4kawV>;|-B;K~!O3NM6-_haX-wuD3;d zg}%B>P}`!ni)MZjywWMhWqy@{tSd^;q9|0iGgxUx%2!y)yszd8&ipQ_U9bbLa2%cp zpF*Au#w}xm+9{noeFX;n;fPC1BO|>~>{PO**RQ0>Um-=*V#P&2twmgYy*bFIph%;lhCN2=G3WGP_jz|hjH2t>ShWkXR0I;y(# za^s59ktm?e=UY36Q=zX^Q*Jl5Yzc;8+dwHVTYb~GHWT5#?Q|8C`J)ovk7paeEfUJkAX~T@zPl8$GenkH+>}Vq1*{4{ZqfFpx+Q6> zF{o`MN3*j0t>&paZt@28;|SvAg^q4}%mHkSXh~0Oz)jL>17e=U>WwhGc{=U+Z}s@& zKTX_2?~*SB(p&=ECK_}@{P+I;VIlwba4_ya-T(6_PwoBxY=OWu%8)#xF-wSevrMws zRtn%B$rP{!6iz~t#jPotB}AW-5{Jtp=`OChHO>m8av9D_%qLu9&Q5aKA3CGLxs_Ma z8s;6x+P!D4Y?F(wRqa)GiUztYZhRE#r>ik*kL&HoH;%7DK`9-2vzGgXE-8%Lz2iI}%~08siS2}Z@F7+VD5v}?jU`+)Net!_cXX?Kovxg$94M#F;$^l@ zt3Il?oa?y6XPQmjkLpDZpj5(x{gZK9^=!2N)ERI@ZhsD_-u@d54#tK2Ps9HH{!{+H zM|p1KnY0UT*FhWuGu-;fSqN}kJlSj=OslrzIJjdCOsWC7% ztp=U_%+I?+X52`Pmml67y}o>Z`u4vsKfHfm7_0W6?GIN}H>>ZI z!=6e_oPIiaeR6d9>E!(6ySHyHU%&Zua{T7J(9SBsVcwJ_TnkWMe>nN{=ELRj(b>^= zCvQ(KPD+qq6nStqa4!C*a-=T)r<|qH)f@53vrxI(1J76T4hLspV4_E!Ull&cKvn)_ zRa%O;8<*~y#&zuw^h<^b3PBsiD@>Aj$%Skl-zZXLiJih^29_|Tx(0w&(k{I_>IqTt zQ19kO5$JijxP|;uT-+?rb5qIit zM!YB%E2rR#Y9=qStYQ=tuSB4r%OuvB1jjkAKB@ldU(RH)*~uyH;p_s00u9Qm50$E_ zeI|1$(i8=FwiXTcB#2o;fKN&I?x8k6#NQ}hXTiM8+E^)mAts)m4N55Hr8~P)h#zokc9)wcL``iDAUCXbPOg%>14r$^`D{P^hY z8=!L>g+RpT$FoFsl9w#+!Eo)}0#2Ay{!#DRwM8CN5$Iboaep=2YNDte4weHlQMLK2 zitQl(-qG{hZyNnRozENnzl(&j6tZCPQ2yWk;NYOR|KHz#y8rWWo=4vQzj*)p{RD(4 zLJWa039b+UL9$E}isW07N;3`+!2iXU4nXf|0nC~N4;XHB9nR+UZ@$&dNQSoBKi&a! zO#>Ez&NZ0PE{+q1XY1|~e!0vjBA3^^TZq0o7>z3sPks>b;{9KP!Tyu{e~d@&|Ftd_ zB0ZXvtXN3l>ixfNtI-BvnuK=#KgVfjcIo65{KA?lzN_7~D4(q=r>L$m?0xyHyA=*b z&&f*BT=U(Vs)Jx|GXy6BU<4`Em#>swHs4mE!2*R@gouXayl4)GOS4mXH5V^o{oD?Q zURdkDYirwQi({H^2bmv^0(XkI3)6~TSa6P`j50*N$Aq$-i!$lG|Lw_mv_@xPn(m$hY22-Ev!k8tTX0Hv#<^i?Y^>3HaOJ@3ASn z``q4=zqW70`cno~o$Is6vAQNS_n#C$H`uqF6BwW~M6i$*NgRqwR*4@<1uFQTi(eBq zVHTftEA>*qY=!8lgJIdtO>0+YSjMap3ZIcWmH7!hk!u6*v{&nfoD}wg`+51Rb1Ktu z8|o9zSL*uiE3~FH&HM_o82Zd6D^Ivj^3mx!PpgUyG<&uB;|8%_?XTK43U=` zGWo578_HjA$qi*dcj1OIwBL*y%BbYr;6Zb1ZYaUHB{!IPWDCK<%y&NBdfGcs?l$Kg zP`}}Xckr-hyNlp0rn(Ja)5r!TF z!P=etI?VHd^nTucIDKH6P1lBd6vgcc^)|Oa^L84q9*!amsWbzvpLbt%#Yu?FHJx9- zw(Q?`hYn|AIW6X{{`>AwS&}AEGGCvk1i|n)i76uxs{s7UkN44Tgh-xh&-%F~>_32C z?BC^S;Qu4+j(31;+W$EmmG1vP7(Cto`6!Rr|2Y%+M~uTy-*e|U{2I9X#4fj$SI}fK zirn;0{^Re3y9dqLC-=%gS81mz4~xp6QlpSXNkl2Wdv&j^p-sY{NmdZ%s z1!Na3IQg!>%md@BCQ_2HBuHEbg9znCzgS<}KVDp%wMD#c`Te=?!^N>EFQY)z+X=Wh zJ}X75g(=)BXRC@<{nF z#u&)6R5*!2l+1C^OzNvJA#>h7C3p$RTHlMWR?9_UUs^<{4_#GVTzXi9sk3gi^X61) zCc8yj0a^9bs@*ND^hS9}6G2LIbY-y|w;dUbq`u1CqeeYy>ua$Jc+eu#_2i6vUvQSC87MinL)1TXI%c$>zQbo1TB$&xLE~lE5 ziPnl&0LyPQMS(9$bm-{V!dbdJ*0aC@&cNGxzKD`IH|-WMMbIx!ssEq7ckON)M;ZqE zvwsC%W#)7|uO*YBE|zzC_HpcV+B>;;Z703Y^fRXok&uKjMY0J_7J=qPnZYgP~5F3EQ3lic@ zc8q0Aqu9p1nnq~*uxju^mlxGN7VoMIP!m|{%1x`wbTN4=zo3B8J6omIm5wM{qJ*pz(jo~9kg3K0M>gxtpVy~ zbASKqfJ~3OEY2MR(1OO1mkl}nF1J#TVG}}6hh>KX`Nga}_%ypC9!mJhj?A0EYkJZZ zn>Ca|4|x`X;W?Gsf zx=>feth&V z3#m%>dX#E4tbLv(rxvD0>lkaFS4xr>-l}U*T}iO9plQCZDvL%uw=NvrXIU4Ax2)@? z`gGScZJDUAX9$n;*;D?1lmlpo{2vU*<8uCoGx(bS@mW6L|Jg17_wog0r@tltwPuK> zq_-;onMIZVY;kp)Try|dWyx;BkpkYR+N+K2wf|b*DzPgQ@J|)ZqKN8y$~cYY!03x? z?)We0EPTKlhLV)bNQ!WTip}XPOQd0hXSaWq(fn>(m))|*q+3Sf4PTJ-fii+58a#&C zzIt~qUG=4I%M^+>Z`LGDX;5280Mg{aiC}vPRF$e<#-K0L=>E*)#U6XiinYJPYH@<7 ze6Cb+4m<`zB}LTMcX@zkaVouv+Ys9MMx9ccr>^Rk`MX>#kxn~b{F#M_XFV1VDYSpA zw6{=)EEB%DplNY`>0b-wSBsjS32I3Kx~g~z^TWIhTt~L-)M(G!dtmh6;ios43OI*#s;n#{;m>!Tz|v&UPh)2(i^YW4^TbhZrCZc5}iLV>~P&^EKN)JAUP!9rauQeC-* zY=gXxIl^d-LmHq83Qytmx<<3u&vW>*AA@IsM@tx{nvaJ@4a!hRYvhE_=c zi--i2Gp$!b*of7BD5R07rPiZrt(oV_bHPl6ILkD#b@$KfPM$#k%)FyObdWwLHNwg@ zc+;Hdb`Nku-w8tE=oGEpgL@hUr${Ct9xMsR0p?inNqLK`akN=d0rf4jHJM0KXsQ1F zlmtvt6-<+qtZBTGaZ+)7ze-SN?RHQ{B2c1_CD_l21VA0lQvMW7uP|fkgk1la#xXDc zEXmP|r-4C!aIPSIhn^y7V;RkQ;{6PTu3j1)bcjBn>1YrT-?+>v?|&a)qVYC} z1h3LijYW3c`b&6veEjG2>7UpC_2+e0^>XTY&InxY8{PC`thBu=?tWF^#rmjR}BhPD;14Q6w2 z{|csl2@?FoehFoYCya5;8hD&h5`A@-8!?wPNXQ4D0RaWP4h8k-6Cxp1JTt5Seyv>;pbAy)q9=tu0_ zntt}!v@JWc5ccRD`tdRe2`9zAen*zy41KXFi>QApc4gpIXU_d0Ponm)|8#EmWkh+a zW1wC6AN^4!{=;*==6`&aPmTSj?Ykrnn7%t)XZNFQX>8B}uL;5^AR*q60Euzj)6A<> z3utWRV^-V5 zM*nut;7&SquPxkzIc(EpG=3cpynexI+^#-sw;gNWZS6GN7k9h+@OPkPrz>$QPkbCl z;yw^uF!-+T-+QbFqmv z@d>-MIodu=xApF}FOG#arpw}o`=nd_KhY!ic|UvDe<=xQd*g49{D0Re-~Z|koUifU zpXKvq*?+LqKF0I|0JT=11pRv%e9-&H+k82g9cEuJy#%A>^t-G+O2_Gx1_S=h80w=L zhX8h)0at9W!^o;aYhzZ`bh*u3+F|biG*eE?A4cAIQV`L`Fz*n|*@Qiw#;>-*<0$)E zf$gDQ!}|(MOQl*4W-}$&K)W&geO2F&>BFY*ik0-}9of{}2AzFXvi{RPwff(R(~uqi ztSVO0k1YSROaB{<`jz^BgRk|UKFLkd;xoCz}rHeE;T6C$Eq66l&yko}FEH z#J~UOs0v9oEz;6M7p~ACGm@qxxLBn$n%~GMlx?7sWj zi#sdXCJ%(p7yJ~t1wLJx#|2J_NPuQ&aYzMzfahElHR8%};-vx!f{) zA2D&+oQcieK^?hUKFJJrig$C8Uyx2*gFelKu>H73&j4s73h6W_ST9YW$~Ov7Yw9T0 zalj-F^!Oi(zavhY&qopmC4LC^mPI7u*<6tKJjJiXqJ60iO?_EO=?P@daq^yLdCGgt zlYv5JaA!yqOvn!EQYL3s5_hHT z-dh%iSB>JKVb8k`s$?u@+0M&^Z;U}ZEH}+mZk!~&`_+`B5#faOXndT#bSkqg^8v1O zS6iE_{ub@(q?9pIcM7P|9Ceo(TRM)kKcc`l1wT`xR^z#-K-Oi-|1Q{VaX|D1Q4QtT z#eL-zCtnuZ|@A5YORw)8GN<8#}8+w6ac&HPB)|C>GP|Bc*I{I@$Aj)q_D z|IhK+&;B=g178r7q{0}I!MjMYlF9~9%Lo4Jpr`5vcldf8$J{u{#(dG^agQ&EY>hhe zFrMNN#O4+TQ0yU-fO)L8u7J_YdNnV2&R*bnUTP(N`G9zQ110jamU$7FQxG1do&eBR z%RvlYK5A&i1a$EuQ!;eRKGEn)u)n1F8R$3YsZ_O0uaJEdL(dbjopj!SH^8RuN{72VhP8m-(>i7_W zU`9^^lBC4PoCK$6#Rw`+lDrhcya$&?j1wFjZdnIO-n_J}G8t;!S?-bjS^qHKce;`M zzRxBsVD*S2NQ8EP;mUF4O2PSAHQO>wm9c&F!7`Qm-2+sE&+je#cgTOGrGIMq?+m^2 z{STwz@N4|XXZbXc|9{Vn2*fy!0%3H^C1PFrY6a=$#=Q;J0E$}9q3kLi0}qWO6p$p0 zH?q*SmUN~$34tnX?H60@!n0tHZbvnP`O=2@?>)2oeYWj?#^V%n+CGv2?9%_eK}G)` zkG|Ib{w$y7`oAf^Z{!L=a6NsUEY?d1E>y_{uu(ay-V87c(dEVf+A3#DePtJ={7F3k zB;{>kW+g!LVWv*TE1s;(%Vx5us7m|H;qa9Ff;!z!u}QI5sD}F;>ikdVe>$BS4+B8C zIX`>(y!(&uZ%WWmso0)|mWOoE_g(cu7sdgKRU)Ow6=OUO%e~ivwh>%#Ug*pAWjDwi z72UPI0H_MB+~e*yYWmE~l=tTgoN|?P`zc4O+P9* z9!zPd4($yYtVdKSjsG|!YN_&FcOg<%oWd9ZSs0~xX>Vh@+C_;W3i1kHqvs@W21`fh}-Tz0&OAG$m~UIEYMI10L|m#*lgYqT_-?_UN}`uh27AI1NB3lc6V1bRGv zAG`g(W&clq^!5Dr^L(D5E6h1bBk-=u6@VTVBtp{_4FkcI671i@3C6(_1et>B=5L1B zf`lOwww;Xmq0#&Zr6k0ht_c*CH-5)aaPS00MBU-_G)c*fz9)e!Z1ukmdkAg{iz9eb zpo9{VqL4IeeOui{3JL^gg!kf7fw` zqfvSPd&95#-)H$eLFWq`%}E%~|2j?oc5ra;R}8TU-zjaYJL$Q-QRi=eJ;r}Kc=F^4 z`pNwLpHH(-ncFUv`X>gh9w1PRX(H;;`52nQ#u#)4tR1cO9?mjt>t+ zM*=gkTMzz%;CdT%bS~40QA$$jOFFQiJhY%ZY>V=si1Khd$}$rg1@eGfrc{S0ilgol z|0_<>)1RL7-O0&b$WX>sgdL0ahlhK^-fwPl*rUTk+gJ`PV>xI$mR@lz2j*A~+l}RT zzlqK09S`mFdKP-UHuQ4Bc-QNBy^|u*-Xjq0G+aQASU|F)i`ZwP9~=be8BK#{I3)-( zgypSobh_ek3YP*+S99piIdK~G=A1ZLZ{O4RqO+7N<26Bdae60}j980&oX%Im#F2E3 z8ZO?^mc`q*OlH6B;&qGj*f-|UX~zhhK{I-t!4`U53%zbzdYvM@u1W7Gn_z-DET=Gx zAJ9^0kymdoFOJ_{UVzID)JwLBe5vle5YJv*UP$u2Ni*`jiJg4MLjHbhw?e*Co^EF= z`P0=hf!KpY=)G#zyAWf}2vViPvSDHioRR?1L=D4!{3Ra-&o&H>Wf+`x!*J4b$3>p) z6vx3U?ek~X&(HpT`T7NtdL?=#c0G%i1d(XnUE`FYc*PkF2#ROoH^hkacECWm4H=E= z)DMKjyJjThgVsaQ&xb-n+BOz5`X1f>15Jsrr5=UtPuj3cchXD{iS}D) zuH%>TL2H_w63wnj^RTo&{5VaC&&8sU>;dj(E3*!ud$gazmC-#KY@xf3L&yg$=^j<) z+A--KRCr|=`}eiPioM{cL@WgHSn^UDQJ#4%)p+bTMfrHR*6|qG*1@RtIvADK!KkkwJ;s~TG#UY|m%;{{S>=!w(%>>WM&@OlewQf22p!L8O1<%0n%=HazyxG8d z4H=SWXGjB^;2E?QJcE+p85n}c?Rsuwn$-h1e+K&d4L54vVv0&+ZS=PlLW7bJ8W=*z zq+hRb=|8@E{qFMO^6ck#mp7NsUOxZ%;`zJF^XE6GsI!h~&`}<#C`K=?-Xh8nW{l2- zkp?5;Hr#5iom~%XB5KfDL=8$JYG8;c*U-Hi?Sk=1vt2Mg*|rNTB5KfDL=8$JYG8;c zx7#n<;mXcJOUgLDClF{sBgSzUg2Ay$<|z&ca6*)aM_B2xh=@UJ5#g0Y#J~^{1$qq5 zt&tW4Xku7Gd^)2(P;$PD5YNVvz1A$*E3stHV9Bmw_%vIL4UOON7US2mv1G3`OZG}E z*(x-3-d@6dMT9@Z>Ak!fO%mJ8 zH7?qN1x4P2W6ivNPRKve5rB0XEC zPZy{2EObc`-EiSJ_Jz~8ZI*uP&C)MzmVR-w^h*pNh<$m03h8-q%5f;Pm>Hcfu{@H3 z`x+@n2~HV-aCNc9WE&Wek=xAOHgfImw!UpA^;_>Gw=y73{eT!d>Gt-&kI>ES#pP=l zg3GJ#@sf&#QCJ5J_mpElPN+YBln+{x?esy(sPr=ZNXrFlGVM)P>Qg=UK~>$Fy8osu%^6qMP$X|C}t zz)y#244Sdu(b&#@9h-9Nv{r7NlH7I*%B?f0Ipq!GIapmX6-bacYDnT}8;KUN>a-TC zPD!jf1+nV1a~g~W4QU>1quC-=oz_y-DG3p$AXQts3rEf3cSQRwG+QJ{>)4G+uRku) ztR#pKAKm_>PH<`gDO3b}gi;d4YcUQ0ozrPZj#MElT?j*tM86?p>suL{K)ZG%#Dmr& zQIMqqk~tFX43LrAP=L8s0VWW%(cDsKPkQ}fiRO_>bIV=sG@NH=y!T1Yu;B^l(0&3c zh_{VrONC(4>kmrfIW)(!okB2ds00n|N{~R%MsrJrVAAV*C7K5Y%`Lqi!%?#}G#qW? z74-^$c+i^Weu-w!r1_-A0i&Zff~maCNH9-%^Npmp*`dmCWIa?7$l2&^sSQkeeYZq! zzn0#8=eVjL$)U*Xu3^LQouNH^M<8z-kCvLkq}O*!FA3 zv`WKo8SMHcPALwiNMB`VCFjIO&VFNN%QYC6NIEe|vK~fM4uoO)8jAX%vxQB&HkHn8 ztARzZUPKURjKg1fmk&m2}09x80Kf=W{^6M(e3&9wZyie3t%vid2RAy z(R%neC8(G&ygv8~@wH4n6g108675Zkrv$8F;MM>Fx2(XL>6L?lw*^>31AfpSZv)m4vwi_HHCF}x4XZF9 z34^q4vFzpxU*@Sr@k7tL=56Ys+e$smHh0NHa7`7lW)D5$%6gPhu_=&yo-*1-rDRCB zrV`76NU`S!>;_q?!#40{i824;((=4O0=8SZLCCNmMeM zO5urT$R{c9GF9R}j`X0&p=fsKJh10@Oe`m1lePz8lU~W~H86*wY+A^WX{AkQ12Ck~ zJ+Yd9Hm6m4pH&fG&&1d2u_&%h@1$9vop)jlw3}GYtR`)btR`jA(yt{@O^9OX+Xa~=pJUOu(RZZHSRGpNk z*Qq5?pHp2flaN5n3pisKT_z!&Q6CBnsl3@|vO1b1z2S+oXFqX1vCQpB+qpd{&h1HY zZruvkWwFX32b)J$Z=}&2(Fie;uBmTaDPy6ae)3M*PF^Y1_oO&^)dau{dw<1vyv)xL zWr2MmCKM&Cr>3tVV;Wl-lP&AFb<%Gs=Xbn)`gABdEL$@kT?S*l!Ux<%i?M4`cR*%Y_;~s+;&Y~krQy!D2U?6Q z`qZecJ~b-pQ=_6jRbCo2Qd(1z##3R_g?Ixa!0D32D|sOQK=3_D5!*0MmX`S4kwqCA zwN-{jMP+DIP=@TsLnY}mY$$z(R_QacXiuZI+S910J&g+5lWWb;D-k$orp|f;t2#Tf zXiuZI+EXb(e^k((>?Mdw1U5{K^X#c{ww(LcDfgv}`%!@lyY|8hjBtH+E01s1akyF% zKg4vIRYsO&UDp1$isdxS$M@{{__lQX*4g;Oq7gnSaAIQ|40fyS6@9!F;*HI08Cp#0 zVOx`WSTw1J1(UiajUK$dXq6zizo56lOBrtGH8dqXFePp4yrGHiNfSN8lvhMt{aDtY z9}U~a=njiQc-R}6V_6#`Esy2Tl0?$oFcrYFrveNuqIB3+l$MH23=5*v9+p~~Sf}AC zaki|IezP)rqJ7zSDgw67SCc} zpQ?NjSx!lcl9=&%O4u(UO5>QL1T*#!r-6-zdO_a0NJXhe#jqgA_dRm!kDF;K{jpV3 zv6ZA~U6GdrAigUg3zxS49JuV0=T~#hX{uhGe)G`2NyzCbZAi+8#xZmghKzs>bJGkm}p&M zVo)9jr*<6l&ZQBD8uQ9;LayGO%jp;2Ha}by2gV!-SysPY}1|Q@2j1_DZo# zgB{~>76f|wmD>UC`G$&^FJl}$!y%4*lA<#)E{gnSDq!F4DfMiDOm~Ef|$cmqzk)SC>ue<;zYVgjTF%SsF_;SA6X4o&lVNswT_DNN>Nds z85QMp`&R2*-Hvgbt0bpTIKt5(ZULPW#>EJY#@=`~7|GFScmmlk##C(2eCm4*x0JVS zOV#VxUhCK_uN0f*nXy^hhPt$+yoT$^+qRzSwOsFGW3!wRp#zgpr?jo)_1)5QE2L%N z8a~k0WniJ9{etu`LJ8vt$*c5Wgc_#X_U-AmUNNYvFhVVrXs_q?OQYi%qf-;}eo3p*{E0e#e>$f;g)8jZ_Y;fEc!f7HmG>PW3O@!%46g&Xc)+n z`W8R3XN#TkTEt1gX2RB=P=Y83$;F zsXR`@D;_5#T~fwC`ol;Jn^`pO&}z|mmH;lVZ2*_oD=DxOa~P`rYGK)}aVmIzN9pJ$=Vs6whtw@ptVWe_PS5)-|_E zCAYkusj}Jgc1m)yq5s^qhho_(Y_%@1RjRM$^-NU_vhnNDu&G6@wW5+zpEXVgl!zM6W%FBLvQk;Fzu+=GQU8bm1rKn$=lz|nE`blYBIH*)N zs9&5EI~w(q(!N|zc{H4T(5Sz@hSPJ4B~^;UVZ+0* z*>z59yUr=ub&g@zITIP+YeA)czc{Up8mDB`IEGQP1C{#eaaya~PEqA{43&F3CiN<> z(@y18ehIgzxj4DrD{win;!>};I&BqKr>M9(x#B9&7+KM%S6rR8ifgI|o3+7FF-J*ahUrc!ApC)a}n8a8XfRv)Qld8BNe4vM&V`{82aBkkEp5sm(S zXw*xZ)}@6?m4%#K(rib=#>ze>15YWu>Q zP6>N+16S%mM5}w5`}gkZwTc&H^4|9cf`T~umcxO;(+%N=C|+?C&(wv(R+8#C!ML?j zGcGDMDW*dPr?tMJq;vj5_e&XFHBWa9LHM#Vk(6c-SbcQO13-zEd-4@}Od!MCHgG z8@_dl(YUQ*G%hMe5O|i2Pe(K112&$ zpjefeMq87mA+sBrp9#^VxV9AaDI)JG)>ji4jU!U zOok_xYkh-N5>j6*9nFb+6+;NAcqNU_Hhea+xz92%*N2BnNiR~h*vBkz2 zx3zJ`MH^>avT>?|2^GhMAQhSrhOo*j%okam7Aaq6G$at{OmG0n;+b@Y!Dz+_hF)!L zjC2*9vDa~Q9mg;iIS(p_yKWtui31jn*j4O3Y z!;*=pIOT%&EPeR?gmp3RE@BlfA%{s2-mIX<#8%~4VOdXk+Yk%+s#74{E7~)TwPvTH zkrT%A&?PD(ekaW;k4$WZM-+lqs@qTaq)fDB!iyCGR*A|a$04{E3h`X(niQx3gMGfj zVYm^CMBWTGX_oLefqcJjzL<|3tK;kEXBV%Y_m;t@=)-XwXEYeV|BmC7|96M|{x|NR z?+!+Nr$2PQaooP+jK4w7r$DCsSuu{&Z=8?rt4!P<j8Hz5SmWsiVSho%TA(MS|94Mt2Xrm3OcLyX9UT09H6>|8IAN#g?r-0@aJ6yQxr3$`27f#__<*iS z5;Mx&5B( zc!{GG4v+s|c;iOA@#ntt0^T`x-0qu%L|rlc$A@S}Q^tD-U35bTkonV(^q$%vA0Bkk zd5+QrWqzCndFw#_(3{VX`8#%X`@@g7JQXjAE)hmQ0qbqTq$Bch>@VV&k;8*-w|j6F zhUl8k7n}*DiKJ^1pf0*CE^QV5`UUa!eLjl+FG#rTD&zRkg}_$+?>e4W;s0KLJp9W4 zKgUP#Fd0cJI7{~(EP;aqV_j2*l9VoSO2Z8>;Xp89P?C)0f8>T;xMnbD%_3_SuBDxNbkC4 zioh~qZwm^*OFiA>a!I@Z$nZFeon<&8c^v@o1;%sgOR1no<^%dW5#0TDlL+pvM^F4E z{lq4(uQK^=K?WRrK)3%u9}wfI;P@ZVUFYrXdFKv&KsSV=?D9@@OPA!|aYO`U!#K-t z_e39*Gg1Kg^*4Y3_keB?jyARS9779|LWY|#=fuNwgD59U)W%qjy0M=E|BvRls z@O{DjDqxvS7{d*w-RB> z?opU`)qov8F%UkiAC(?lj`snDl)(b}snhM^6<>6YI#C>v&Oh~vGzL=i2781?1mScJ z+mrRgqGdE7`E8Tk?uwDL8(@yR0Zn1B@`O^3!dO=9l3P)NFATBig4LV|R!1?U5s z#<7^pyBQ7{5tu($p0`yLRi`jt+B8y^=LOa-)^+;~(%(0TL~EMH5pbzBPO0dVsXO-a z?qJVZ!M~Ifkj(=Oyih-Kfa-c*5=c-FGz`T$lLje|m18ZNCgs60$ka-gW~p-Um9B2Q zDgBpl0Z^##64WfWo`5;!w*CDkk(@-z0ip8C{esa8%2Ar@&C?B(3s9x6u#i3AExoz< zLF^iP&pnycF1fS8P=T9X;|GACq3sFj8D?ZOsDURRbV(%M49cK;=*I<#&@|=?W8$#9 zm-Pt7IaLS=L}dA|Bqcr(wgj=Tt|DqT^3<}5+Vl66!FEySnrh<3FXa)q)s_+>?-Mx4 zqF`Z7iQI@0&v+I=cQp7pW%zCjbM4V+o)X6P*o!zqsF7s7eH!4B9rW>Kqo4sVk z@S1n>5U2MvnqSbgILOBxQ@9G4swD#E1`z;iPsRy}NT70YOoqlmv$~w2DCRORNv;Z< zB=Tjg;i&z*j8_p)@IvoWFrW-hAkW`liB={x5#ekR$CXXlLg;0na*4;&cqJA#{H(63 z&5D;$zJTp}6$g7t!y3FB@$?MCT@2lT-j1DTJ(YR63HgyYdDd4$KAyd|Cl^oBc*!vh zA7QCvpp2!G=|^Eam#Q^eP^jAv+I<+`)8@-WcT~|{GIb?GrCwR71=eKE8SuBSIRkpT zHJ9~NUUMeoM_O}PUk%q>_Fls^*Mmh-##^kl1oH)x3uF!{jG`OK>@0xpX^lt}px$1; z6o6hri~QAf679X@ONL3d;NM-n&Sc3KrTAx|b=`Fm9hS)MNd&*AAt|oNj@kj8Qz1={ zI{MhQbJ{sxC(*Hfx062-#&GAfBVd8a0Fp?*&*j4m46OJoWpiUy{+0fl$OsKRY;tA6 z*|5||vdSE?aDo66*pv=Y2Q(+!(ibJMC z7$VWDqE~cvqm%=`rjRw0e%U9y&LwPRt< z&ZBM;2i+(R$ng{1R~JV?7e}0S^)HG^hY5|yB`ihD>XJ>iF0LF%FIk1*RUA^kWE)@3 zUdQ}OntGKnKa*X^9U&l~M1d$lPt8*=1Nwa7r(%T6Qx`&Ye$|0Y;n5Fm_x zh*SD+@op$gD0HS?RB&=Lb?YKA-9Yw*QUca)v6$v<{fa4f(_qyY!1w65uCwYI8uZ+r zqnFTZGQ#c*Pfz-zAiyWH6XN)NXXs2Zo{|1=-1l8?+8;W7?4LOP!0nUClmvZu?9L`9 zqe*o^SFzITNLwOXmy&AqlpXF^PXEi|t!Z+Kilp%pT;CzhSz?AI-oE-NML zbd&46#*x82*<{D}N*H}BL42!l>J@QS>QgU|zOFmII5VCK`!O)Qo4QJVE!Y5aTmvtE z3mQOZYQ#(D7AiZ7123S7a&nxSP(9sj#m+!0KL6=mPM}`@*U3j?V?>iHYB=P{1=Fem?Wb# z#KLZsIuDaWt!A=w`jdRvIqg6_(#}x_7GLMI<92@g=TV0docasGvU$)>J1`Rqw%V}dZ8mi zc#Jyd;fisReos@zJBZG}pYu99{6L@&z&0v0{gLv;53*(5TSBNwOr%&-hWtw!-7~wg zajX;#nHDVzb18R*-I1K%snp1SydybwRqN}r;n;$Pu(YL?;ih9?o zxIV;V{`T9q=sa%#9}=yi7e-Rf5Ngw zpz%oYS)F+crl@#8bH<}p(fklaFwN;k8z?<=l|_qbmL^dY{7UpU5928gd$Uy-3Z{@5 zK3l{ji8xIO+(vpP6<=5is!&%KYs7xAn2;@yF3Qh6ybgs zFz7x|zJNcwSmJ$rm{F>kR?Rs7n5RsbE%TBNn|LK_Q)k?k$LP+&ChxK?EACJ=S7%`u zKWJw#_{_WfG?xN8GYAbwtKaUxIj5H6}aV z33H zGh<*Rch>PIaCuam@*^1)1ipE=s$Q&8d1o#&->yMG%D(UEdlI~&K@bwb-C2!koT&w| z*3)s6@n^IY@2XepyJ+O!$kt35)~t$X9$x4#FpauX%&0Ge3qb{rXA(R0f;vj)DJC;| zZ$1$+3^-weeWJOln4l%*)Q2dub5NNX=*-z{=i_cdgM`N$}%6!6vK)hiIm zk}bk24}@YJ#T*G?sIzYV_8oG2?x5@J(~*uVvq>DSImnf-w>GrSN*O3_NSQoWZqO?v zpYGi&wBEZ{^(8Npy+zqF+sb%09YCLTk})ZjE5%I13X-HIRUE9oxEcnn+V0Dnm-TE$ zE3q2tADGEhNZzH%7S0o-F0`5n9d^fzRyvZ&ADbFE^GaxT@U~QuWjieps{tGtnj_#GN8u)a3~%A|o&-X2s?KZB=V5h8 zIZ2l^k_$9W1Cs8}AyL=iZ6!;khvZFkcu2a6j^OeD zS?3^YaRlk7(OhUuR7^M5{lJowJ%@Bg{Ec6ZmHO?jq8H~a_2i0mSUR`U*KJxfZT;A| zI;47Ts~YuIX`LIwFM2j%FX2eq3DP$MI-=N=ip{>get9FBt{5=_HU$9}&*UKJpwg{} z&UwVD{m8ih$a>&>7Czt&tDLQtLR-tmS`l`GQ)d0*t`4i6R8E&+`Eq@_JamSEH}D)1 zjD0s4cry~XC&4su-SK!j9ua>!n)%*%*H}SI++go!|B8yoJ>7uKdkijFC5eC+WcnY zk5fYSj0DMo_l=%a5QGg|om*SRwHhMKY@mBmioJ?UN^<9#;NZuUa`GnfrEl#lZ<%?0 z^CU$Xbl#IXuhdCnwL?Msm%?%x2P9LlRiL;Wu1&m3vs-CY!g2b)nr&zK_Hm9?SJmCr zr!8I4KRdLJ#rAj`VcisCZm!;)XU*zCwqWGuY=TN?1FiDd&O=O>br#O$3_QvYI8tRn zpvqW;^ot1YZ$HWnAmzQ!o(u8{-UvhN)gUyBQ=e3fXDJxqnGW58Dyje-y8Th;pOH+R z0%cntCZyUVvvg=Rn8j3uS$xp$S%L%MNYB z5cX2IZb@l-qJ8 zr!;DjB3au*{dVa1fUNi82HCJkd>&`wY#7-l zAt39=m;|#2i(~8eNl~rE)UsSY_bRF5iu&NI#1sLAMl3Pwgb{vaTykRxErA0^&`ix6 zab&2Kzla|qc{K;z_FLPP)V%gy{5R12Gwy*Lzigo@96rg0sOj#@-WLYKU&8h<(D~%M z#OSNIS+WK4X|~LYrH`Z;tXTSo)DF}L*o2cJ>oNAD?rE#0Q0(uMFLY^>HZm<$!L51= zq6n|2dSVBU(1xYCx-j+{=0{_4|npHnzYi z`1I?~kg{AP?ZDBU@EF0XStahmZ9nXz_#5;U(6p*RNNjsc63|ucIf0IAQ!RLmIp1>vf~x9U+UCeK%R_|3$ZF8X8 zB1Tk6k76dX99V#B6uSX$wY*csl5h+{wThxvt~Sc4L)A*`+jwoxLrU=3Jg$>9)wvf++ID zOfF#NU2VnHW?d_F%Q%4->Dk`uB#PehE&rOzye`q9c>38aS zWu=4D@)a8Jd`5}9U4$S>gk9&8P-SwbSLNL6zWslsXMtO^hF#7OvBRo z_=;VZpw`h*4le23o?nUa%WnCX!w1cve0mgf<-N^L>ML`TEnwRSU6TOQeHLd1>2X(Q z2DY+1^A7h~pE;%WLHN8YH1GD2muPX!9&L@5!Pb)UNmi+1uC^h%QIB`5PzB|2*QWwn zS)IDGz1Aix5KsfWkqyyg>YyC81;uN4whcM9 zg4b;M1lePCMp{LrhiK%7D_w{HPvbRFM{0p)$JqC?)6bLybek$h*>R8_RW(PkP4 z8`-&@MdMgs)ux}(P{~kT&#^SCS8p#bl;iB}tFxQGcTW3-nYmJF{%;vc(d7ktDqc85 zBwBaZI7PaEOSma?Qt$7BsF16au4zc-+k2+Lgg(vCW2jY+Y5s>LdgI*EQi$X?Uu zz}Ioizt5cB`rZxj55A7Uk0^g@;tQ-vTGypV_9_pRm6+S%a?aX)TyZE}M8!n((-wy+ zbh1k`t}^~?Fw3B5@;zSCkk*tk5sE5J&`dvvt(70`%k-8k5Bc(HJvb8oj;x(*>J+sb zsD*IDv43CDQfQ*oGNT`({Smr?oRf}Y3sV67$mwF%Ig=Lx?X@p% z%=$evn#Ji-ioD9skU-mRiv{P&wrv5>+b&*Ns%Q(yC=SS#rJhkCAV#;7Az7MNyo_=1 z42L-KNeTktwQi@UKqcLOY#qd`T&aKu8S#RM!>zR0>NMTzfr(^k?yWEy7S#c`J1Xi} z3+gB&Yz1}XO0-tfv6B$<*azed<{^x8S^G;s)optEmU&YJxD##fj^zJ0;*Z<&t2>zP zySEotcReI6eer{``4jvQA&hR%uL_0r=7i@v6)K^M{qy$vB|L?FZ5%3XBZ}j6PWY~s zo0s)7+LxRw($QaF^)LXlG+s*mIWLr1mI6(E<(YQwWo zI{v;(05D7f)aOz9l^CKxF&wR(<>~7g{{t6>ZB-P{OY0e+!O3^n4XA!ovK70D!R|c^VfiCW@%77msEP+s_nHC9@6OWs z;44FUp{sZ0V`&5p$%~ug0Hv!)R<%@+3b(6B2r$jPd5V2i zL7!zi8xOlUp~phlhcOPinT3Cx#6frM9zV&7bshe*g42>PhUdfbhG{veqyD zY)HkS5~np6uWJ1c%cO|B<;NB;0*G*FS`Jm6PV+d4!+5^ANrX{+o)t{0qNgu>v%S&g z);B$NFl2JvH25w9_}#pQlRi-Ayf%Ql@z%P%{qN$&Qa6cw@+x@*`wK(@3Kw#$eZ8HYNA~8RXL58O%-`_ryCHo{(VVjVII5>|{0`%}&T{FmtDa@nG8T_opY$a7>(uJH^g)K!&qX ze=?cu#7v%o9GrzAx~B65XXskqFcP3Hh}+wAMb3dBke*ClG z&eT8VDP3=RK4TrQLB8v7@}3{V_mqU+br|1-ge?f+9d!J+gM%kep!RDQ_Okf; literal 0 HcmV?d00001 diff --git a/incubator/kutt/0.0.1/charts/postgresql-7.0.6.tgz b/incubator/kutt/0.0.1/charts/postgresql-7.0.6.tgz new file mode 100644 index 0000000000000000000000000000000000000000..f68cadfef94c4ec556ebcf4aed55817f2ad7d47f GIT binary patch literal 81737 zcmY(qWmFtN*DZ_$2^xaC``}Ip4#C}B2bbXPmf$+LyGw8z+#$HT1$USEcrl3M`X{v$9Q(j`rDupo$BswhQP*Nngq>IpL zUZd@rNk@OtU`t2YlF6K=m%uNg5($qG@{kJ153Pjv5UMDu&@X9p{y`B^O3#=9x(5Z9 z9LSUeubgt5j`@lQl}FN3Zwef%#TYe^@4Hj(r7YcYj3 zv{`^N5iy-$;5PH)8Z1->_3||;nmG@Cyr@X)IjDcFAC>?6LCTDYinyLIMgltxB0p` zXE4VvF?LS!rxS*0`~k2<4@E=6q)!b%2=P?MiW4E>sSuTvej`MDp!a=q=#Uvu`5kEd z2f6q2Kz+RpJ^Qq|l#4ouQ@f--L{0QpAeKBA+nic5o7fL6V&%^=U&WC);)>H~RH&qt z_cu~o0l63rZarvWcn{=9ly@-k`jzJ<0&%r4uGnJxhs4GV>3&YTkaT_yoDFEGHP-iE zL4S`QHL2L%FZN9pk5bR7qi(PIQQ(_EKLlH?h@t!scuTTPGn(7CEN=%R6<~4Ld4AWC z5MKnHeCm4p-Uua5f&n-}DOUoy6yyD7#*oIxXP7n@Q~7Z)OhB(x|7Du4Q4*eus*+4U z2ubuW(VbWEp=978FCaqO_tUel<0Qowc|0uv7`8aP%fpLOQ(f>b9m^+9Bd|%=?z%!6 zp)WdMv^blv9?=6Dk&>Wpdi*oKMUH9w{-%es15h;>4onCg8R`ZGY4l@lhZ8HmF zS5ElEc!}T*q}ck5MG8K^IIOrjgPA#(!l)9qVk3I}@!E z8$RPi&yWncW|i3HH1v)ttic}CMpS9ml?s-f1|ZW_!!MaGBI8BSxZw$nJ#Ok(lck8g zU+8xsrXrh?zb3nt++wD--lnf8L>2IHazlW?@l$b7@Aq+O3#G&H{Ef;it>;tqf9xyhj* zh|+dx^Z4t1i>Q}LlzAF-cu!lM0nb$f^xJfPah~6^y-g*QeP@5V!e`;Kn0TnX33?x2 z>%5fM8h|sdaX;g0pkH+_{oZM$x|xTuo2e_=>pThYhRQFFPzth6I<5 z&DwWwJP-$MHnR+3TNf{Ou5JY`i+@@uC{D5%WD;jXoZ8&|-rx65$&QSNr48ys`%~V zyPTkX^Vjga-)e!7^WBEMV6jfd)ke1-LI2H~vdxV82p!J+c4zm$KB@PrOlck)>gD8b z^mn^GO*?9GU=g|3RR^-%>c+!I%x54s9Qz}RUzVq`z=4!V06>*<%R~?~k}P+;<|7uSo>NA93e8U<*y9;ayVV z=}1!aIX)g*c)!#zEBbpjJUn04JXj$k4f$LDX>Rb1g22xXA9pxXD2YBs%xZXB(?$-}O<^o(o2hz5F%#<$8)aL*& z=3mI$gMp6f&$K||;`xcOcfR?0*wrZT`7C?ypShDcoT9z0sWMaN2YL@8^rs_06dK;m z!*|HNv;f8P+q+6Ypa`WiduB#UjzEFqPt4kJ^1()8TxJV5n(;KW-Vs*j`UYetwUenA zo^cYz{4D+2U^gTZ-8K5vhgKn93*1Z6zBDU#AX~-zHT`Ych#2pTab|7$#cpqo>Y5@{ zJ-lT($k%&HmUo^Txhcs{=l1^;m?#WD~3yk=f_r(BnI-@7jc88Rc{VsW>#R6>GC<=<6K9+DGr)f zEO?+FO@siQAjq+o2qB7i3ThV5VEO#f`wMHh+0*mHau|77&76P8Wnyew4Afu_)SkO2}Oyuo*3u8i!g-8@1i|Wq{eF#HNR~0leXX7|VwT+xMR$;z;pC{A{FSe*_IZu3WK%1KMEHc`I+nOIY z3LK-rxlj0k-rt-O3-NA!I2hQz8j0+gTd^ig-X+b0fuQ%40|p_!J|ux}pIwK>uLgzi zdSW{bE)YgbYD+x-_U<~m`@I@V`JaCGxor94WJFpd83hwW8#gxX?vE#X_zSO(Sfs%)_^%Li<`?6KOk< zFov-y;@TsGb#MdqWIv6d;Yo>75pQ|f`^!M~;W{8viv)M1M=Oc6jVIL)len&o^YzIL zW{j@!OxmETBv93wUT2~BCjwg<7*vhO0JVq!7Yt|vT<9|DAZu);lcU!TNV(p+zuq*& zi?X#4V%Z7dUG!h-?cEapq~t&YQ@TiMT)X`*RHxBHIn+ZL_o~QpExT^oCMtz{hP#0wvw=ZenrjD=L4(IT;Xme9kf8-&&tCG}%n)n0+TY+b z9Ug2_EEfDp0yk0J#(_d#Z7P4fC~`Ql5_jrM@h53^7V&u}zt;^66&Rx|0kW+1olaR8N* zrKKnt54pM%-R#YtF)kmSS0E8idd!QK4LO3nOnfyL!THZ8>yP44q9iX-mc-yDW(0|; zF=(!oVD^AtM2=#7Tk=kS%lDKVV(1ftb;uByXc4GBjG4KNg?*Cul`%tTLfl{g&M?uB*Gokeode^myD0?vYbbR>WgC-FLyI>7f`9miqhFqmy+higg zmVMqvH8Oezu@8FU^XRSFz*3>^ zsiEDG?TVt6c10D1nQE_arc~6{%zS=ffLqcO@x%w2Y+B>Tg*g*0b2h7Q8x&!lCnG!7 zBn)-d@@*u-tEfBdG2Ak^i`F_CmES#`$lD`=%w?ajZ z${4`6ToFuFDggf)m5gz<#MT%U=j2hch3Xm}WFE%s+dc(piWWfvo2KU~4Cup4H zq7IbwRr`c$<@qpPxn!P7**yk<4_ko~G)b~F6QA0Ns90v9Q|6yNDHQEbrRGk(rftU06jRxeT7Rk=719R$zMcAXX4CUSgj%4!?{R; z3qIZE>~sOK?4x73t-1jyO8U~Xs za#)(XGUIPKyj9_Hixi-A z7@+>DkO()soHFWgOlbU(PuKr{AJ|?_U8<$Z2#ZLZFk0uyKoN*t+PBy%B2CzZ>5e2-u zmilpsx-_&#vPva^qAL>&^ewc;SH3M^Lsk&axLYBTWrBimA{LZ<{^9;#v+m6@Wbh5x zS3{c^Os{kxuu&hbKZsFGBSMO!R=#$!3>VuA(~{c=8IZyzq0YLbqX!p=Pmbh*3tZ&- z5Fa_&X~C)TzDBk2xU7y%v4I#$iMSDweL$UfInMflG1bTTz;Bzm!iG?)E2X#u)fYmIepUIvsjn1> zIIjmk3eT%pZUi{`WGW3EMa|0+?E2WdZp`72VT&BKYBs)fjwfe3W@107$i%Zo5O)%4 zsfJXEbd#Wv3c@ln2)c%`>3E+;z*E03M(RvZ_=k;~tC{elX8*kBm|RJ9_{Lp<`*Hs# zwo}#73Ui_ew9|lBBg*5eQTxGoZai*4%k!f-4Ik?xHib`+@gkrlnx^Sn^{Fm4Mb%L~ z^NB7r#ek={&Us|UrfvKhow6?`_o5jUs?u>uB4NIpC#Lm~dg)hp(c~5=^&Nq7+w+oH z1gU+eID&i`E6nnK_0oD^hsy`vO4J(GBgRb6p(nz9>X9fsa=|S~@;eHaUvYD#Gk+xR z=ar9zDbA$JyCpRB_y$)vlAVXZ{)9&B_axH#k}*1=Q+|?-3^)k4>dx3Uv{IErsqXdV z5-T5l)(?1LEjxF=8nbshWnu2loAu0Xz6T6#dEw#svn>lG?SF<|&N=~?n5InV&i!;+ z_-;gr!@6jed2Qkk0UYUy2^CUNmqxd41B?dlW&;BE+tI3>9TN^e*FIrGUoBEEK*NO* z?}L9ZYs%(n&?q{HU@5K2^Q&AJq1_(}`xwD6_Yx5ET zkJGg>)3q-3p;3Ab^p3{sH&XOuX;8HoNd(<6CS3o$s47!XpQ_Mc;i9CM@rpsxV8L5B ze&Uwg>ZC&}*LloUKqghIy%c#0RqVmh=(H*hl&(4Unr}mN)xpgRa>W>}i9~X%KDSRO zOAwiFLvYo3$PIEuSE(@n>*Ln#-CsBGx$Rg&jj2PaBovoH%Omf#x8hZ9fE##RuAo`f zV$FOt#;;$yBN~Z~dz?7)Jqk-%?MlDVQZx%kzSL+sq)^Al0rpAFwQW>3ir@2>av%tA zTd(A2SxLv>Sb2~nml(>}BXfWx;{Fq}{sJzZmv^6>KAelS!IjcXEKFvwQ5PX~1NIQ5 z3(=H9JVLMTq8!T20Z1j3pFc1r=$B^AbfS5o4tH_H!YL>GG+u$y?d0wy@G0lqBE!0r7f>vmO14{ISSrFaCw5Q zXrQ5s8kZL1RKjJf1C3UR6)P+4+HXl0m(Q(dYerRiSQ=HIziGb)VH~aCrtq{z2BL%MLS_JNxOiubSSq zL3~5ZLlD+LKh`QANIV!h9xz?e5;fxB4mhE=C@m~`)dpo(TT<7sY|eglx8FA5urDdc zG*2JQaXtE^ck!wGT>R>J-;Dt0<-!$ zs-mtO_#Q7#GQo|3ShgfCwZx2#c)Z2EJ$GC#uC!sNQu;{{S@c`f&fR;*W*tf|{m0jC ze30@5Q`RT8a2ua12(!k^ueM*E78nH2-54b!o!ryDXG|+i50@}X*%8DVFaCw|5?DR( zX3o}&ycChH%h0X4{Nr=sN6#vn(&FEYHul0 zrLC&j#`?{8uPfCzz%Gq5Ci}z2cPIutF7tW~nWrQL znUgWLeN2pB!))aefGs_#Qbj1xH5%2SCm@$!folGHK|$<-FUB2KG$(zeOgKj}@iw$4 zY!r!+7DMg)=wn6XWvtSJJm%eIRCZ(b6uJ$>MIGALq}B;|pP^a>n^3OGC-`fQl-d4F z7C5D%RUs>ReYVC3jxQs16-75ov<4SPSrkvng98sG$i_HSmTT&{)UIn)yB$TkrHs3s zK>61`93z9GuZ;;0PHVsUdEa^O2%IFwV!B~A3~PePkVFq?btNiRX_AQ<5VLRCOY%-X^<7ThuJ4CYXq{l5o;M}oF?_6*Js^uK|dlY7! z;uqtb#|1mBHM>}R$A`&=^j(oA!Z8M`ZsSt_gmA-kKB#EctH`J|!LSNUAXRp%&x4W( zRyY2dIgf4Wy>Vc`bgHHsWYI0*?Xr_ zV>lP{01%MrB!*8#Y~Pd@Rbh|6{~v;4dH}#N$o~*uTE6KQxMJgm^?!`bG<&A)EnW2CTT)O^zBwJu zP0lw*7D5w&0S4>!Lx3og((+PqVrdzMw6J4CY{i~$N};=LQpJc93kh<|pW)esofv|{ z5<5TL*k=ZPV|!9mOc*767G!(yO~J27r`^U$RzF>K%+u(oTFBL9@Y8j?v%_wnR0kCPO*APJE8p)AbmpEcs(=u70@=|GL`Sw&)1Cz zJe}C^#S%@lR?FpY79W?$ zUF)AUo!DF!I0Dvu~Uzi30HrakRhm5Tn8Z4!)B(+xDEP%P)?v8RQ{(Q>&xU zmW?@52&DVy7uSZ#)g)$4tnm@mV!1d*|B?^4^Rl<1Lbvw7hL)+O*pkaEsn|)4Ehr=H z_wqmAFbMpN3OI18YOFr{i)^2WI}PYm)9ZSbh$}bppP^sM!TR))xNqd&;sX4>eDRK! zNh8hw5?*ZjLJqsOCDQ`Oet7WJ6E*Sm!{>=|u z%4NPLmU@+VRbR_qCdheHMaI+`?APcjB+38iEo|zYv&_;J+K7nZ*zt4a4S0!OCW~Om zkc%z-GH1*8%j1vEa)2_SMzM^IeU7@Z^k(q)F&OVI^g-yxuRmK2#0zZIYEGZH#$h97 z1OhUDHMkUT3?UBV@kNK07XEI?+>KntnTq5EQBKuq0fp1GH4D|XG*w(x*1eyR1aKQ00n3Yu^>;H2g42y{Y4ET~y4p8t9& z`pTJJdn+!m`J;GuZBm<8O53JMIb5x1f%PBl0dk-p{FR2*el*YcmymMyPx0lZyoIxD zL@JIb;Q-RUKne0>Y|E;Abn|odnIk+@dR|Gfl-OzTptkoD3iPb|^51L*NA)390g`$$ zxhtzMXX{_=#`H;ShX>uSIeuD%GoeRxXwjgBk?Po&Zz8 zh4M??7kQU@KY@?1rk01bv2TwGyz zevuHEklbpwmdvX1)`r0%p=A=CRW|$-mn%p25bzN!W}8}Bd5afO7Gv& z?^23ID8HMMhJ_hcR4DrU%T1^gtWs6KXzXKAVUt+S48Y1SOuff-An>QiP4p?$ZkO3> zx#n<{@$!qe5fM|IFuNxR@z0g^O>AkJ*So1~)6?n;?3=BtDqLq@xAg6=Di!vw%C&i9 zTtVTcQESCADd_j&_%DQ3VfRm-j5W*)R(@LO|LYtrf^AIwpBL?)rW7_dZBXEx61;Rc zAwf_1Dm0%VHnF|kr>kcSE(5~~G@ctOF*OXS07ixKZD!i}%V%k>OrbLPyWeB-ApT05 z==@!mDhggS%}lF4{mDPucN})S{>4n^%-WH>&48}vx1H;V7sy6d7xeb{p@j`atV7WG z(}=o^S3@OH22?k|Pwz(Ay&>KMInW3hkywQ1Qv9Z(JK?X1F{xVCG) zX3zWNLd!4@a8uS?xCkoHM7ey4@tNW`{M^{oCl~lc&)*kGb0jHOdBL(PEtrDsni-M- zWLDRoBwj-Xo*O(4I!_725~fKUYVLMpBJZtJeKX0kV@oWySi4Pc6+1*xGl_C~3~vVu zaVlxxj(NbnV-uz9WEdlJ$qi}Y-*iNOJ$Pzh9RR|NT_2v(NVX z^^9xfePRDj&bv+-Z7J0kW^t~r$}Bt!0T{9Yh!~oBKcd#$Xy{z@Q6wX=Tzdm@H z{y0^%*4G|E5Jkk6-hqUFseUJAkb1{VU`@ahHOqhfOi?LwoCCGSO(~J1jW@leSnI4? zk@X@Y7z-90qG{lK-V1T~9{vmGCY+hWb6jcoiv6VRB0VQ>Af17F-AGMUQ&V`CP7-!9+M?JMa zDh$K5O3+n+=dS7S$4KtOx;w6O+ed27RiP{kEQ*Xb($kqnDhXYnx>fR%>NSPvfjiP; zTeIhiQOEQ9c7Fz+##&au3V8!qhz4LJPh$jHN16C_7`m;(MI%0|&i)l}!y+uGsH3}nZlb1HW!DrgEH?*-)+nt*PL!{Lq2lU!T;%VM;_ zMeo?gT}Hg`Bpx@0+B8_>O`s`t4D(oMD!e z|L87@-6zXegpAN47x2F;cF=VikY>_wm{eaiYO~lb@*n3sM)44$;3|K?9FT`WdhhumJ$5yB z^6=96eF)m(-s5ZNR#YgU1&H%6IPxGlLl{qvuD6=_JM2-#Db7;j!k!aO%w}TWB5+c z25LL7=V2?X$UT|L{LtQnfJXH@>en1)AuB5=-i;BBpsX zo2zZ+HCrC#s&TNvMI&hEQoHTT_G@bP7|X=2O^jLgs&uBNw3&NH%Sed;r`2$mqF);O z@u1L5ggfn~*{B>!lIUQkN+x%jBxY?qi~SmK9SI%WrrnL=h;^a-@t7#9>y-_31zKn-rc*OJtiGUxqYrgovHxX(+ zDc(-u!B0F!^KL{?E(BNn$$43Yv-$8hmAL&Wjp)bDqQ1*%Kr}1rp`u62 zEPR#8A_*q~t#xu;T76lTeo)zT*K4r(_H+Gb(K5DYU03G5v`EaK@=!;dC~fVt$bvP- zWW^)eI28?bL1)~t1#@VJO5a~DtdxvU(Q)^}58ycuNyWB;Y%5E)MJsL$3_n5BcP{0@Wu(CEE6GX||q|jCB1%*bJ;bpG} zS36V<;zxzAV2?=1i#zdGz#R1=#YEjvHrGY&hA~WLs+Otqc&X#}>`8DNK%x3U$bv~O zSa2{uj*t_$?Wr){8^KQ=nV~Rd@R9T0y4`!-8Cc$aVnLWnd3rnJVU>dSu$OQarnK(I zyMNepm$7LR5E7_RUNj$u@gtm*(eK#00cT9w_;|mLbzIMO-rPLUS|9|o`dv&jx_J*u z1~WG0+wobr-Z$o~gXUYgc(g;9+%MT8d@MHP??=#f2f%zKu>SCh;6n+Mb=yd|S4Dol zD~7%v%LCr4X2>!$?4?A~qE$T%@btfE+$?y2 znf)Ib%)P}$zVy-lxQb+Pmkv4K=t5``aCbQ7Z*z0dFl7*RmI(H7!X%d1G&Kc1r5JUa zt<>=_kv1iq3=RcB(ZX=>pI{vku)n0N(E&Z7rEoz2B zE1q*hcr_UxSPZQ-`?VEKg@HN<;Af)kxX)ZpI{P-4ZBScw@i!tAb_|b7V|nxn@9NJg z;jo7wwV#{0v_Rh-;)I-z2|1JCNzU4{|5L;f&T6Rv#Plr;Llym6OsqU$+Xkz{@Gx4b-JE`*j0H z+!}k6aUA;uC%eFX(ooEc1CS$d{O%FgTkSIcnmR>S|J-oAZ**6kTITyh-jtl5uUSXi zjiiso*cF{Sh&u95R^xAW2e_KsS2fo;+0&< zQ2PqLpRMOag+)^`vi380tI_3ia9rx~K8G9@6P+=6a~#guO}@0Imdoa@ngw*uM)Rse zmAA|u=HDiLer7%jp>kitz9qT95%g{0cldE2`6 z-}9+0uoVq_o_1~=4x)^196N&m5Nm6%`7ybc$r);-iEN5~XOcd%ei&%>Ft(4@9clf8 z)W}AwHrDO<$os=jCcR+#P27$w3)M?KM~=D)sxDw}DW-gaW0=uF*e0w4R-KvmQ5Zhx zN5)@6b0Jx;_PN7>RC#;>3p5T&mdDPynWP9B2>n+~!)+}3&F2!IgR=D#g0FOOlFPey z5(W~}5)Zp1pgXpw%Hv34nq`kA+D+uy=za+`A^*KrtI<=geO-v{SF`If7~Zk*;sU)C z#0@34-TrJ}?#jdkp#jE{TBFuK?^YDC`PB2zB_{Fee|uhdF>acwA#IZ40kuQd zk>BZ+@&XPwCf#VaXJ$SGL+mBXm#U18mcc}BpdEedmlFUY-`cJQNYzsQNFB4%Vy$8 z9r0SWI)bB@xhJx*$^^fSvMcPr#^NZ}Re-i7c@ao7J~{Otmg!XTnIXn3)mfE%EFZ>z%))K^Bj zPO=2;F)?Nr>YTEmJ>ZFYXIIha+HCFdE#vl9+ulKmlqPu*T-S0UNe8G2w zGl+K$gyZxi*zg(hvKb4ZeO(<@%z;=uHq$D;zf3{q8U1qT*|h{3)>GFV&mI6>HmH(j z8%drEuu8|@M}AkH@=vje-1EZ0Y0FfyprUAst|AHdXWsl7&U#S=VVf>vni{U65#qKq zA7q0(F<9>^aaLFM1uJBP=C37fl|78;$1JRVf-lIlzxZHmJYmy1laqwe$WIQWIOXic zXR8Lljez2P&jmp$**Br*A+pt1C->CEB9WdzyF)9k%BDb6?MD*lK})Ogjp>ZF1onHearMYTn`M*!cV?8`;$lb?Z%I)qo9SlRiz*3(xf%=`42 z!@;5arB{ZmB10=>Wj`*R$96x`_Qm;N1n?5sX@hhRk8I^)6J-<^R` z`iSkFv(NhvOot(8sW&dPQTD_*3V4xj!d{;Tcc>iQSf*N~^&JO$(=bCLZw*8~DMWo} zY(^16P#PRb{G^xXoIO##H9K|AE!@pemM$MUzfReF;{=@x@$*ZOQiDkP4X2j5b`u^^ z7KFlce8N}kMLXV~P-5&J81^jq++G-S?hK#b){98pBO@yz8rN1z^$+*}W|EQZBykka zv`&711acV&KdL}tD0%l@DBmgnND0n$npGDAqUZ8rIKmH5&Bwkfc!0wC+jgu_NW)PQ ze6tXV-*uS{Dts_$*s`J#`ePsu+P^;@MV)y)c)#E{aR0^`B0u^Pq_Q^-B_c+hop2s} zvm-}+gxPRy3p4zKshM=@_Ga`+D2SBiO6aOt;`GH|kmA`;)jff4+n?J0@6)fD!r|rZ ztL=>^W5~qDN#DDuJ7$oJBzi+{#gB~9OMg*f&(BZ@LMR;D3rRQVF6QEf6OBej-eO}M zyX5=nZd#c{=YKS#y{a5EFYjq5Ows@XPkf`2SDIUi-FSr5 zu^K9OJk$cB@l8(ne}L=PP@(&n+$S$u%GeiMI0D02RXyE;y1)NeYR9qKUX5I}M_u?d zDE-9rygH@5aP7gR^M@YI^zh5hf#0(xJp_c=#joe5dZg^VspQVH+CQJ3+Fx4soxJ%WJ#~zmUFH~2jTPdZQhV$NX&JZh@`GLPxr|8A8+JgFcGLekBS=8hF zVa@K_m3_jAU}+*sp6AKyM62P#Q?j&hOZWN48}%ZI{57{^V#0fJfBxoCKzcPNd6+6i zy!Y}}YIAnEg^*SIxqyn~hQ?U(icYny*x0=1-k<=PcU?1%kf-PEj=9|#b2;^=?U0Lx zX?kQ|>w|{#{`4e~Jgsj`vFI!goI7FY9m<3E_Ajj*Aef4hq}ewr6a@4bn9R4#9+TOi$+m$qUFc|Y>i;Wv(V7AA#~6e z(QM9#m4?=N622zdY>rz8ukS@sTZ|&wmPM>|U;9DbO!HjB3-)Im#$!J;D zj<+zcj}m(BcO-9;*C1-qoZs+Jj|%v6Cu_;bFt@OGy0~6?(s3??CAfuf9P+%g!e-_{ z$Y$m*ch~tNf^1Hs^h`7KYe=sjM(6~Zu9+rr5l_X$MW$6jJWaXOdWPy8K+5ZcKuG)77+F`d4c44;rK4A+2anFY5|6PL?>tt& z+ce;|=^P9wV>gfZfY5k1QAkG<9;@|D{<%wfm5U^lURQWW-@TG%$4{l6p(C}%7iJ2c zQlaBpQ?L{GyUyy@ZP5Ib^sALSVFA7|V1L@TIN5eRDM0BLJhCPh9 z4ZW$!_)^{JyM4T@tRg3R-^aN+ZE#pC9M{kQv)Sl~|T=jDEXygy|j-sa=` zczxD@e(27U5KWZy+l*vmyFTLCkDXk1(d{2xvlvglASoZB=}h>S9X-u-m6Uo`4xl~f z?yWP~j+el1I}gwIVirpEi$e|PyHODN*#x(uzX!MC1@Okj_$FimlUs4AgFU092f^Zo zb7|zjN@+>pzvVS^2YKNZH%dGi;s34nQ7&Ug;^)DQ?%v?3^}njcw>NtBjw5nVj*qWr zqz&#GczJ03I1Y2A3Um#@_$n!7l%)CtoIfK^Lplm{wBzr=&ZCOC# z|Fy*_$)vkljPQH3GTWs_*?L{0xm;@M`$Z0kHcX>SM z=F%6nz4=mbTM_0MS*o!5OevKq1tqdJ zzq-?T%QrjVSk^4roSC#(F@?5VvP-!ZPKvzECsb!D3^;;MF`P4v&RiMG_J^f~bo{+Y zqDc(J#?fZ@={P}1;^N_Q3u@AmS}Oc*)%F}`+fY3^l)T_EcN;Vw+iC&5e+LIZBeuR` zX56EW-ySV!RdM&`NmEu@6&~iMPq_c;3H?wqbQU|{rQ!r41SQ7K=JQHx>x};)!ZM;% zvex#3kzm_hVF|+~S&B_Lc)lJU4VdTviU&-dGcH%=*}Zq9I$6DYPd_(2*rk2{S#FT} z-S|Fa`DI}|n^%ivJo`U3UsIrBW)&__@jtdMwg%dmMPyk@z=WoQ)e4I5&t8Kia^vt2 z;^)CHvAkyg+o$1we3(9bR*?H>QF2&)HnX=eOU^>8Fq#g~jcihG{{0rOsvwOoRVM;q z-h`#{^mkmvv6f5CG1zARUp~Yn{f87EPn+cvn1>_(mzWMC2fzBv{!5sRX0w}qX?9~^ zNZQl!MAV0KO#Ej`s;D?H{|-vp|IjL%SD5C%jr!VfD`t{lYA9-bH@@p)tDudE`7B0> zGC>Od8zEjr5t}Zud1_)N>%HqjokY#kQAt=*wi;z>5rE_mluE5%E#0l{9D#greNNl zW*{YUKdR%H_1O$ah3IVEZonF~dC1C#B{*kprj?|_Adzk*Iwl@R7be0rAe^2jCZ7z* zkCpuRUA9@t5RSmvA_v|;cw&jfQ`O!jrM=Ch{a9trAps6L`rqZ{qYsO=6`905Pos{) zA81dNob<#!{U3<|%8{6;!SRCm2{Nb>@h;11Tzzq0!r;}+N9tYD$P#y^5oJEbU`ZsF zl@ThbtG_;U$N5I;qZc>HIwwOyiK;0kUu--%W{5a=t~>TfU}+2cv_h256Jd7s44MdY zLx0AaXvw6*tPq*+8$)y*a3-R}4ed={uA5Iv-ZF5fOL91;N>;APx~x?Dgg_A zyCmFeE#b0+4^`OPn{>r#Dx*b3l;`E1cI*tCpiNhnE zd@k4Tf}&fE?L#)!b{)m`q%~#hm+31oHDyR;!Ha4|Ym$5}2kDqOI(78>8HHknvRBVv z1<;mwjmS6gc!0aKts|9!$_TkF&)g>}h`DqD`B1<8>2m3mbaaz6A~QK{s|#3p#D7$R zaPj`I!O!2SHy`0ZTYf+E7r-tPiwaZe(+`H*UPP1T(y#a|-H@OgQkcH6{qCkz??yAA z6TEcyUX@Ua?IZ^POAL59EGxw?UzcH6@hwQ zNL;y0oAvt}i2+iU-FPqyICwvx$kmPEQKHB}B3>LL)Wzmq!CHkvyP_ zy;z1WGKUKTDnh=0Q1h(TVcxsf>*+QjA2-)LZSs#Cen#CgO>a1iJmC{9TNkD6Ben>K zul#j}40kBrRhw!uk7!h(mbZ|0U`Z*71VV&}nVo6HzBm(kSP($WwA`Ga-X!gdC&bjt+e4OD~wG#4yXhO!N-=@5?eB>hCz`p0p^Nhl*QFgrPv!}+Q`Zl}L^3 ztm>FPwFNKShab{|jht;r_{%`+#X8lO%`synb zqW0dpPECA$tG`nl2NC$1CQmHGVs>6kPwRTD7r{s$Vv*62!L38-aomMxV#dhV<41pV zw(^G}kP}a5pdzs~B=`X)xYP=lML$Q+mbwb0mSb%iWVGA_^GRjra()_9w$)v%| z!jBl*YpaZml1+5H1^esFRx<@1U>Xa0UHRzM6yf~_0~!0S+Q864R660BJzISR&dovt z2Lf?os$YqE2}d;=R?NTF*&ync9O5s#b+Qi{#P6M1&DXbFoxCIllJiJLQ)IMNi;K^^ z=~u_R^X_@FeGf$vpqNcNiTrRf3w~R;HmcYaX%1765$`_EPD$|WP1Dp1WLUoDZ|O>k zdP;l6<9Tnzas%Q}M6Qp8wo&3d?H| z2+9%D=pdcYwQmmZ%s;6QubhOl?GERm?7T*d)D-l4_k4K$^Jjm2GFsKw+u6PQ`Qq=v z;bZ}ZpPLm8(}cv{)B zBZ)6Mbk?QCUTnWLVI?GHQ?somYYo}x=;4vMw}SRe5GTBxyXfMwd4&&nRc3BiT@C8G zJ8l4=F!fT9Mb-t>uCcR`VUM@5Q$E<1i}BLbmCI|A30Gm$7A{?tubVpmXl=fJ!+B|% zx{J0KN*S*ve*BC>pta~f1=YSM6~c)7gXSxna9=R zIshKL;xkwO8-a!bw`$7?4RANfqV6l%b`!lVdPXY5c? zZ`xHbDK0Fo#b*{>*f#-SlQ21GDQx@odrjK{#OB+N2L% z+5f&ZHL9!sNwqW96h8>@CGw5VQjm zP)(@h=GjHtF!Y(7(>QT*J=})VXM@}+(XJ9gQ$=v3DSlVd*uXU-z>bF%Pc~LsW1s>| z)YF(LNFg)A%xTmT3rf+&CFC{=mHu=6mD$p0eXS2S!=~F)BC7S_$%L}K>63^`)jGWT z)XsTtc>}>VQ*hF8k4jQmsu>Lnpi`JmRT8c!EJQ8olvLd!N+!Zu2*>`;)vfjeFFQgx z52YKkc-x7@-W8S7I?2;kSc`xVpaAAzJzFX*wZXJqdiIqCY0#RK_YhabI&u8lO0uto zb>PL2k()NFHQuQSfyX6?!3VLJnPLppj~p)&LZ+cdBg?^Rin^^nE&NaeFH)P9rr~Iw(P*k`IfMl)<(DSTqqEqEKrnP2p8-Q})`9qchR!KrD$9lwKI| z;$u*jk*vC!wY8E-XMwV{v{)*lXp$SGN+?O;cnmHLL99e$v1-O?W?{c__n*%+f;k2c zmM!s3`e7nzoh=3y`B>_h7*`e&iWRvZB0-3SB9OFNt!yE{VwuEZnWbdc)>wF+tNhbe zk-2=4$hiDC?4^2R<|wsls>B%i$}u=rxndeQi7;W;AaxN05#r&^xzH}lt{QCD9BESh zhJ0eu@+Q=!F_`#tE1i&Z78QUciD-*jxn(liP@)9=Q9QVl&!p1~=N`Vab7J2<(}5ZR9$g#vwA6|PmRUMY0;)xB zD7m7f0^15xH62#62q>X0nkpx+!ZZ@q!T-_Di?ne?>WiLneoY}`@LI0to3NxR?bq^r z@%}Q-tdUDd*zMK!^*J<96+D!8Euawa-*hM1<1Ni0ZZ|RQ8-+m%I8;*4FL- z?Cweqcs(87%SzHbqdg7weR6V86yVn&b2Iev`gO|>XxSbc&_pAVPGnV%t!tW6wkI7E zQ`Lpcu>7H0*D@sJ{6~l~M5?p&EYXS?FkUKcR*bWRThS>8GmIvZSP-)zmep)|gonTz z=vPg1f3ITbxKF%a%&+n1fW85&%r4{yCI+&@{+_Y8u2h2LDD`xjmdnHp1@bA&0%1n` zF!2Jnl}A^V(H2EJBZUvuW-Bs3{vNSbV+c?I6c+i2=`Z*$XSknqO3Gsu25;@iv|=mj zW~njuv_#R~+HH(L^T}m@He=&tG{yvr#RHgx=&ZbLE_cH^dln1lE4j~<oI>1KwN$@?@Twndv1uy&pFnx9?$v#NsxdNc07#OBab7&D>6jiLELcCGkWfRqL-^ zHs?pmVN1khw?d+hpHX6(%R~j?4Be7SOg>ed%%C z;o9P6L=(+B3}j@HD8Eu4-kb%9@YawzFu?%GO?atu)AF-TN!G&=Ea4y2^s3G^-oj#+Q+Qf9}uF&dPXLTfc$V$xrJ;8T7mzuC^3T_tQ%KyoY3p-?GwE+uGO>8qhU~ zi=vi^iN1`3@0f4@7RkU9?9ta{XYrz_a%|+~>>tq2&NywDk2f7*5HO&UWH#P%v^W>~ zAm90aY6$FT`t!Va`rqBYoUR|vE_9If@o2;;jIW=b`ayU({Qc7_es_PLcOd#W{gz~U zcyXZQ|8`~hby!uDG>P?AHXGpW@p5-1-Utk)7vnQtJJTW1`*GW%H|ct)6X^M?WQRmt zCsx!>;q7vmg1D!S^n+oGw*~y7VPSB8X1rIq4nNEf(ta~^n*y8esL+o}TaLbUhn~84H?{a<+J}jgdj%s^`<|`j}IYfS+_WkCt%PpR4n&!t%e{*JKkirKHcle}C?l z|3f55&mx($353%tI(AFSU- z=OG37e=I_uJ`9DvUtA6l`v)Lf6mmM(hjzh|mrRF=$~`53+2KQo{~WJdxQXCPB#AE` zBYjCZ0#>thkpPRO$i7>@BE=F(fCoLMVnAsXK%%WFb?>EIB3@XM6gjnuGzSIxP{j=m z3s6?&AkkL%Aw@5l%voAs%`?Zkh%8Y$3Xr(TDnpV1xQ8JF%BhegVT_aYg#r>&@Uls= zipMCZ8>ORc6aO1#00n=Y<5eBe0Ton=lYA3;*9V;*4(o>L@MKByipMCa@1&!A6aSwO zfM_o!AnlZ{eUQ{G8}=OnzqnbT4>O`5S;zYw~^Q7;X=%MF| zIifm|q^fv~W}VDgqc{b_io7jb!?~z6vOAHa?w~D6(|O+!C6Zj+L>ee`jf5s^kMBj& zR6Iua(t;3UXP#P(i%rr}EJaVPA{(`oNYZjZNFgJAkopei=R(qPz}X;9ktn;9CMD)9 z4b)R1OT!o^*CkJ@hRMWOCl_~@2I{K-(%wZa($r)a4Sr;h6V}h8W{``UO9Qp<&Zp?K zt)0a+q=D*~SmJ-5_xFm4N&^xxGRVX!q=C|R z(c#Bx*knL)6##H6R~Sv3EGry0k}i=Xx_FG_1rY$G+a1HeArps^1`4YH68;;G$GlG( zu4?fZMqU6(d=7#ihB4y`82!P`_qfn9NX3t&fZQs8IE?=%v~eV5k&H^3AaOa+XCeCz zr+~XgM`H^hut0VdKrDtfsrbqmPN;R>~AK(1%$lIS_4DZCc2g-BY`g-1EX#filR%fYZOX_6p2De zAOSBP1EFRS`Yd1-ngNrfX$sIvTVYUChmK&#Bby8UB$E6n zyalMNNv7eVQAApy=Xo+Cau`5(Dc%D53_&DIJ|pYm*Gr(q^c0mp-$Ttj6M|KqCC|!U zf1C4h$;NzI6DxeS@K{)?Mc9y8K^=CVJb9bzAXiP}kQ#bY8Vl=Q7jACW+O=)2M2Hks zo@aHV)}~jrP`Mj5&y*=zGUv}s2FeYiW*0n(@zq}RP+7_Od6ctL<%bqivdi=K>kh#G z0&89oubxUEUFnipT*o6nr^H_)8SbZDGv@gzE!_uWl^qk7e6-D~`8p#@MsPaM-B#lT zNz=@aSopXkZ)^3V82ei)*i4ATITzU^z4}{2*T(Ek!pFcYjCJNU)@%8ofU5VPM*KPK z`YuU#lnp)$@Uv}px-BFcNI2{T6jwnTD$XsQAR&_Z$)U z!8(Fe>(?`?_Biq8z=HYm!V*X!~OjwjGNQGDAzCvrM|34_R^^YB13%mH7lscJN z(<&?V3hr2K-&ZGw{;%qo%#rq^2%RwW3>p#^AOeJBr#Oyjy0CtD`UxqGaEfsV8-;Qu zt9%hnGKz}2wC25sWc>dJVh%?A2gEe;p&vf9^fUV}h}rnRfSA`;KgaA3z7K6@Z|6ou zhTV$mWK*jz%9rJz0zIAqw?}t5@5;ki2bbH?08(gzKe!Up^$vQyx-PN*`C#Cq4e?^N zU=`RD`=|8B%2e=hSC?_ta)#SFMqHDq=OSvK!T$Ypzg zPKjWK7|I}&#I|9CFel2D%0M;GMV#RVVX~T8Dv8KL$xmRbtEI%Lp;xJCqKZ(c$t|u) zG}iE1zQV&4G;wT6?}M$aK)13p<}VZ59~bB=`Pbw!`CUFGIiQ_Z9~Eq=H6kv|bMUGq znh+!?1p8(_zTSrdtFYF5lU8gWC+5Bv9p@6*$6oTo%XBd+vU*8N?9PNh z?tH{YOP1&2(F8>&fiPHo3lgsjfp@-(ZCq1#jgS z!ftojUGYDtDk9@zwxN>0T@&6tPfP%w#K2U~-(9&`g7sTD*4VG}x9<+`J)^s}U;3K` zmmP`?g(&LBZC}6H`EnNiSRWlPz0_uwH>YSv7jQ<|TlRa3nl4`0h`NYuGsD9pn8_D% z)G1w)YG)A&t*_A90z=bwfSVV9O$seev!J}wG@B)ZrXeUajRi2KFspQ+zlvlUBvL`qGe(!fL3Y4Gz zr8&M@<^4(V)QCp!7xR9|dB@B^)%kl!rha&!HpUXqAA+1Wx#eftTfq9;{Z*?IzyZH6 z;7$F+HScA5K@^oYV#_f1=cqdx@6KQHP5$QtP+=wWERtn1vr)fefw~W$cBw*u@?R34 z1^$WbpPOg`p(YJVR2Xoft!%lxaW`k%T~$p(oOObQlbmIqUkLhres6p5g4~_&zB29} zhWvi`#`Ms${`Jv$m$}#aecS=Dg80{W&s~zM*NpL~C2t2eXG6=ktoRo?qr&0sVawGs z@+-Z%9mg)`K z*K-&c6c7|b6yM$<)=*nh6sKYXIy{l+p89Dq^>@s322e-Q)jMq2u1X3TErl+8} z-P-adjAF0hDqyo)(*?Dou=D-<5aYa#FRQwAsWS4$O~j=?-rpn+=5U>9uVVF9@au@f zHSL(HA4=$gwWa86nQfVPR5MMlT0E+P13Tx14gS5Xz<`@_^jHQEg)bQL2rmC#$)L7L zWV!Cqt%GO831lzz=9rJ~2F8Ug+)oEZ6J|*+i31fnj zOgmO#cyI-&D~ku=G-DP;oj{%s3A~Ow?FR~XmVXOK?5#9Vf)bpm9A2LBCg&$}YyDza zf;Hnq_r{(tV$>>mM_geAvEyQ@@l_-aRN~S2o816lLZF7OJDo}uLpsHh#uCwwK%7(F zBo?Yr5e!&aMl(}#6L4Xsh|X8Jc&qA#PowOA%(eI+FcG7)Mq3ts0@KBZ@?k=(NJMN* zt(cT?NZX8bIA+CYirjno0fZ7WR0~eI;n5&s6!mgsa=MdT%#G~U7kDg=F?@a#*$jkT zC>1)B8~$7;$V0ZemOJ3mp^2|&5sIad+zAFKloEeO*WGJ0BHa;wAgNw!jQ@rY_8hq! zp|0}|Y0tBCLq8!qALj^nDlYYKP<%5znp0KA4!1Xv!wfAk5(3^B5m{?v{OygA+&%hv zJnn6EXX$i6cfJ@M`;fA!>{$hFiY>8`;LfGc$+v6XRp~uOr~WSC|Hd(ml{T}zs#XCi zcChTLRi?0C8JB${a3gy9+Yg75=kD+3))4k4>-JVpx6Cvs>(R7{uImrlR}TDfDlaN` zCnB~0oVQ#A5z;&VH~Ncsdx^z3o93E}qj`T+qNC>ahbSmS7#4Js)+nQu{HQ-f2++M6 zoXT8FNdpVBu1**f=;u)KFjL*JsFVv&j{u|TzCwAFDwCyXb-`5Ot<{+|*Y2hB?ry%% z)3bkfWe=C{AptDJfOLh73V1C7gq#$`EN`;3$)M^vwpq1CTZvtmiZUZKySVWmw>9d? zX<=2s7oAP?L0QvX0xG+2I;~;%L4UQRnHp2^U?@z>SIkP4&fsi5gz0qTFR4tHF=|>$ zH+r-zl^vZG{It8mk$vSBLQR=b62tPCLNmws5g8$ZtxzU>bFRsGtm_uBo=8>HbU}>T zF8tQq`+9&?JhU`fz%+|kI3uw{HrPZcNP>>n&dJB*`jM`SB`*bCT)j9mSj4X|IlACh z6EIT=ViW`tnHqCBy3khBAX0b`5!B$q0X?U|`RfuVB0HX_{hO~BD)vRt)A)Z8*;_-+6%L}6v7 zNlFan(QWFnnP^8QD%q~`MWrG1V(U7CRz)Kr8A9i7FnCDw)m(Uat`TTG_=ZA7mfQRP+v7F7MXRT$-h zPD|7rhGJ<-%p|o6M{K7m?vD17Gg5nO`n0(COI*xjLtRu){nXj zzrT`9fLlfM5(A1PwKpz_>B02=?&Pv!fN`gXo1gmY^D)SmpDX8w)~Sry51W$hw!2<;8o=I`HyKIpU=LG44*t<*Y-5Po`C9wd zsDDaO3J2TcB`X7qPQ8Z#jb8;f6NVr>b${((s-^$XYjCbJsQ53ivXdVv(V&aKO%Hc( zyIppW2*Y_ z6zqDv?u39OR9>aF>aS1J%~qtZs+w9+?2V~5_201_!>WM8#X*F}*BEfB;F&mISR|vG z>lv*?j*}O2^aFU{<>P=tmMB56_KZ{3)>T^ckTeu+)WZq2Srh>N;y`SEkPv8X7 zoA*7x7jHEg|DBzQZ6lOuPOxub3|ps0XF`7vbuSJ#R1M!je|zcmvNQ{r`?Z;Yw@87x zz^x_PubNb{y5KFn6(?(Bx7A_s3^|-+>*NNnKc(x$)e4kgR(cXk6@Z)SZ7>kV<7Xs4 z&0aQKpZ|vc>r2i5-F8&0XK$oRMw`(q{EKCwudh$?BdeQE_0xH3O}5#KH7bQ0ceA%l zg>V*jxfd(m_vNMuy;AhJ2KaPlhSIzG`vXH#oxMGwk`hgxcDBjn4eQxlTzF1aqd0+vfWH$AOVA2#%$?p@$cZ0 zUEgtnqmDPBqHxdSe0^iEQr|~q^BY$x>1=zft#!Ux#`Q03A;*6wV;Bce3~0Mf;lH2F zTy)HENFs0;It=OStFlWM7^KIC(l?nwA;7?a9r~$9a|*NsLWm&B(V+^kYre!_#EoLH zp;9aMKVHaiMGQ-K;`Cj{%zf_vqHkCVK?LyN<)~bnuoajoA^pr_-42#QO3q2EC+o{z#+sOQAD${Luv{}J2Fl<35@#;>0i%@(-Z7A^hR>dt$qbh3I>Pvq9BaBl+=f{u z6%-o=23IywY|B0vY_kpb8XCNZg+mwszBHT%_oNQ^=~lf@#=%`Zv_d+E`_^$=X!Y;) z@rOm;%lcu~JtN`GHx1VIc5!nz^a#5nxYNVs_1b7>!|iDg?0#$hy1E}-C0wKSetQ}^ z1l_MQyw1Df{P#G({Oas|^FX3KIp7j~aPffX@8as@u@6X*!A^E^6 z+@-0=nAn2P*CxflfIPlT%+u-pb<6+V&hQcGKX@^{9L{+?Gxp|Tc*45Gt2g?eyJh;l zxW+I%Def9x^ltNdJ>R}x9GpCM%}S;xC>~t0CjZi#6fTikSynYE8NPUJtr1m%V5w5R zEUEUpd==C_|M3`bcdf})-^Nx2j{et<%?59JL!zm5zWO_KW3wq4*pg^$1y=7`k z+V}jb!K!}*Yc=R!f!8{QRMVNPfvTccN@z{g?%7|*VFG@P*yMUK zP95@|O~j589)!B_y0)iNSffyD9E4Ks;Y@F{aY}_GwwAflX$51QQjm9U5{&SHmhTq! zNqT7mV=eg54hmZwoitH8x^v)PlbkVy;U#VB9az+7RyXwsHtJ%a`&P`-`rFvzin#|~}3f6%-2Y3Wlx)Y0Pb>=U1bZ0(6sh``D zacl1#Yq*zP(_h&j{lY^pg3uofqxEp%LriO(Fn z1!IczYR+^Oz0Ro}_z$oBQNAP)wA|DZRfE#>*rLD8D9Hy75?fkk$b%rmxFT}b)3G5{MnkTf)IThbuU%$ZHtAb12K6HIpuNAjlp z`VNs~(CK7ahH_SOi(&@@8q_l--4sEk?%@p;6+%(<5uB8HfQrHm%%(uBv_gUQvj;7`CLyT@)O0_3((ps8{v0QpF%jow3$ZIgFMxbV%$>qm?H|Fc*Fo27$&-T<^PI z#B3gF@<|`lLkfd5*;)zrV`Ghpb2y>Y+tOhuhlo~}i(+84no?&`Q-J^(4q{5vnh;`LA=m@j>E`=p zwv91~6aiT?tpnTi8RM6a&OHI2r%+c8i^e@+fQLdvR%1qu_8u$(dUuDVY&67a4!Z8RkL7eeK7 zcM|*tPSm9{!`n{-<(8%o%9MRy*>Ax(-zyKOU>A2^&yJ;bdqVuuLrbDiQh{GT;jibTR&*C5}nQGnM-OH=F6Hr>gO(^Jt zHQGLMW<9mL4k>5G1M=!M}RHsdaaX%1V)4zDTS`zPnseSKLzp?C)f`c&c;RnS}qiLd)o5j~PrQW@ZGg zbMgJS1a^2on*$!7NI!+@1ak}s1H2y32)IoZ4M%LhQ6~Dt?QQ<%uITmk<>5__G(v@w zb!dOL$GsmrZ_fXY{yeg(x$902OkfY+(ej{<)t->a)xXUB-Z<(zj*xTT-|YNc{nP21 z$1i^WO9|)sW28ueWu)A0Rb!^%QDE5pf1UVAWm zFfJdf;WVh~eB3Hm6QA zNOXAl=ZMk;4Vagq?2sQdt{K&~0C7YZ?a3XDjoL1MVN&aYb=PeV#S%9D`VwP%fiot2 zUfiwv-_d8ZecIr*F~20>p@>Lef=}SpKc6l<8DOUEo1G<+i>K5P9#;?q&t;ndIYHU$ z?uj7|nASwpbS-)u#C7MBAR{*uLnE#~B@1?bJL zHo#KXLvYSMGaw;UDdyi=Uv%=YP?+H!fs5khFV7$bXGAmjVNC zlsg0LzWvBOeS=CE97PdsS`n(d$=g5)s_4P#uUNxC8g-t@j}bL_>tC}t^)iRzFd1$1 z7h6lL_9Ese>*;8Z$dT6WY?9NOZCs>?1uM*ZgnpZ}AWqznk?4GN_|4cgw#|HzSCm)AMvD-YqC`#(m&DlP?c&=(16zU&bL8rPT+a{^LN}1G4d&Y&Ky$!5utGhEY*E>BZ0`P@%oIYNdVu)UAp9vlih{ba z^&-&R`Cvo2;2Ugv*CKf+>3o4V#1!L9AnOOZI6n6M=9~-mfF4l@J_hy${GFX+G)5-T zMOGL5w4XpHjvT9KCAB_&%Nne(N;R@4IyRX z>I#Qb4b(yK9Z{cf@?*oadYU>F|$J%9u?F&JTOg36FF z4dKF`re#DyABp37t1{G!v*7mA1SJgIP;ocbiSsF#D`(oyg{r52>MNJY(fy@BOHODf zAi>P1hdZ-|V=MZ3#b~G}=A;p`sD4<-7R>uy}JsTrh*gjdJpPM=TLtR|S1P9(zy?t0A1H2WbSpoPJ3=rj8>8D#cV- zoP?0-U!53ZJLyu}^+A{w@{eQ*l!0lyfgp2e(lxU4@|ZQ;0l_d-Up=NruUMiWUnkXO z9M2+&1UJ^87HhDYR<$S?D=SzCNF|;aD~6C%hz-o*-{#rinzY5$m=g62r<80#7)`Nw z1F+Lb67|C0u7$r>U_O~+{`?(SvfvDgX){DB`xA>RyfY1>p?k2A3Wxp&%+3XiHMi4T zMH)+LAo-FeoC`%7j7oe`w%;!7K^0dx+I|NHlZ_W!cxMf!c8%lv`vugX>S>Cb77F=v zL6=dv`}2E0KiPk^-T&DvaRML~+D!JiGH>iE_V#r9wKt4ucR!!6A`j*LJa`L0C^>$H zUjHg%JejDjt!kLJ*UD`ap=2c>K15 z#pXc=TOY0@#kY?=1OuC3E+54t!qATV2-;0zG_XS3KszjWVcQF?bYWr~G!f^?ux|%J z9%b8(foy*JB7!5FLe-gMtuBgcsFtaW*S7AW);R8PFp>~e7bH9d2s6OjhYg)n(dFHD zO@eq_{TPLK{Qian-F8T2?dI4Oqr2{BkILefS!VcJxEUjon*F&mLw%2S##WY~^TsJ_ z0b&a}01+HT3k?QJoB$^bZ4=JBu!l>9Cxw`brG72uWTW=kFF`&Z*o<|OE{$^RLQi&| zQ){z5{thG7dSp@Zfl~gc{1s zc!i-xE3Z#0@I>hkoQ|WNc8#@?Y+9<$0;CkFur0J>nwB2vaKt$c5wM6C08CkVNlJiRMQ*m~S0W|Ed1_m_`j%`(M4zs}U)$KJ_vsdLS=H*U_R zySCv`iBbm5XO<5Vm}+;(LUF zEqedfyx{mY0jm_xuH}k>27ZRkhu&|_53XJgA>n`I{n609+B$I_^Zf(aZJjoyU0==SUsGn$W*Hq-A`Q!Stp z<#5j+kFY@UC@KK5Ur)ew1cnX)6p$_gaQa=r|FDA6d5{Dz?;2U0W@PC7OVT(y9bX4dYBI1}WwDC5N{y&jcw_&a;Uu|$%KsLD zpbHbB-MiQ52SyBOg#LB0_Cphv7jG1$lMY5z*4-rS+3Zt?X(AH)d_*?nUz{^bqn96jBz%zW&{wJ_oKi-)xa^?|sYXZcjIx^c7~uMi~i_cYhLm_aI*^>=&H}`@R1M zWf30L(=`HJF}Ep?(Zk#Eu&ArvRPDVHQmfK z4x@%(@CaGZVU9M5BY*{(*Z#%eR>fk$r!*9Ot|Ev7r~J(HMlk%&T8&XGQ+#W@$F8Gl zIPBfsfA={q;)F>_S&~XbT(Xc*VWbMBn*^acV~?l4zI^ccJ?=9%oOvA+yjgZ6;CM%# zT1u`XK}@x_dGmPJ1-)t;l zoGS*NGf@wb0s>=X?2SOWM>wZq=e;Ny=LYt~p8-cdFG9Qm8!ppRn?tdueDZr6X$@wA z*zh8?=r@`(!I)QROA+heocqR}f}0!$yR|H_0+G%5PuKf~&apBJhgFQ|1e7DOsd3kk zJRFRShybRT(6NAFY-SmYsP#yhA2!JU5dqOn`|Rfdu}no8UALBpr=T^2Z2!@lAZP1hWO3OqM2DwtKx& z*)Qme9Tb9&OzY9v-;uRP(2V=|eG}x$aW`mGx{yWIDWl)4;S|94uq1EDYkIHv{zu{U zo7}-U)hcrs#*ekzRqYVSeCyJLM$yx|nu-0KN!DnueemN0!VsYV zg3?17SYG&gB}(`+)Tcskb4)GjB8cJXwz{~#wrN<#W8)tBqmyjq9!A@mI2ES2*uh?H zFiRpo>b_Z_IbbutV2;nRx2`h2||^LO#^88p)LkgG3Fkge>B0hMd(XeSVIV!;K7W=c`OrX)!7jNKQg) zXG2GbhFeG_TkXZ|pYIy&u&65tk_=N%08`U+Ln2A#+qp~T2P zyl5HCBfjo|GC!|a{=k=^N1x5I{32#Zby(MTG3Iu{vH0um!yABnm+CEE|vo(-; zRua#(2JrOWqv((8L}F)nJfJP(9netHNf4^M;4)P1k=A?HJ#3gp+1OUH;*3$Mxc>dl zQ&9a8A}somKM>8+f7Z=!Y{`Nx_5)SDA5K56x+bfVwlxi5c>mRVINbpYKE8!_eLbDt zevU5>1)DASuJZjxO3iZp=_I`PZN`P`PFc-6@z#7Alr3N4-xa&S1VLd22?|K`0=0{mxv_~m z_3lZ;9+4(Hu|!c#}D0vKBqy1BpnV0d?gjg?v@ zA;9s;rqN(23)qs=^Y0)HUs-QM$OcZYBe?!^!z4QjMM!nZfsqZw-Pw_j1_XSXFAINh z$4(4Hu-Cvrw5~^f&MA{wtP`3E%hGP@dJ?d*b36Hm-b64dSp?5Xfh;u>7J_(Xj$F@V zicD2#O$GLFLrkhn0iv9GIu*(0X)Km+1*cG!n?okcU|S80|M~UvGVQ*nDJlK|o%j9j zaPjJJ=Tl&V_aovd-f(}m>&-{8uh(!=cy;j^CMdO~t#m9vaTfs_MU^afOlj4XB_Ea! z9R-~|`=>>}{k@95=}P9To}-~ZnoXkXW-@4tr?UwY^onO33x zSm%u5N4qY0TofiT)kVdu-8v3&jm88i!I&PR`QB?p*ZhZ~rQ}8qtNt*$2k)FMeU^t8!L9U;CLe-mY1&sGXc)#ML(ztq-L7>Sf0Uy zfs`j*bEaCe>Fe+IyKZJT4?m!r>&?^u@o;&7-6w2u)Q0=y z44)N7*MNpeycXLrG6vjIt@IHT1Y4iZK=kUlIe{x<+AL=Ue#wQ+@qu%(0Ed{aGG7 zpyYAe)2ixXF{+SDfX#bKY5gaoXj2%Unw1w50A-Co%)=qcqRg3;CvkhadLi9Q!!0xT z(AN9Pz2L!UOlaQGMT3AwKqhg=w7`h|LC@TW<25V6ZT0VM&mwk1frUC6XJ$%m^d~aK zHrB0@jR_*558h>k?JssN*+}t8AbBYMf-cowwI*M_wnmh@=Xdw`y|S?@ubazal5+%4zD|8AYX@f<)*oUJu78fMpD*f zHhw&R8OzEjj#jr9$|LiYD7b5vSFNvRNKErrRyX@-DPQKP4EeUp7z0V(qnyVQ zjB)+akPLik`j%Kj5&fFkxE)mY%-cCJwMc!#Pglv%BD|Fqp{Q?E0< z*>)YbFJXMx?YCX;ywk~3t>>{5{&x8LzG z-^elR!s_!!q8@SBj*xjCZs*(AAA=i7Y@sl8S z=e{!Qmu)W|X`kFRgF0@+^kQ&)TD*cRdw*-x0)~nMN(nWoj-*urC|v``i~*we71i`D zgTTu_r|0{$?T>iL2Xk7fC$rwJ%~v%6z*+L!O$xwm2f_9}^Rh ziy;9CsIwxI$zoN#S`Cz85+m(zc67}94M^@oFYAq-F4X>i_&TTP%%W{u$F@_ko%}(? zwpn4twr$%<#b(8}Z6_7mw(;NWeOf#B>E87;A68p$bFMjh|3)A5{~Dm`NX`@ByQ>~Y z=l)#t{+eHQP#q*x;pf_}b8~QaX>IY+o3e@V zuzUNiK*Ud&rE{+mi1fUbLzI0*sGTd&CHc>BmKzuB=4}imZ%wZ}d!AT}N+kT}7>WaD zY;t#M2y8{?B8-Df@c&c?fdoo3TD3rmWo90e#R)Kyod@<9gHc$mF)*8#?IYD3(}_ zDOi%N26crY7M!K`k8id!Dvu8UWQe1DHIN+|I-!H>b)Scan{$l>O16dT8W(o8dwRXz2ogLLAE6j#ZlqJ(JK z#0l+>>%aIr>)57)@)m95$$A}Qb<lYNPyZTGC0Xqp&1CLL-2-Y5>kkL(|G20|Hap|9Xbp#tEr~D-1Deg+2yL1U#TU;jqzW zc`WMaSn>ySoAjuhtnMNC_tv8nst!oSz_dRmRpwwKkYI*utgS1AFxFawa4Zg)2r7-zQR9J`V(+Eyw>djTK8Uq6e>Cr+BmF&YQX?9aL&pZVCsyxAx4E9OJjW}x%`hYw{^tq)Pd(eh z3g*fXoMt4re?knGemKdQ28vKWEJ>E6SnyF&rUSR+E^NCk9Rxfe0ulnuQlDgf4$W~8 zCtp%ZJiQt7Kvu3P}!g&e^@W4D9R&|)z1Y%jiF-YR(OJXR9BQ5hwI8!n~ z8Yfs+4ny4U@1_{;V3=3si^0}o3N{-Vz|lit3W-`l71f5spcGF!QlLPvMzpE5W5j+i zAap>8=Eep!lO{;QlM<+dM`#o0i^NlcIoQxdHzrEkLpzONjhkYjEH3psSpTfk&^f$i z+ibxI4FXV9D@t2{{X`vXDlW7ZD>ia~V31&~@;`4+Ibf$4Cq*C`Ts(T%Kjk#yB{-ieT=wq>fgTX{?2xEjb1t5|6D-!A`-alSr>S@Ll}ZvcK8;C+TLp2d^|r0 zdp;kI61_Qle1TW{OLLh~n{g+bOXnQ9IlG?O-*pKh1Zn&q3GylM02SkBL1NTSxprZ= zbx~qPD@JB=QP_ZZNP2T2kl-nsN}5?Lv1++s6xRwteVx6Yph`o1L68#2aE=y9JI!SR z>_-*Al`ffYz`vt<8sz{N$x_K(n|m5%>xSS+ngS7eQ2l!L-S!_38(4(9D%0{eeP3Lj zPA>_aTs+=>x36cLL!bfzelE9gd|e@W{{@3iCYH|6ecpB%Je^_$a(&jsu64V5yj@y> zhlarY(^NC+#CQ*p^UD{dC-o{ z^0ksVvq?D;^bK#-U@8Aa`Yf-}5L0Xm>PJV^wi1ue&E`u>!7=>iX2ixYihv0oG_}o? zO~TszcrVTZ0e5KboF8Ys-o?ynbi-tEmr*AfV0Xkc4ZpTq-+do%Bqo-LHk!iLP%$=( zf`$y)lL*nuBFGl*$kYi{%7K!=DHDC2Z{AQsW^q}XdhEnN|DtqGQo#x8&cuO>0S^aAlIYPGu!WL zG;O*1Ir#HL*AMSCKlMN|07ZA{xN!Jf2CIs*wU2(ZGW2-HQMUB^np!fYlmxaWuAUAG zD*SKwPt$Nr^accH4~o-UC|-WKv!$34uQ+Oz3NMpQOC7gsy8k+M{lreyyc(Q!P~#t# zz4v>fmfx~7uC&Dw=xg(Co7^+oz-h2X1c=s^P9_x_FOr@3fFI)Ab{aGy66>p{(L#V6 zoHYtJG$Sx6sdz*|tIEY-VN_iHlj#2|P%_KnVD20{uzY016{a#Wpa2E9@ITGo^xh5?dA8hN?)K_` z*?2A_uOE&JgMbRgU7cKYFJ>~zCP|k6Ciug|Le0;D-RA!Bm66Axm@`n2C+C3_<(iwu zLMu?tp1BNJpWsl9<&*tS$NBQsL_xtK1Jc+fQsEeJ`9}fNSvU`k)1`6nAFa8P-rsOm zCWs^$I3za^|7sBr8G}GMejv0?=o8QI;V5qQ)%Itxs~=O~1z zvVFRF-#^|y_TJ#z$R9SDd3Z;#kB?^(R=Z;Vvqe&uB_8~9eR+9IvCW_#KEnpOTCS01 zs<$t)d-&h%Kc7y;>QjOc54cEX%j1!>{v7{QFlkkkA|}um%L`8!x>z_`@#}~tr$zuB zQW15vq*@~TN4l8P_rpaX*t={WLSJn{fYZ zSN%;yc&~msdOE+r_4rQl_W+$=9?<8skaB*LFJtFUBe~7pem!=yTnluO)gV#(Jbo<= zk-Xm>B7RNg=#pD;z36htn_QX5+aykJ0p`^2vVZrT z2d@=NkWP=HL&Rs4aF|**&csgcFj)OGSrH$~Fb!wahtsi%&VyQN7a4l4Au*rlI&>^mxnVW&d0^wz?%)siU5eY%)4xZuj^{W9YB( zlO3+XwPJKTMxtHP3kj+ldwa5r9i%k^mdc55Dd-ncasiekTjH49v>C?M$XX|-0DGQl zY;ld%s=K|QHA*lxLC|y%*`X?J@xD7_l_yL2f~MN$sV1<2$~tgOl>5aH7?Y1Dt*?7f zi0FyeqmeuR+o;CzR+TN3ohT%wkHpJ4=#f&~AjSN2!XeLAe11&6>fpZeRfT^d^ESr0 z-|L>rix)s50j9#wfuAwJ!A9lg-sk=m9Y^F8a_qoC{F|Gb@aleCYk`dx zgjWO)*9u4|u<=TT|M@%M_%idn0gzW)ImG#Ogu(qtNLleWAbs@ZpYdRS)X)8jjH(RI zz4{d{LGxYR42ta*)%uU%_A-K0mHuLpVq=VzHNzCg1TxGf2$C!#$bb>@-qq*+?}7Ck@h8LY%KT%axHnk^R*1{~sl5f~mK_)94L zh<=|1*$kDF68*p6m)>Z(BJTeO`#RweY>73cKQCzo0W+-gPOj{8<~v{nv2;1rgk9DC z9S=(Fm6g^BYjQgv`E2KcVJ@I@k+?V?3;O@4(D(kgLO+1BjWz#M3-&YCkN~ea+U1bh zA@VhFR)gp(dAbVVvNNj?+f0H}$Y>URz2}upfZA+Cg`7VquT(sUzlpRbnI7A{(5-22 z9cx@*ODPbuw@?#--MXtzAt9Ca^-o|BZbW>(a0i;6U?{c5P!xd+5atE$vV4Qa8t!ZsQxAfiFSCxq)=j02D{6LJg6}M>%alD=ncMVc40VKo%bYz|h1=(r(pKU8mdwa?xuMGv z!=c)_1ih|HP=rxpALka{OR@@NL^TNVc6x1V0sO(wP;2*>ACc}ba;KaL zu??J6KgN1BG@@}6o=ge|$Y2p&3YTnn35Vmr;}n*p9#0+zgn*QpiG0})L9>%EBU{Ar zW1RED*|EGWFwFE%>T4($;%2N1+oGszL`f4nE}medf<6H{fmVUe1mmw=WspJ^a4+R|f|-m&XlBpIv4sW86rzVl0ah zvY1R{9B>2+w|nGw7Y5KaDUw3M=E=5KI;3QC7wqMa)rPutk*c*e)JvJq9LU zzznBTEiJ*cac?UX!WvETxYLyDg^y1=TH!?WHYJ$=Tci5=-A~>&+NZnb8A`$_TD2J~ z((DCA0!t>F&`m$!pF}EBb@GF6oWzB zdK9Q|t<}4O%V)pH0S`J7;{hUy#%YB!rlT8_~1~okc_wJh%{dCE9=3nbC0{7ji=;5|A)W zz->{5sU7HxgRRI;lyWaCtr}-| z5%VaD(!V#8W~STptu2^4TY4HlQ6?=UZ8R40hp|RW*BZ2?rvG#9`u;(g#n*3P3OmsE6$c{o5U-ura4{@B^>c| z*^s{xx}*&$_2EV$ibzOn9*jY%kjd{zDd7MLK%rt1BHZEkyMF$;u!|=ke*e1j^CbWa zr&P5ME*wUA{#o^*Je-i`BJhvGPz3Vhr8laKHlH+Os7NGfECIxj)s5Pznm^VQ(P9bA z9g1tu?fHpTws>DHuNw_BQ2uGp4P#bm{bS9CD#z`dSa;>5i4ko`nzwi_ci@oe+{zJN z$r1kR0%s62ZXHKTFKK;j=l3oq?)SbvEzek)?e`=2XFG#9B4klvb)3r-?E?Jb zDsH`R=|L1;hc|uzEYEll;%53O9Oe*3A~QW^$JPq~SI-Hc97uiic)F0eBf9`6pAFAz z@9fXd`+g(3_IOOM-m8W5Uai*OB9Zxz$b+64k3JKHEudA*HoVMiDI>~O zmo1Dc3<9m?u-;sYvRH@dkL5z%5HE&5mS5oPabgAT%u|1De*iLWGX@zDO zq^8TmtIcWywmcfO3-`yiZ_~z_^>R^*>5{s1^VomzV@7Be6gH9!d=yV@)^dgz>E=M5 zQX+SUd7@x9%|uIP*C~%Aw*7p{JVVE~IKKwJLV!F}Lag7ToC{e4p4q@I0AaH0q2?Ju9b=ELy3!F=4ungue&6XmGzr8%o?pCy`>wVn(Ff!mUIaz1B_|y7=Jo2 zfG}7q$?zaJ8L%!paycYeAuGmIxnbPJou;0?^Wa9~eE8-Z$ zW%PM4qFO6!Lh&N%8nP#zn;i3or*WNv9Dkf+%Tw-b<(o?Uoh;8!CL=JP4aV3|h^ete z*P0i>>>0ulbq=^C$s}0Cv?20}ns@vaV^RC0wbs4|6)_yHXjfgfr>|zWr^Fy$W3=@@ zO#fZ}*{vc<;Ca7*e_ELSW_V^O8VrRGL(0~WPMii({IxTNN9;6~d0WJC^>Y<=`>NhI>%TB0Sr^Pj zr!}J_wSG!`OPbwu%C+_g#^mMDMH9d>AI0?S8i%a=pnW>xX-1_}CYFDFZZ543J^$pw ztWUN5zk`?7elN>9DQ?>zaO0jlw4Gud2nkYs|l^Q%nQP9QsS z6RvSfW3JBCVOx}Pz-4n1eRY=_e-uEgQ_s4yg%=fied9f%$b|JJH3NTJ1WYKuyxtIU zk_4oxe`9NjX;HR6r}i6uHc^3>x}m;xV?QOVH(@={2E&S zxZi)+$L8y7*q@RkXj96bLb+cU@~%if%msGNlVhXnvTHsvHr1%2iSwPl@A_on>ND(z zZH-Qx1wR!G=voHmmOU5*>S=Zib9PonwlLoJ|DdS{L)|#vAc-sd;C^txN~rJ zg_pxba5?=VfZWBb>BgnMp?Jg!t*M#vNeYEJ!LogI0B2FoGgXcN%RJtA> z*OAdJKeLIvjuSYN6OIMwJ@h{rA`Y&+1M|WbNm@!DOw0X?EH@qH8v^KV60_4AP&L=sz@L%7=XdAQAE)GN5Jj0H0*=^nn zpdrshOdoO28;Z#fIb}mxZj---tt~-QRjI5T?4mF6EIz$ZI(|;%!UM55W;L{vGYba{ zZl1!~RUMW`hIH~2c~l;O6z+-z5q2_q6MNrCn)s3X26dn26a{UkUow>!=b{oKOtTKx zU*e^KIWZaD?nSe@Y)E@s-zC#Sbv3_2V_8oUIkL)j89^JTL#Mtt;N2<5m|e}wZeaAC zq4?l=TBNjvN4{S}N>2iw@fEmzyBGZrxSAk_$22;*S4a{+YMz&bT}C=}6xmOQ#iYV*YkQu6C*x~2ww=Gk{*>#;3187XlwqZF}9vjd$Ep)l-^+)^-~0`~F`Hj!D5?4%)30VYW;#Nt1A;x)Qrn?hZ%xz%D8$VO`!j z|23LQd5^YPnFsrW2~mX>e%}`Z-NE{n*ulU)SD9}#dGd@)bcmC*FQ@ka#l}`;F2pyeb=CYeuQvMlf zRI77mo*wMEASryP;1aY{->dtKQj_9UIvC-7h>8$@H7a$_o=3VaDKv2iekx&;5qJFt z$hhsa80R$I4u@G$La)B1s13qvz|;AB9aM=jPJ z)n*9!kt^jh&pq6ioI92l3LyFOkfm^BwanMLOBR!!XDqhGpBLn=58FP&A2LN7_6?vx_BPvN)T^}<8_g#)JbUA^Ze1*>g zgK^+K;rDQA$khfLfB#qu`Pk`)0m$y5!gkQUTT6Y5ZMNI$P z%8Z4KN$~y` zv|C8Xd)>1^|F5r)5Xpsz^_c!$XE=EYk8V*(AtF|#$AYYo2=$wS;}e6IXWryg4td;B zi>E8T?dw%;J7Y<+6G$2|buvHNsfwVa`~A&|pc*3AxSH=Dq_4(Z7S~-EW~Z4qu( ztJUzFuRGDk#OUc|4pGU@BCi4(mF-A#ELiqQ>vc#8dO0T@6?&!zf!shs1lxf*8;!n2 zif#q7N0lbmv<6<`EOTcsVxhqnyU#c>jn!&q8t?h(>Q~?L!e&y?7_k%IB@gymHe&ll z(!DikDpIg73ODzk{^{w1CV4gNSI1k?SQhWt9Am$tZ5$CUmdKDWC4^Q9x%;@%spu`; z?k_ws-LzsVI=$gnVIM5z?>-5(1zR3uhLJOIp8dtP+?^-o6^nmj*CVCNmH-0!v|J-*mdpl09?Cg=#tKJ>e&nvXY$72;Q|9ftC3jdfmxnatU ze@-ryojL}cq%kpqM{DeqHxe0)EgUBok89arNPbupUDOJxmb)q@>_M!xIy^AMxJ14Gc)w zI2jx9+Z;O%oA{WapYYQ)palJUPd!OleXb$VHSoEmH(i7L49wuyw9NIaBQ%+y2O5|q zwq;6l+B_6Uq&F>`>*QYOc6-f%gUIpf;TGA>a{fziNiKhe=)i`G_)2;BgFl6&6ueLV zly!P{GxccjHh(;z|7yQQ*Qd;$MU9VHqriO#*qwZx-g6PV?kadML-x&qmSj9`n=oA3 z*Z($5SUkorg1&26LOFhiV_@`1VM2|HYP|2$kZ4_`tCyzI`q&B=JYzqA>vk_+c2SPC zI;_kO0Pi#$*G43^m3@3J#C3;iahe7BC9-yHHM88tmwjbyVz6@$dqu1^&!pW<6YvYH z)L{4pqXcVfbc09pQ_Xv3=}hRg{j9G9QM#hMV$zQ;Bo*$O`0(nQ5BJ%4_8yEWz4^uK zjM}r0n4o7%@!5F({w|573vfg9#xtb15N^}CyXD;OJR6&8a~pF{5F)(L(4^{Dx^k{L z-e-KT3Wcnx&>#*Z^19yIY>r`woZ0@uXqEM}d=ypaQO+IPIOn!FU*hdFq~bF(op#hm zOVm&ymr-_Pv-QpWY`O8hqnMDMM_rb+Oz0hks;&Eehz?G|9bkkF&*2&s{zTk>Q`a^rSZQa_JOQt-C z&IP^2@Enx?TB@O?r=X{*KGt-Mp{Mh=ZGojLy(6lTDdrBSx#Ne!rXCK{?F5M2sq6Mu zrj>4DaO6Jos8Z@JeSz-Qub_WzjR3X7tGYxwvic3j&s#ID zye`&IqV_*hXQTEU^6$8*&b0X^GE#r9{e8sw+rW%YMs~0-askbsXiS--$Yz1JKn~}K zl#niEZ+j4|BhKZo?>i|<2L>xXqXdzPJ*u!rEC4kC`kqlhPo7zMOXxIetQ(FDeesDC zI>#%Lx`1$qWAGui)dU65j`%mk;)LGu@H z)^Wes+TB>Y1A0q^wNv9!htVcg?By`4420Cgu5^_S;g9WW8$>A7{;r;!NFcMc)Pl4u z%$BzAJA|i-7j(`clWiXfg2HRaN;?p?PW2ZEI>d2E91hYlGmD6#9+4dyVV4*X<-Qd{ zKy4z-g{yiHMa4%M024S-T*3&vyA3r^d70?Uh^9-lbjXjikq7Bzw2yCp^im;Vtfa$1fp+oqnX@b~ zI|L6%jPYiLpiaJAj<%$c_Z;e5*6~xi;uu(8nml1rSM09L8*i%Lgz8bzKxu4H8>C*K z8pv|Qe86tSj#7y4K6`e>_GgV%p=^yP&FD*fs_*rJIjEdG$S?7M)1eCeD} z%*$IvhPRqhi#*FZ-gkIO2t4+}%WelOLkV;EyZU2vpmamx>bK0DF&NbCEY3!? zgV_LlqE7dlk2O`og%jxT!>a&>#YFl!^DNQC*hJA{8t#X_&_Ay8ztMI^xLzRlNUWtD z9zsUH${2Okq~a}MF zg+}{`Adpjb#{&}+VCzE_~maF{i>JmPhgvDfx@GW1FsHS4yq>4 zYmkKv14WEWceyi9q&yFi9z&R8U^*QjL9H(nhZl6b61YDK^yRBtV^zhv;Egd;_~)aNqEFNY^!`^85`mRGZ+N?-xyx>izBf+mT0?+ zI&5_ytebUU9RL-)0RU6*JB`EzN@}u8{RN&hw=#jGf(CbCtr6kaQVeR2vs0;OgLkT| zP8iN-P_CA_zh6C2s3c|TKw25D+!5kentQT-2B|mc@Xf8=zea1BmHM%a2Qn*#_M!0f z#p(;lYDbDIN2|ctP^4kzbZq}LA?EMIC_927A-9|cA9w3mhJ6DaK~@&+0p17Izyup0 zjkr%qB4&>vkOf)7`+lB-uKOZfY=t?T%HX4}$Q<=h=LCJ18VBDw-~ zV6v~wjGMV3Yn7z-Vo3DGjgD#NY7`ogxUw`$g0uniA4vlc<*%XKg9r&jSEMKlWHu34 zm`y)DFA0}g;~JRS&S)`dig4_gbymOy;&TT$JX({h02R{BnuHjlY13efl-#G78+U$I za*=-~bDpBr&~SW&qIIxW!pn9vim?uNztGoc7uepraP3fX$jQhYW}^F zXj?yGa6T=CUW{eCSTY@sgBh`@l>9V9JWgK3Z)_ihdnL7547)pzJ)P8 zje(Bv6%2b7SvrpZiB{nU-;s;+v^b1t)#ku=|G!*6wvMQuaHi?gM1z(hY$ zuP8?7R@UlyZSsF5+x=Sz6P`BTjL5Hzx3!;F9Iy6V%p>lGguSJr6|jO4(392e1_V}d z*}*{QP$4O0dfMV%`Fg4{Y=QoD!dyIWCx-+R!~h4SC*DEDK=h@@C$i_$Rz&9*mU2X> zHc%6@crK|AbsD{xm6mNK=if_A#C7=HYT5F2P|k9#s{6%33DZQeamv!JQ4ued<>g|? z<>xmp`K9pJ0y{f)u%G4aH|5@HQjvCx21mn48rlL(c8`Eh|JTRs2dpIa7rMWxMV&XH zsltlxvuJfQm2ocV90;Hal??olmQv?0Rk=grE2+PTbV1NgH?;`R3P()zj6|ZuoksZ0 zSQcDR!4YTLYB!T^2PmD4AtwAxW66>rdXKvo_VbfH6S?;6>n0zl9zCtf(oI`(5~&7U z52LE2c9QC)=(+TraGlY%IrY>%sR-`&3t=umL_7E!gy;^Drc~dlwq;O9He` z@JyM`SUdH%`EP`_V#bhW^(yH$>O=&26i&=)u0$m(knl5Vi9wlnk>>$)6nZ00cpv(N zxp+!0DbCA%wI5F#IN_wWMIImJq=AFi&_HXfLuEd=b%x& zQN{JsLpFJc8l(g62Z3+~hV%EYl8RWKO;Qw}0*ddz5VI!Rf|L!jdTW+l73TqGNmVL) z^?5`13@kUF%V8Y!#3&6N?vV^tp zZ(q4sWCVux)_U>~^rL{hx*_zv>pNPdpil=WO`M{4Y1*IYl=J9Z>2H?Pi69XaMA^$ACcrRIo8s6~z#G~C;}GCDmPaRAO#aWUqVpwArx@VnCp`QER8)2Sd#VZq zu}SQh#?Gi$00&|6#6;A5-PnL%zR}I+^EMCzZs%87e7p!kvE-z2S>fcn3P2$V$D26c z@QC?7NN+Wi#X6c$R zS|JMlIcXec@7z?Jk*(t=f7ONJ=%gabbi~tqp@RT#Tc(iWvm4(nXU*BY9`5k z==272z#s0Nk9!CokYl0Ef!!i&tw6dxR$hR3UKy$#q!SDje%MDYdVF>siWCOBrcL9pnP@cYmT6kqKO-+c)vjEU(t01sEZGwsXyQucw+L$F+~TG|mr zt4m2vCkkaIJStW@EKg+(RJNu#Q}uI|yg{rMJ-e{loZR|`pS_uH`qfx9aRRqbU8>Z( zGs2L$sbKua7gnsmKuABSVG!x6#c0UYwL$vCRhZcVQ*e#_9cc4>eA~7NP$kJC>dX)i z`3J8>vhiHX7UmdPwrmP#nNcMNMtH69!kDR2Xu^Om>sRf|nUEieA?jV)C89wY;4mLF zcXq7{3JDD9rt%|yj6$fS+nSKjav^L?EN{v8#}$2|#W3nvKJjs5vDUb3XN;2Qe|iI> zlVzH^5n<9Q!med{8%NHmjF8;E8yaHL(yxn)cIVeAm1}wS4J7GC<=b>#B9}g;{fOjG zfmwgc%d~Q)2fd(J#Q5hPwnT`=Jm8mj=Ji^^*L2ETNw~3UK$cxqC=S2O^Slc<92!hg zC46Y}>3m%_gB#s7ZJCuM^w#7WY?7+}&Qbh$AVpFM&!SY$^>v?Wrywiv8G3l1Jvh&D zFx6EN*rZR?ZfGkBIj72K+OkiP`@4?IXrvfmtk_SS5j`i{m8mqWVniSzAtA3jVj88T zzmg=jB@@+;*T@TXk8iRE_5-G)bG4plEYV{vm!YFzRDP-{HSsD$DV+`GB~Rmbhyw~^ zzdjNfFDnPHA6P_3GB)5z$u2Aw&?dNVz~hAFk+4z~PaIkP1k*#ov=l|G&;ffl>gMSs zvPcz27{Gx`tR6-TcP|Y4!w>N@)5EfxY3}5 zQb}eR(1e5j-gH2OF&?=e%rF+EJ@fEL3k-IKmZ7D3tl%L*CBwtW(omg)#bq|VjZN-f z+uGTAt$Fc%kt4_V)>J#qmP$F@CD!_P5umE#<~LqCk!MH~b#;*xjR zSaMJ*q_UaNP)J(!$GOppA(A?YDDUw_o=Tn|;wpYY5r!tKycOZerg;0Gs_%)lKbJ(sU^qklu2e2b}>VPP6IRta#7 zFN7S|4^9=wCJOYR7Pq`2EjWQ3ED2lXQ(gPrPmEGGN%tE|E$4bhui?mRr_y|uP2Zv^ z+)oE5E{RH(EPfLHCeAo#SHxEy``#h9a%*d9p%XspiY+~1X-?rtQ+;^z*rK|FmxmKC z_KPe5uBAiLsKrn+LZ}3Iq9In>9E{LTt`8ac9$I7@`r9hX)NY1K9Guq zp9_wM{AZOy9#2K7VW5#wD9UuwSU9QYF7`&)S~$q{XYI9Q`uajCr+MzPE}kuaCaE_3 z0wyAbr@%xtEh^p7#pi}>G+tE1nB({pqftTOGqUuuvzeYk>dMd0^KsDw9K<#-DMl%X zgvb`H#&FKiktelE_*5}y>Y_s6*<*&s_VJYP%&P@tjN-#U@A4B*B<3s=&;v@Q4XKzn z=rW|OWzpkcgG2(Ed9E1PD1s$3A0f#qSINO|B!5ba-wKyYUQEjM*3+lZaDxT5+I&pK ziUs%A4E-o6{i*df0zi}Jdx}ZCM>C>esC7-KlQjAO5{d`-G+kE{3jSHsO}8vlxpnv8 ziR}uw)fu_Uqr5BDP9ODItdGw)@$={i4RlW86EQV!9)K~u=WLb`zN=I$A$Br%aE^uE zHxZ+D!R%J_;)lpoRMD*IXGnfS9%pN;Q~6=CiWc!f#rnfB27|vYB<-QKyG*8$lub+w z#dI-2ml-<-4XdqCQZQpqym4&D-y3Z;%QgBy8{;h97JC}f?=+Az0+UgnG|&4sP0FXI zWz-=`S89dWbrKZflZJk<({LB`8mNMCPL1vE1JI{m#$hHXHT?&W^H{NJr*CCtXBPEW zNl4|Kyc5o+5hIe&XYI@h!$m|agA-e{A=hH@f*NKfexadH*3M0`GQ-iyZ9Ij@bLe0dtcy4y)yiT;=5nD7; z515WkcG3$<@PyI5VSv_g$CrS6L&ReEl!h>PpHQ;uaU>HMxKkMeTa>Of0!?HuahzD; z%l^4u7@DDwUqAmQO?8^&8v*byV?xJ&V~Yz$VGNR0uvnWw;1?4V_ZCVZqrr!POwYcw z(t^&w)!8>fEfTS?Bdze@BgIk^PzUJJbBBxRCt?K?|2#Jdz!1z-gbQ^m*$qS1$N_M> zbkWv$hSl&^U*369Av9I3dzJ0;JfGN7B^7J3(COpQfTbso6&MRI@xQXkf+91cQE(W* z3sq_9?p>-&$$*WN6rhml;9BkW0v(LgGS2TZ%d(XL3S!6X1A(CR0C%L9;E$1eXIC@7}# zHrvCM5){zS633RsQYM*U0X3zr*y4PtQZG`r5<`SOk$*|eQBmOrIR_cs#zG}Z6-Zl z?{|U4xN5EtypS_~y@Nb6q=)^N3~>FOJ}oTTRhn^@KszUbQ`RrhrC0nhY5eAuE~1NF;>ol9DB!c!)`5N`PslKvSuzX0 zsi5K6t2e-W(p3tEY{wK$#W&2XDWvsq%N9aj)O*XCW27xuj1Aw@<5l=Hl@)qPzk z&9-gn0AGmD9*7MH)bV3(7l*{Z+6Z>AN09zEGmU^5zeeYPKGVUo3L8ksV-F`PH+kX~ zJx4^0bo->@@1y;v6putsCvmGzwi(1+qts$c4`Fo)Z}{n|x(GNQ2%k&0N)3{?bCp5O zUB82zZ>%(u0g@JS`&+ah_qbRwnFa1I2{?$rKk#@H3=l5_5Zd}#^{`brXN>!Wd$;RI z031-P`PnJ?RpUF(m>*xK#L08Q_U)A>=rh^OHwBq9JBp(*API7O2ZAPMG1`_uyj6x8 zX)*T?Uy*Ip`Ne@Ox71c)F5=C6`?#MoZt1R{pKZxIB%j=qAC6eev*)r(0}vTW9NY&; zL`Xnr{S1uZH3ph_+(ubT`3M&WsxJ7=R+jHXZ$g=bpU~d)WtcONdZyCf1?q};Ga6Xp zW1Um%j7QC15{W0Ye?Iqs3(N_=e_VkM2YCK7i~#9AuV4wP^Gj&_XFcH9J2e}<>21$k zg7!m~1)FxTCcTMG6WE_`B*v)N@D*0Ln?nLbhK3HheA^xr`3L-6pBN*VV#s`x=Cwf{ zN}9_d_tdBXotD_27))mS8QY^IG$MVtUrd{h5$2dlnG8z z66f!{=<`A;fl@n=0MV#K8?$_OyV5*sQ6>~2-a3ABGwt$;O%hEa^bm6xp2K$cybP0% zTUv_4rY?lr{4LN5q^(+|i(9Is%$decU8c;|a5VT3~1) z7#L-rjXVI9C>#hF0wTvXfB2y*6n{ap{?q{%Wg7~{XAC~h6*(VZY+w891Cih%e+Z|d zqKFyN+gl}UQPkZQW*eeTEIvCfKKQw=!KM|Xjx`4C)%=Adb0fYaoi7Ta8u`%Ll7K!% zOTNU}2S<45POIT~s2pmpJ)JwyDOpbuB~XOF`{zm9ghoFBIf0ltC`7=gOjd5`;K6+} zHMWhrXopLO^#-mFL?6*j)2W)|de>k!)4N=uo&CuIEo;R{m-z|`AQn)#aK#sTQWg;! zaVry)oJnkzUs1yEI*ynqJx^{gyQe1UURyf%#Z=&4LkY5Y0rYy8IQpEiw*zck0W;mz zR)LUQmFgfU`k9g-1vhFCFX-VQ>F00a6=T)55I^GXNrNCW=x;qzh{n5G!qM`M!ALFt zxh-9(WBhx(;$Kr?62(sAs^$%Ce zPrjUj+wVzp?!}3d(Z{b>L~b?1o0gqC1XNk&i1jw$pX4w z?5m@K1~~L^dihiJW8zHEE?thww2&y*e?+WEHh?QQWNPpGD2vecKa=>!bP0F(g1Z8# zjq+|f_i4HdS`%(w3ig0{vTr>nzu6RBAy*+aZ;3gm6^+m~k|D$u%4qnvzw-+Y#$;%Q z{HdX|aUY*O2}M!u;jc)(D{{^^Tug$g67w|u_6rcsu_j;}E}+^;sr zxc>v~KoY-^P)gu=Vznt&s5+5x{>T)8ROzQ7r6~ucA9C;JDRJUm3^m2zJrsTIbc+0V znI^%7qDrXjtWvf_X;)L8*1)*4!*HqQPGN&lF0?0>n&W;-4t3A2?K=JsiBF?y<{dhwe>+_9Hu`+iGNf2q34G|28=^odJUe@TzbM7 zofTJtG=xD$Re|M@)OOHEAEnyag1*tUTCDHomAcKfkM84|{l;eCVr@QO_C^ZTh^p|~W4i+BsJllaqERZ??+f?cUayGi~>_?cVk^?`<31+B7}m=hitk(fT#+9oFhH5<7fJ}GROP3*NotqD^s<@2 zK_3g0#V|UH3zUsXlzinDxb&LQuI7OrP*&ssXpWvN9F`-na5yfxe^%Y&NqqaBjK-)c zCqbEs4pE27I>O@6!FD8uGBAE6W_XZ!Sa{FGbCJd*!H#};<3w+f#?A0D!~eAyHeR*) zpz#{bP%|U2wLpzmZH^kRQG?nK^DqjeN8k*m)nqN*<$C2rEP+Z7>uNXUg|E9j+g{Nm zV&{qPC-b;4%8p%Tgsy?oG@nM2C*T=Iy^8c;AfpzvMuApxsaov@H8-M)_GG#HG^Zr7 z@<4TqTG7fjH8ACdr6w}emb3)bj(O2e2*;vd3+wC}`ek%!6(*s38kS|$*SNgU_Lp*c zg=SeyW61&?%~K-<8=7NPmoHf&EyAc2EBn$&zX-EBziD}}k^HytA2R;Oa5OkF<9{3t zw*LPcc`X0`a~Y?er9~xq_EwDsKz1RwF<`pzYYhOo#n}1#Q`Nji1k?ACu^C~h6_*x! z)h_xS>{&q{InHM!3 zt2^@6TYD)jd5(6Q+Wygz)!3PN)HW}N@BUPl)L-Y*g#Tk1;658bo&W#AXk^-d4@O)5 zzmca^{6`o?%Kq?PW?@~cBOnzy9VSAA4h_p7)e4Awhx3AjsU)5)iZu{5A!2zT-X;UKJ-w$CNgz;oMi|v}p zk_fRtpfC-8%943nG4eY+D5$z_TARepDRVd`SFRM^g{FHTNY((=wH2?`X$0~@j$Vtt zMG=BI>b>T#EzzTFa5=8BjAL9!rIO6oXF1$t|EFi=)g^$M{eN&UI5hYFy`#hJ{=bQb z?f(c|IFk9ZO}u=o=2{fTW-NF%1^jvVH1(E#lfvKU$lk!1mI$*bk{kOuL$7Mt|JjZ& z&DK9*y$|L8Iocms^8dm9cKvVUvGhMY&+m%*9--E)ascJ|!9w@1=8%SnG(g%G>XPlVqKbCB9@-$;WdxX-YpAW6=W$DxLU( zRLJX!AXo)>jlAd!4FageuDeepz&G)86rl%<1gI{h2B84wq`8Y00Rfvu_p6H-*h^tn zge1W!gYAs>CrXvhU^URY4F=+48}#dz%e^{&pSA4D!t6N${gp1eZR9;UYYTbhe97e# z(|=Fc3@!XZJ*B(qs+5Pz$80lU#x=%ye&MU)qNA3pfHDAGi(u5ee;kk)Ky|zTOV#=+ z36SPIL!9zi|7dUP|Fe;Y%Ku#SFA|>B&2W}U;vJs$jW6Lo2xAr& z2uUq|N&2@*xIl4z?l;S8#$g3i?vKNDef{siNt$AQK#w1?Co=s#Q{lrPAR-8iPWdMh z?(vRgiDESzd0|a_d!jVmy~bHGBU_~AhN8gK^qWE-tn}1I&LfR>)j_fVT8h>Fci@cS zPA@gmC|Ul3mh94(X zw#sgG9y{A@Hyb=4Mbp_R3m|#t3~yTtr))4Q!_8W=!65X%1J6-`vKi*-#8Zvte%9_u z|AY8c%j;4~MhlX_6Oe>|h2R zzs^hV_;%@uf>iFMu$bmx&{3$9Q7i3>7!MEQ;fc<4N-olxu7%q0zEx{M3GRE3wNUo= z=az&1U7wZZexe%zc|2aA`?f>=5c`1I+xqF@0h;L|6M!aScx5e@oeXe0GH zsVGJi+Q^@0VX?&WHu^{cBxUpXB!8Eq>=+FAPi8hf*g^5)ct_bDP`r2<<~5rRFJvm8 zd2Omf62Hiyi5BiE>LRT$qr(felWx@z3+BQhDO3m~ zspEZCqnNf*13@j#k|Obw=onm{p6|eHlB;x54jPvvmsd2_mb*(`;B~u1GQfY{3ssM` zR0@EF)qNgjs*bPkX&xb#aHgno=^^D6KG!g z8yg#;swLhWs@}Gx*)o;7R^0zvxdhbg|HI*tng4x%aCorY|2Of7{r^ph;`isTfuA8v zHX)31re?{-?oUI0x7htHrBHVRD|uCC1YrPCbqCm07yJ7B5-QL9`e0b@3Y3l1>{&Vt zb6;W7K(I1IHuSYy@b<{}g*_|sf4X(Ai~sLg=fB}#>;JKlNAQ29&fd+?7-cB-!*~KF zVIhT^j&TSCVO%821qxN0x47MLYuq=nL$sFl=tk&Bp4m1~CD{IG_=o!yo?UlHb831(fsfL%esOI5a~1mY{0uI{JR31`tU_=Dc)kb^sy0H;NfUPZ*}?iPXP!mJS~efkRm0CjI4Bo`i@|a|*ySHUd16!QR`TctIAOG&pD*L~f=Jn`*hDUp5{Ga{7 zHvZpco-+N9n(}Fr`X8D7sm1Zpt^ZL^wCmUZxWt?X*8j+{Y3=bRj^*XPezHiTKFgF< zR!12at)udFYiB=GGjV^fKhclHL%I4HJN<(@{H=U?U4{R*GX80x|KA&#=fAy!;nx3S zBTuFM4<+6;8U8pIU6)+GF$Lc}^m43)A{C{Vq$sADO;=8gDnS6ZfFc^Z4Kp;E!|YypSXCg7 z26q}s9E&vOvW5c_`sv3oVv(-@UDe&&$9UTDf3`6CSCnwqbp9V6nfbr>j`p|tzc%ue z@qg|PL?;^XO#q4z7RHe}3iARaW9QL&2gU)Z2_4==n3Gcd^Ej-(To9buedJHL6VpSS z_*vT+=4@aIm(KQ{+5~BD>jqzU79P;_q+4*8$$BZ_6cSpo67R7et8kdqO7gORM z5EllAvif8Gon^Vt7l$+@jVR%~iLdEfIqYWu>?#4n{_C5C=PcI)9kY*X8T>=X;2#>J zKU`(>%c(TUz^)5D&UWWH%E)r>RF_L(p5G=}Kt~3}iyyOOMr{?S9LJJ`g8IyyhEA6A zcm;Xe9zwBtQ0;W2LZg>YVTOX9D9DGAB16AcP^zNv(B?>}Ni5?FEZ6XwO^h9I*(h9~ z80GnSmRysDv=>e79lABGJftg3(!&&M>Py0NV^VY$uN?H}O!a396~mtp4AZv6{Qbt?^E?fO5o z{eQRiKbv{V^nbtdnO=(qkg<$vzM))$xV3u{r+e!6gv!n`k2EmRbbXx%(C{gJZtT;w z*7;v~{kPBn)#-l@_ssqOV7R}v|KG?X_J6s!?yCWEt{$la5}#dKAn~zA4`h^Uq6spp zw9y3}96mL)LG;bN^+EDna`EE)`B%E(q3eU&<+U(Q~>y!iF(^7LnI zhKU(qsrqD}s84jg(Sztx_8aO__T9P^yOUQh{`>UhyXP;SzkYG~>zlW~TwI-KIZIc9sh6N8keSVsJwJI{sclCOU6**+0^%g-uu{W}Z~wdDK^gr1_M!{7JR*Dj9? zJ~mq76|#Tn-z(rL{A<-94n|`H?0Pcma=guSx@8=>CZ8?`x5gy8bTF(I@M~GNNF%Vz z!F4nxX4xLnYzt|_|Ix<+WigD-;sRx3=%aj1`oDeC{%?QpXlwtyk*5{^f58X<2ns0Q z1m<}dPiVgI)03Akz)$ba>e;_dVbUVpxT_6G^9s)nKfbVPQ?@hD$if6J4&~iE&3k?v z_Wal%_rj#V7+kp(m?(E3JO!Y2;UW^$ z(CWrD%VRh%l9yq8vu3a?-1UV_0$)ZV=D-`>v?f6RUNI346zutM6l&0dNlaF2JTW33 zN)sN*6y%5-qG!Zp35CS)GWX^MTNehtfP?N`Qb+tyb6OLLbouZ4BB(!Mjh&ZG%Ij6Y6y)6 zV4Ad_0b&MtdF*Xov1uj!pwabp;N@OSps0Cn=#m%`ak0w z;S~|hIE@*$7k=~+NonnBOlnWwqD6=otdr}8W6+c6l%hz6Kq)5%!_8P7Gb(;$^GM#~ zu^Cu6hM&%uY@MVEcTB>xC{j7CBptXK%~rXgrm4b}*%Qu|;y~mQQ@eJJlnMO~F;!1@ zt`UWmw%>`xGr=^(D{)eYZG2RWl&a*ncEWJrq){#%^ORpylQAa&ew~D`(z@Ua#&=x% zl4R$*yOW&oJVWE~qep?`&n~bQW&m76{|3duvG%ea3BXh4n-$d!iVw6^7my75c2xl4 z`Rp2Hw7SeyYxP5uYz&NE*SDWb!m4e`9I~<{*zQte`!s&q=zr6N-#++Hll<=kGydan zZ-1NrVy9B9ZgX*>*dovH~s3S#K71)1~&+$ zu0#v>KmSyTtt;lbs6DQ>K9ND+M|u7#36RJrNzM?W*W$Z+{(OsI@M{(p=uPY+kGM`L zGM#2$2S_9`q@0%WBFTt(xpI)p!+&WFeE88b8Y!r`}Qubel3M$N-+7tC&ybw4Nrm?Doj(E z9d^s7T_>_y>$ygxe{?#PwuOu$OC$hw81AdbHCVa1De^th_+GU^S|Y}sh%LFRjc+f_ zk|ObwNS}%h@P59$Jiibc+G+(YA9k9sD$o5X!s9e8iZm}#X;Mr$U6_r(OknT>j9~1e zOyGbgB8ski^EkwWrJNw~187noMk7w;w+m7jTMz0+u(7brVB z_c~yg22tZ5J8X9^h^|N!w28#$pJ;jUQ`_y0LU(s+kP@!*)KKHLZm-EmDX0*dXQjw% zq?FW^{>lgYF2~v0*|}F!(m@aM~>A9IWqFMIem4*M&ttH!Ub;%Pn3HMP14Z% zi(jd^CCMd$rjG8ZI%%49P}f)YmVH?D=jTh-*Pmdx;p8?x&ry&v*muFfJ7#zeuuU7jL7VN>+*f znQ@bH|Bf=QqRvpc94lITSuNI1*E!;jt5C2^;d9S~ zO`E$5^5(pzCAX>KH?(ON&ymdJ=|H{vDqlnH8|pP(j;)~oxuS=*=31aS|Ia-u|L5NR z-oaM?vx$f3f8L^Ep2aNL5;<}b(xo~dmcv2U`!v?&m?wNieZdyYIayK1&!|>aes{0K zp0*CVRSVIux)*VI^oHqjE4Rci$^0+?yAg_YSRHkllHeD+Tq*N9p=^d|$~b~}c)1$t zpWZk5KfV9s3Ht}k8OtqXGn8W%Lai$6#!T<9F=o1TJFemJ$?6DkfzpIApbUp+YzW&7 zAl~$OeN6!;VBVl*ZXo^#7>8M2lpDD#0N0`$|95zr@PF>Toc9Uqhm8|IvZsds?;jmm z{$B?NTmAn=9v24}VIJsgds5}C1oNQZfE}iVk%%G=-L2U_s7n33Id7Ib?oLH@{{i}F zIg#xWE@r-Ed`y8t%mgtne~gbcS7GYOKC;g3@9!!7X2&;Nh3IaT^01ha_kH<}HEe(q z*Y%_i+W8s3G3D7i)qr)9nP#V)2=MF6G*Ts7EYp%6J_EbbED{%bTx#A)%DZ70-^`|!*MgW4laPBai&0Zs*ZvC}(Q3+75t zz8g%l(3LbAwhT?}YD(9|lw2aY8*$zrl{S>R8*w#r?$WpE@~imDxTsfl%GQF~3B=TS zv$J8C3R8bN&YGEy zuK6*(adUM#jM}$(7Fq5U$Nl~{i{oz=)HaW!KpUmtDWFb$s5kpq)Ik1^!t1_|vZ8;5 z|Gj7v`JFy>_P@iCng3^WG~C92-N@sT|4~+G!P~jDi}0jrZ0sVqi5?CMWyQ})6ljr- z6+51?!n%EoEBP2Rg>gD3d0L^eMhvT2?ygi?TskjxocFEG(9>~StyRrVN#C-h>dQ2d zVkaF5T12|<=$1z9M%N<<(oV?USpHrer(G2@IPP-lRn0*EYCc(30Nn^Sj(yjAUcNI9l!LRhpq3 z#f7x~@2W>e{)3LE$tSgoksW;+D02rlXbBQ+8mb3g*%Q9Fp#+|S9VRoe_q#SDIihtV zMK`VXL#1qXU))%&I5aJmvRI-Zj6wMERDR7X$4yea%R*ng)a}}3fJU_)uq%vT&Ee}Q z!={KKo!WJy_HvvhGm%Yzh;@}ctLf2Wh7uu;)e)D6oa(U=&1vnMHueqcs>a9`#$r`+ znj_VF>PXr=jTK^x2(P^g=C&0MzvQQ>{D;5wuM}n4`s{xOha)ro``+Gg8~=AB56Q80 zO8vA{R|@K>0id5HO0dt;#6JpM+$Pygl)#{ur-(UlH&VG8is#yJz9ftmu6Xk_?=6N} z5MQ2igEaYD62`!L0=yMqm*`HLjzP=re+D+$ZvAWFwHh;kTKm7zz_R}vZ1aC^XlG1LEx6fCq0?6=NGz4Fu z*f7F0&5|?=vG5}Ge#G3)j9%QTS85zN*(vHC>oJxS#*-dqNHmhTuHVklY=N@VWR{YE ze}5hJhTnS*ZCve$_ViE=41;S_K&?sVQIj(KDe`Z`VB`gDZ`p1*WOUK4ao5|dOIldI zPW1>fEBS2h3Xr;$Fjs%t@qgx1&{6|f$NvYG{%bT_=7uNwXD)YP)V2=LL*?r1wlUGuv|4KkL(u|5IXG zbNrY6qa#!P9}SMS_8%L02%mcKF@-G0HgV-h#x#5jp7c`oq%s!8RDi}mdaYVfm|iN1 zsmFUGYLaHt;Q;jv> z8-tAQ02Bzz;hZySAn!t!3;r5`d5-bS0VK#XY^zB|8VM<66Ia?5Inuk(Dfp3P>{t`6 zS>SAXvx*or$9q>#cho(cS2ydGwx^*TQ9Y#~{GI2ztYmioJwh{qbi3*8he#m4;Ox}dd*_xrHh;&xN9GRSJ=n9mM zDjbLXEhWb+W`LCV)pQB>lHv4n^{om2P75{NK z+TQXv znmU;m$ppnH!z)ixCrDwQ-zHg*6aR690u)ri4p55X0L6YtJX1KBUKsyIv?*1sW+({r zdo@TPG-_)Gvk(T?_iBy7FxzXSxM{ckc}U20>VHRjgFQ3994FcSy;#uAFXKyK%e1W2eS5To)=^!@agC_ z3kzgor8cL55;lQ7;7QjCj*ZrmOY+zuaQfc?QV^s`a3YNfUWR!=14!xb>Cj7eN%hZk;!p_ah#B`B^`6O>}iI`8lyf)OV z%}&Xfnia{^1~TgRwof=p^Rzm!eO!_dAH ze%pCyx)Pj?RWcRFD$tr`V@;zNNuDB;0LXDB2`gwa5jMhfA*0M5(>q6M`vT2M5}lAX zYz?3m`ymSRf~c2vdDb<>m8+viA0Ynf1)B9@Et8t6oU^~*+0OSWi(|c{^=W6!`&E4m z1GEV1hp%Rk6d*O@LrZ?)BP2=2v3)AZY6LKcx2N1M)l3yCmq!_=YEVYiZb`)XU1KNB zX;ZUi({{ zwa0O8w(jh<*2Qj1Ag_K8(n6uwW^)PDU(;3k33cnnq}b;sQoL zWyw6vL6HD*cQvJvUAUj7z6Ft#@T|h|Gk~`XaB%ok={F&+iC#i}4bbAJvTu`gZhzxg zr}F|&Th>K!figVJN)K3bVeITd$xNq7aA8cgV^rK7d$uYRgL+TW6u%*f@^GgnVk#U! z+7YrW=o)=KbznFEqX8J%VdqyzkvL8NbpEbxrSW1e3Sju{?}Opss1!FpnO%o5wG5%! zVHiavw9U7Dm74Q;Dk;uSVjmVdiEERt44;B&#hSHg19&!ao{C4;k_?%7gxrmITvknu zkz|Eq%V@Agso=GX0oOM5g-VUG_w{n4E=1|{v zy0ap0p-<8CyyUZN-CdwUqSGAT zU=Wn__}K~o%owYUAOyGrB^_^wgbtz%3o+zn-Ph>hS>t*w+B5p96G3H*&Mu1enS~1; za-7CjF?gNHK}}Z3vNI@QM(h+;H14ZN!6|c5b-*sT3FF|5=oDl$7`==NYS;2ReFlbu z(LUyuf=4=`sG(#pLi5lGKSk)lr2&~=+!@I4w=fBm{)c#XgLiDfj(IAyPq23y_#{PS6 z@5qe*eXuv&=KtBqQNx+#F)l50>*AyE=$^LXbPjgyS~ zNfGDrh^mV#vc@TfR62Pnf%%APOuI?8^`YaOD7R!KzQer2SnGM_Y?+*Nt?aJ4YYOPJ zxX@9spZbnj>8`g+-)OoD2E}rEQ;z#amzc(Z;$H67^6Aq~mxZ@BhIj{na0VyL|DW|7 zMrjzMGyJ}np)|?EBFUEE)2HK-LIo80o3$xnSr_K#3Z+p>!W zwTvp!@id=Ug5-Y#&;=(iU+w^qp`0Yj7MX;JCX6F5zN$K%hWUvx*}^!WO?H9TzYgPm zKK1zTt}p&X{xkvKo@n|MKglxW7kI{1PTK2z`(Jl=cHR#d1o-nJ<;l5z3?n4yjwGv1 z3YrhZQH42ng*hqi0g_kOpC-34=)MI9hfj|W4xfVlB8~gJh5rKnbe078`{X}w^>5&h zKLG6$Ei;B8PiDACV-_X&3Gq5!CUZRTG4AKCZ*jVbMEG15^y9JvmmD zkPkk^i~#A9U!*aG%NB{i{8*peGF_+6Crc+vYtu|-tF`JH^&Kr87x|peul0}Yg#=)g zaA3a`Zp)q(}})!ZREM5K53U&u7hC=#N=|9vjBv# z>DjC}rj^Ta7~Cm`Mx{7~G1TXeAOg3{=dJv>oC5)?!7nk>hbN*9B zZz>MvCE$K~`{vzw)d;TuavjiIjMuzk$Pf(P#L@C?k`!2M&zE_DW*S$vs^H`B>mZL=q zFTyN|XPC)K`$iHfi`*0@V=#kh&T9au1nuItqYe`l$LQVNu>pE)7gvyEYI&^MLAwUCNJY;dS7IlZ2%B^Ra{2Ms#WMJELCYt~5>VEblFVB@ z*R!M_CQ4c_Y);y;?e}~xn_+-U9-9-vh?HjY`vooEqOm%>>ic75ZbUn>M;Z*eGR;1+ zhbP)AtBX;0R#g`ctLXFOxCY|t`#QwcvTYI9>eeG}vc=LR__UnJEs|w~g5m`+6x4}C z@k!8>^XwDrFaM=27L}Z|;tt9-AQ)p{pFUWqD({@eQp{82hvOw_uunmZlMJ{v30EF! z@q_%0;svL5`#PC@)UPW5BS3|Sx0o%-N98Cpp! zI*fj^{x;M{XpIxIEj|fW$a|>?VTPGK7M06=_#!fm9XMY?Q5DG&7~6YXT4tq{vU6A! z(phqi+*k{{*8X=pfCi7DcZHYP9KAld02ikxFJAy2<0t^cK0h8Ow3E1`eFuYg?;W6- zImwUw*3KhwOo^edCF1@euGL6U)f`L$5>~bHRmpXb`|jxR>X$}ert*0O{qHo%ixd|A zbUpgt!SLX~y#L=HZ1aC^=GpN5|K*$KZ;nBLB2*v{B>oM`fS=6LBuDfu38fkP2!#KQ zj}Cy}X@Rh4Vmu&dQ&%{P*Ps2WyU6CK)&21<$d|caM4)>M#(6J{lOh~1do%d)YM!I) z>K1nk<lW+#RjY>@oz9Jy;KRv)xkOU$F6n-sv^CkiU#;Ycb;cm{=retSqH!TGFiU% ztib=%Bxn}_u;%`6FdCTre{?uJ*z*5PJoNr==W9ObEaT<~dKk zV!dpBt&;mw6wD)(aah`m=5R1Kdrebw;S$Qvb};zCn*Uu{TlFoDb9o&kerOxGRzyFT zmh?h_a~jR_0%bpjSzi1a7So?;N#opEQo$DS^{DH)QdW6!4F2)IYivsGK9;xWul9{7e^R5W3+{^?voxVn ze`0=aaBn%uppVW`77|{O!~v}&woYXL<-%6;#{<Y`oM`2!1 zu(whImF+Y>J)A@#%&8ct{Jj6ED^3C=(sX|Mw4?sMKXf=I$7!;5`QP`4S|n)_C6nbv znjsjRCUIV5Fk}Y!r61SPZiF%!YESvu682Z17yEa4R?`1vMXMYjb@x9<`&Rz{(Qupp zb0ZJA|2Ze|M})$U=eg4qeht)p_ASXcy= ziVc~R)b?VlFoi+$fUrPx>>aJ$E!(}z#9Ep<4t>P6`x!ng(+f0i{-=cGy5nI+L_d_y zl3qL(L1N4S(j6-l1C~2!4WkBj*|jX{)zhcB~gzWG+M7<^NakP1UYPA0_K_xnc`nhV#UyUK z)EJ3JVn0CN_3>{v4$_5wDmMdK%01V zpEpq=e$#pZQ3U<2mGVyBUB20Z%InU7LG(-6`i2@t8S)w7}BAlUQUX-G&e{Tph)o=4mnA&GI#D?bx z_n+(8|5uRzR9mV>QechzH`*H6$F5(VM+?8b8zU8j*Y!G77hptLF(Rx;mlqm6T|-I1T8pcqMqTOE zTw^FOxMwUaz<;%cLOYNpDVz{>Gc9Pot$|v`T+NOBu0Hv`mdw8V;&I_?u1e+cC>b>@ z{6aXVYE#2yjD=rVA<4B`t^zhCk%dKy%5`NC4gOwAIJ`|$7ALhz>BjzAH%%22wY@`F z&$IIW-$DUYv;XfO9GUt5_YMxW{vR88i2kR3|8JxV61TsG{+csHb*C>E0K|z(zAjO9 zt6WmDZF6T=;m{3UiQ3B#+YA3S&ni*p3HaEOEOb;qhItXj6T;|qHrM|SoJ6;9nS(S# zW0V0H1HE`S7LGJIDn#}#6U}E;O?FLjT@1^8`4Lmh>Fbb9D=O_%HM_oQ3ACp0g2A*wqgC$;%!a-F0X* z_wA8PGJCzy(G;%HUZ<=Gb!zss6gQ8P>)()H2$m*-k_akR3Xr=zMBV#TR!q)mnAABL zYmG|)r7g3V7RsB)z&esuc3NBj(%+OmCHq$(JGI1gXlO0^_v^a4y5woo4cl8@C4s1? zygIfclGOpkqb!aAjt*;@!*bEMa$y>|0r*eaTFPZ~8NNmwav6OXJE{0w**jk9 zQbe-{0HaeeQ1v~b_Xrw;;iheBVJeMW(2E6^Es`r-gIFN1lLA1nfKeC#3x!>Bd+m@c znrZIVuEe{?(@_3bjs5#qGnj=ixIT-2BX)9iCxIII|KMO~%Kr!Z+xYLBc^v-VJZ?h{ zAeP{RWCl{0=eJ1~5G@pn^Ld6(3k6>pIe>na32|qJ3K+lwVm?W;$SPNxh6u>B%sM=g=%&Tm_cIjav{%7(nxRFQ%&DDJlHANw z;4Ow8@F)UC|MC?2vXcam$63nb;QAcqIlCd}FS8^m^w+dIT<}ydkQe6+(lf9N=ow2X z*2DD$3SCYb9_WBS!1dvNfP5vHlWe~UFkH9_qS+|fN7~`2!O_}l2+YEfb9602jT}O} zgosPQ>-h{E4BSKGEadDh2TVo=#l9XYr@UjbHCIh-3!Y~Y8w+vW`g?TT?|-v6{$}z2 zzFBlxE600#gF~WnHy0TD@4FmjG@uVdT3@RrwVuNQUc(##KL1uP=UEgddEO4o|C{I0 zED6vv7E)s4Sf>#T<21<%%*YJX2`?j0eVq+y8TYH0kGD{;=Aib^6 z$nx8vj~Atm`a`iR1uxfe?yJ0sTIu}9E1kt*(cl`W&i`X{Xxe`q3ch{_ms(X~B~M(BBC!d?GF_rE=x$P3-+(pHrzuAqrDrQ@)m*?* z6_i+NEkLzYtC`cYT1!opYwKyPOvQ$2;sKj1Q?xxyvu<_U7soSphg)}QTZDF4liFv|N^EQV#+D*RKO{C9Xbvf}>@xAC7g^AP|4ML0XA zJ|JO)FgJfT!^7fF(J^%fBa!TO-lAfj#Q=gl85bZ<0(8RTo65W)JC2+i3fbUVc@F~+ zVU%vr(gWU)Z{Bz^KGH6Uk>~wz^47!u{@r5{lFFpWk`}rog$5dHr(j)mgI~b-bwg z!Xrm;J#x2T+q6mQoM}1k(zAPSrVTF}#g1~G9}a-!u`IluXKAri2CZWj6(ToG)85Ve z8f7smP~HoZzNmCey)EScTg^FRbGfr<+mm8q#BvI-&>XI$#w88MTpywFP0Y{Os5vwj z7Gxf#{1?n_^#S1tqFU}_>syW5uJ(CWqulm3w;J1TuwD16Ti=?ql7u%}aQ9zsj>Wd( zQfs`>j3(_x)^dq8Szr}QYHh1&Gol78$8SDjZ3lQp($A1qb4uOA=> zKA(H@Z@vFBxqZF+|KMQH%>OVN9d7MEHuALC|9=sO2#^;r4)CFy5=1HKGkW30mAnn5 z1{6-t!Om4hLU?Erg8-#bvZR5w`A(-ECyAj-zVP)Db$Dv$(P~r$%$H@Df9{!W_Ox67 zd68tq%dHgysFVNq_AU8;|8N`sdm~SK`Cr|?FDN|#lAhkR7juFk3033w0<-Jyi=0$LTg69kX>O z=&}xL$_t)spEd*3QQ=MV1VA=4v&H%vjyAM)4W6bIHAxFz@oAutxWald79*CNu zsH%GBh`L)9rSm=k&gR%rb7jA%)eZ&yMj5u8F90UFbh9Of84UDZ)DDw z%hPWEFVbkia>2Hc0P5ub!+{n5d$7Ni|2Oiq+W+wZHm6}R=ZHqCX4x6#k-WF_E{79z z?2-l~`Ow3#6bQ&`wi@S%QdF&RCp1+^Cs)L#2KWzt_G_XYiko|H!9s zbZ~e~!)O0`^7i%F>z|InTiGiRpn__tckk|is(NN|U}(UX&J&Ol(FV88SYt@z_!n6c zPogEr5Jn#}r2rHOfQuvy>`}}?NUmSAB$(4&oG4y|SrX4sT=aJSGmOUxm=;BvANTt~ z;^)2Vu!!L-?D@&8FLLGP{b_RBEt3A6@azJ{L6^1C#jSLelB)9k%V0{|XJbz(|L;vv zGz*F8$9>zV*Z&&&pW)%&_WpM>&m(XSivnda(XP_@2DeibgX?)11(++P(7z!!7(0&u z@f2j4zjKgJQ4|4uwxc#bVLW*PG8DlgTp$uuUU?7WVCNBt5zFDVn`USnenbHcZ1sOS zJwP&rB{8XqQ35H-KorKPx6^xmadlB78QOUSP6>g6_oo*i2(x^rHwlYA`In-<)4Tpx z)+hh+7t=`}|HFUgi?}ZVT|@t7o|3&U-}$bW-=;g?^{(N~&Ud|HhW}2oaI*8=|F`o9 zyoVX_hdX=zBH!tyS@Ik5i=AE=AlRqHv*fp(-Xiyt0QJ8H23orQPk%mn{nLw=Z+_~{ zf_t`6x&DWP;lbgdx&8+STlsGz&m(X;h4BPM$>gus+23|{cK!;9ZNf7qZFRrz4SR>) z-~QT%f7^NV=n?pb`u=}+xhygXi|PEDNFhZwM~s+Yni7giVTSrj#e-h2r^4xg-O*q) z>JIk0!=ug)ZU|$BSL@DqfTXu!SLf877-T4;x}=>Fln+W!K3EmyeI4b4YLuxbGzjPg zH+89wK%B(g8T>8D!0taDjfUSpZG=pi=W~?zarsWCG3;h@BViwQI%Q+IUow{atB&QK zK9>9HSRSl4mPgGdR`mDipuE3(CH>u7rN0Hri|$@;ulH2%^xhgeJ!nZl157})q34O8 z<91*WfFHsv_yJ}Jz#KrD^)0-f7fD8v0$tB1q_x4*L95mVPY0s4AH$Ehu?)?U1p*(E z>;n}t629fbY%<439NMqLmc)BlLA;}q$sDapyhD8+N6I`7R$~N%{dWBw>{s-6Skm9& zs{I}4{T-_PJrom+U_r=lONs44isfE5>s?}Fo+H3Qhlydzr!YeS2var; z&G?HPhP|?37?cddV6|a*+8Z9}JbR#z!=ACue|Y=i(Ie=gABK6fe39 znB^du7kL;Ukc{y=kRz(?AOkUM$!LZH_drm*9V0b~*gM-A07VSM=G%FX@Ms`#doEJXHI9V9mdC;Y$kAtejn~v^xMTD=!X^ieQ3?~K<)Rw#Ve!4zj1aJuLVCtm=N%1%1gsI zEQHpQjYqR7lH)Nf9go8@IyhXJ4h{`EIMnH2WRAy4PL#oyer1N6q+-=<{e) z+UEo3DTaPnxzBrApAVFS%&0ruUx~Rr{k|1L$K@;fT(bEcti1Uh7@OaLviXg=!@+8O zK58ZZ;_?-JF4@EmR^G%8490e#ZDNDfHnFFNt%P1&zM{`1%<9WE+c<#5Pq5bbWPDUJ)-8F;} z2;-y($4hp8p#$4)<9T{ezVYlk)pGR1$^)x!Jo}1fZlp-#?FM$QB}3XPXGr^H8_)jA z8_&M6@$4%b&#=2UY~5$}f!sfn{*PKN)KSS%lppuWqkiy?gWX>o?zDUB0Q%xrXlD=@bO> zZl@raA36mV5jE*8q9!#FH8Dh#JM!vwxU#d*mhv1w5D2uO3D0pHgTb*&*BOooa6(ju zM_A`$5fPK#BEqkUh>0O0D)TWow?~&|!Fz0DE12>r34P4*GhW*}b*srl+zru#y zMZY;uI?j1=XwDW!>-T1~evQ%k6-L{4&R#d+5_pUH%?hY-XhoFoos&GL$(olB`mb1~ z|B7}g`gr>aMdXo&#LgHj9NX{BvHcpy_A4B_-z};ec%3f6MEe5-W8vz4Z?5h&4vERt z-Bzyt?Z+$FuY}}JEPIeoqshs3bB&AkU_p^zz_DgNKPTj$7zn^R9SP8}Yd43^@=6NcYos|!amERRs|y;FZD2uWZZ~(^%(c7QJljd~dY>e> zu^>+Sf*2?1?(T0xbbI&u>H{pn)%7=cO9f$6=%C}7a_rX$?e~xJL(geD<5^|eZgbkL zs5q@rJMu$sRH_=PV+8KFeVu=^c{j(+Y;JelI5uV0>8;EnvJsd1JN) zt4pQ=i7C!HPH}cmgKZe0oSq4!EuWT}8;u0%frWaf4hV6Ihw2?T9(?kThvV{clU^UR!c z&r|Mn+-D~^`X*=E@dk8izX27Kx2+}eD-*7+X0$4&i6E=6H?O*@9~Ozq)20(skd^wbmRL5IfuLp1N8Zo1&3Rs( zv%6@Wvm#`z7(qa0L{|`|nZrxBXqUxbaX9r`oKYMtk$%d~I-R*~I>)VnQ4{&H*;<+EhBXw@T;MR65sG>6|*7&a=Hry2gkTc+rED+U+`HyA(FC zc$RRF@(k0&Iw70B=JwXt+?u}T&RQpA-#oEvlX_R^Y)qgW@;Nw0}^Qx7M$>?Xj#RFx`!HxO$kBtd98j^pxf z+ze9B8M?c?yph;;bOB5zGOtZOEZPnqX9QIo zF+s0>?}6hdyyq&y5(`ZlZ;47~Qz<-bg+h|$Bd$u^vqUe7T#9a&&J%l%$HHZXMZnO53_HUMLqJP@n-XLDNh_gPi(^-X-O9*Zh%`txpqcK+NNXt%K3 zSuOfrSuN_K#cQ3Q+7QLi>%~IRnm~eO5|NBVM*f|geK$?pKjetDDjj`iU-L-0=IpJ` znfms2i+1qs$&(AqRn?;JP1U@=*#`*6o|wk_`wWr2MmCe%#$SZ!ZN#uQi?lP&AFchYYy=QlXKeL55! z$kvQUm%&)?af&uLiDI>(N~FLVbj%v_?O9{C4B*}gz_V&}P+%c|f<2k`c=H0f8oMTS z2V|CoXUqR0Vb0aEbUfMiK#Q40pPKd6r)E`sYF5>!>ZCyvr8T7)TMC;l#(P+SoNfu* z$qV@>f*(kR_@3uvYl+{TS(Kq!Uu9@kRfc92WypR#RFgi_j?!mpl|D0z_B89OJ%6%>4 zepcbauD$RAC%L}6mDe|qEZ%KN7-PCE>LAOqE|1|?isf|7$M@~|__lQX-r4xmsu4b` zaAIQ}40fyS6@9%Gc0TaAg{B_<~Ib#PkOL7!Zjub6IQeFblQ~HpqE?zSD2Z4OSCKB9ZlP>M31_Kvks2wW-mIHi`L))F$7{c2EGWrcbw(f-)= zYOCWLtJ4zme=VOw7`+K&nsS0toaM+HA{^lq?k1qDqp;n@FQG0w4{PBD-OigE9Ef3Z zJ6;sH@}i*4Loatrz5zs80+$jw&dF*Q$DHKW-Dp?%#fRRz;nsG;Gk2qY7k$anJ*qzN zIBwj7<_v`!8b`9EzQvF1+hV8up0QKVvwra0_Q@#SObE2%NmPBPq$*&Qg+XDd!;lVI`*BEE;!ewP<`x0GHo4fXg4(6xfBi3{8Kvu3u)2h8Nu6_CIm%Gw98_S@Y)*E?OP(E{Js%UwP1YTh=@|NXh*}QMfO%AYdU1m zx|qe0(=G!;n(eY!rFiIcPq$;@t7}hu^(~%Izpp2>R!++wn+l^neaBuD&+X{(ckLd3 zThXoFHMeRdxBRiGvf1-?YI3uq|J=2QV%aKe^)9egtFPscO;ruD@!Qd`sYSiDqMB0V zABTobALy?RRMGH`L&GY``=U{ob&7hIDXLW|@~WFMv7*tw zDZL8^)#?U$)lIRZ(Y`7D%k|V(!#M_x_UB9HeV;FxkLyK)s;gm(MYopm>AM=v*sYdS zsV;{N565QLIlb*Vr)JkVhF#|@WPq;)mG<-E^fqdono;8zM$I#*v~Q2oTjh4DDz{^( z+=nq~S9zU&DzEZOxK+)?DfM1~%iM}fyW;BfRa~8_;_8%&t3YFBMWbDDb^0oCeDN2;ykE{^Pn!yT}yh#6V1qahqDOY0fV=})+AT&|FnjT$f0c5 z_d34N)2U%^9^ghDh-CL5bN{}-{-ELoxqSEiiJ*ujU*&LN@b#YLr-EsF)r2?~4;h5_qht(qhFju^zS=wkb^SP22tBfkod5`szDDRo@9}`cBKH$%~4| zG^t1K*zj#rjDo(3QBYNkf|_DvDNhQ$ENJxdfQgQiDjL&6%cgh_P7;}p?YFQ6`vn$NJLs!wi;gwLp`tf516+X1K@oWAz~1bZ#&Z^8p}&25d4skz%hc9R zJ0;I7rgO`)zR@m?X(&iXbD~hi5JD9_y3g>fx@rPOOB;<=Vz{GcarqVFebeFX(Ia&1#R~1T~AVtX6E2 z=?&p|whMDv^a6+--o6pM(g=_(m#QS?h-#_VEuU*)OXr%|UeuZOeoa0$6gV&dHjdMs>Jjun>eGw&N>A-g)2sryxX#!R}8^ zzS$)*(k-UT3}<_g)pyyBT&ftc=NjBnNF+fq1DA&o^W|6hZn+RJ>h~1`S&I>;TN>jG zr8v(?mJCt8p}ZL533IgE(HMkJMj&lri)oUR1dHK9#&fhJ`4b_D)GQ=;@W%+{Ly5IK z+anxqD0vhpt{IL6j`C^t*EfF~3+{k! z#h@Hv^p?b1^iC~{%zr%j;o|1Q)rW7-(cRmtTXgyM;^q!r-J%cQ-J$nyE`D$dX4(2|i<2FW&;AeexD`GAf6w_A`kXoL=)068BeDHwr)Whpo{vvP=#~(e z=8r$n2Wo?SdNM+nB}%U;4_OwKtt0t|@p^rhf6uS)-u`fxXQGoB5@GZsu--0AIw4PI z;f66zPESUo(aA*|qZ_*30Q@M5m+XWw3q>Ssh9gwE{P6+OwNkfS&kD@)&T%tAY0Q=N(H?#pU{60 z!QJonso?H<^~ArVpV;K}O(s98$bgei=?`a&V76p<9xp;_*&& zN4MnfEFl82VVsq(d!kRu87YAL<5z$H?||+RPWG+#97h|HL57^(N>S(fJ!$R!l=tn`F5et>D6*7*6d~6t_ zAidZw8v&cHaPE=9e54la>`MdT)Am&v!{d0LP)s=x(2s-B2=DUEU^qxvLIyu+iZm8d zj0R_fCIsPZ4abv@1<`UEk@B_4(P+m>Hi~eLM-k0nvC4$f9K}pl?2<=Og0C#H1|`o( zBhIK8ldCuO%HiP5S;4=P8&K>6EWA)ZN`UHlUlK`BPc)7Nok@cUL%9G| z`U(r#1K!fx+qdG>*he1Aq;|=j4TcKb^aeix1P$#-NUty_vq=j)`C&v7(KD)p9-|*N zBtc7-Z;Xw@@?F*;taGLi5{St1Uui}{B5Vm_VO>?!Zso0I6SX(LP!7jM-D|3i7k{a* zz@4^~5cwsAi!2Hj){@ABnB)b|BIuq*KW7}@A7HLynh0HzA8{6Of>dL}8(inBwqaC) zcFQnAp*Ke>>>0DP^HAn zGqw|i4S!Zo)fUA|Xug5td(EOFrC|%+op^eI;d2b#fZmUt7bDeqxe57&IC(KvM?PNk zJCcj18QbQV#xFoB1t^153jHW%YpGiE4TZY>pxwvpfp#YoJy1h?Db$q$m3C#N6<8OV zGvFVlIRkn>nkz=C)0_$Ug=nrAt0T=7{W{Xz7>J^dx1hBY=Nm2wWDO~dVi?KnEPx(p zi%1lpKHj_&fZjoivg>1-98K~y!=xbi@2@`;vg8k?_!psdqsKHktxbC@5&VY6q)L$k zbpi(GLYfW-`r3AIJ~(?!lQZ3SP<|4|@ZfwPV1da1l1TT@<;MaHQ2e#Bxv?t$O8-t| zgoa)=Nm+0=EHx5s!V41k{`$k%KAmxK(OebW732jHKWu2Y0V311C30rJs})UXzHd1N zugQug!aCDULY8oN@+(K#4xBkZ{+N-~Pvr%|LvaSjlmUl63t1A9H0NhL+>mG&(_}p& zkJ7DnCd}D&GD=xAN?1hBzSLula1xDhlGBm?i(=AoN)vJgq-dco+2kN`l|aVnE{?BR zOv9ROe6{+(@@r}8HP-w>4k1s3fPhj3q6R%PZ@moY>rI%66*6yGpxfc0>fm#{uEKqU z5;flc;v4KuXXg`VG4&S{yj)_ka00TJEZvp2iag>)WEM_Vp5x-_auGO_Y2bSkKg4sg zbZ60W9!AR`Jd6#DE--4-F~55xSti677;mD5wllQ>SDp$0vdb9{aV%$2Z0x^l68@`T zby0*cddo8UchNT%CKS3*9Tl9?Og%^>rW?pkC^caHh{ZH-+bO0#Ob4nlfFCh%+h9!^ znvC7Cqe*DBm|=H?mve6xMR>lN6DRbXsk6j*MZ9U?g|5H!rjCchxf4!Yk1UoX^4!2( zE#|XDlc1YeX*$xD$U#z4jlSlm&k$4@D`z2rORa^LwdDc<8P0y)Qt7f% zvM%?f&TCv5Jdk~HeXoSkR}#cm3a4=uSEW9U%joO2>x&EHtFRvS9UIFsK zH7?=bLJEv*jW)75ie>v6Oa}2OA0b?DoZ>8}QkEF}HKDOy2xF4y#_WoWu7^h8yKGHt z(96}V0pH?Zkm`8|_%6YZn8rX$eTJy?uMQ-%$egVAHn>&NMZ0vJ;fSE3+czvjuZywy zQ0U$?(#D9;d~fs?pGI^_RZxkvnPYBB@R0ZRM7vU18cu8ZLQ&Kzh0~|$z^B;d24x)^u z;$Of9F3VeLh-wh@S~Xh6p$U`ia$!_zi}Bl!SK?S#qaXx2GG?^O9De+%B9D!dy3npo zD1TIVscpuI$yUVRL_L5+bzwnxe46bNxB>cj`>KduHRLX8nH10cS^`M@3g`qOa03C_X|;l;k_>q7MU!>zvm z<-Bt(OpL5)&!blp+6)CJ)@M zY@8`YL#9Q`!d%LoVRs~#Zz^>%YgMn2y62(E`b;?>MmUveKVqv#s^Qs}(%&!a;Cw^$ zpHI~s+uTv_F-_X>9;3U4dUgxRTbfs#ql;5?_n+tJM)-BF+2+e^D28g7P=bmaHV;#jQ&h`_|$T@;gsO3JD<-8x} zydVONM}{xj%v&%;#Rpn49<7R&mned1F8A6%8KdhWT1>MviK5_FV!Uuq1NruAas8@L2gu?mLrrkY z{+ZvEHm_bhBT1f7`PVa&hi9TCMubJD5HYFHxEzM3o4aw=5n)l3j$L1eM5gC(R&(2F%jIIx0uF- zTEMiPj+25vqpj$xy0#C|$-hz1OdZy$iD(&K7;Z34MoY|TD1!?@1!gOWo$8>j((??H z6@4(j2pI;PFvTI!Tvcq)7UwjCD6>mYnK|gp#cr4DZbE~E$228LBq7U85g4=_g%`0n zMNj$Bkas&>AfRdxX#7h0`QuATDa6*VCs~Dy3lqIis9gPUjL&lNa`A{EnftD^Lq6f zM6zUyK;@B8tP_?aAq;ia&0qh5+_5_uImZm7FNo=peP7lRZ`O65v%)3AahsYMe9t1qsFL94dM^5$(j zo6$Dy{7qA$J>6hXCrGig3+Iwxx+AP?kj`dp?ImJ%@L2S}HxHY@)+MvRyKS z#{*=YgQCR{(od7M(3q&$?p%)pBqv9X>57E=upTS*>wQBnE?er&6?9m;x6{vUS~P9_ z*?2mnd2g#4jdxj_8zQWFHsLJcMA`|`Hv>ANIFyRbe!O{iE1K>&F#a_3iT1nMVG^ zcSsb3ZZz>%By#7`GIHG@SOzl^E@!LI4`#0GFT;r&`I88Hz7tLy4^QUP>2nBa6H?jt z#Zo?F#8sQOaiRv$G0_HMm7xmB$TD3ANHu~zp-Ohuz;w4WYLjb#EN$1%LrqdrQ{5ai zfoUhkJ|%ptT-N-&lwU;sU;SZ3O6Huf$TarrhxY@E^!xo()*#X$NiQCYlt83}#6-Gz zR20?0Lw-bXn+c|0Oo2}n|dx;M!q|XRvr$b*?c+irprY*nJ<0kIIQ&XuUykSclgc5 zpQnTz83|GZ?;9hlAP5__I=8ltYcoWc+dz+{6noEVO7h@_;OK{p=H$C1l)kl#vSs1* zEt3>w(D_*EyizA+>V$&!FNNinMWj%$RiLe!jr0QXEF=x%SqcXDrbD-&iYh>dVSf<%XChOl zK-t!p37Iy@ECX5%X0cUq5g+vYF2RLxBOqQa;}4+hSHjIzhJ`YXtLp2xavyqs_U~ej zKeN@(`G))~JO1^4SUBEuhQ1nor7p0!34OWCtAt@Bv03-vg{@wFsx6~s1V<1&-9p}) zEz^}bsYdDm5->)k9nmrhr+=@J)MBytmKK>SSZ)kk75qa_CL{m7BRnr=)XK4JqnfW5 zwt0ipSh7L2VqXFKY6TZMf)GacLlo^3yrrS!Z=AA3y}YKwTPq!k2i@+6l>o=0Gs#+f zscH*NNStkneB_P9oJe4hQ(1kX(d@ZP;1-cY=xbx>Q#g_mXtImrAxc>DfjOb_0DC9- z5J8m~9gWa31N-vtmbL@=QTa_mmi(74wgfJv`wC0EA1fLZdMrkKw;X}*k3#yrOfuH) z!KggaMVUomszZ%K3x>@wp7b%)@jFdc4$T_@Jm=->(nIynx7S0IK88a?wrRe9O|zl$ zwG7Mf#$j12QpkIGUD}T47N^?3ZPO#(sLyN#ssB1+c3Y&&9)$X@!#&MO$%Sf4v+Z8C z9c^*iv^xzcTCSs7bD5>3+1~RQ{MO7Bh-RcV`53~GRA!+H1KPg?L74OT9d}|Z0SKtp zTpUSWayPzLsxkqe(ZnbaTZGvOe9r`w6^kL! zlNDF6vIO%;D20p{*!MyH%Zw80!LV=-h@AK5l@Tdw4i zCOuLlTSsU=E&~X6F~(^e8zs%2Jv2aRMN&3^~G0>DFOyGTa~gTo?%d5srs}&ToE7 zjIpYRr67>s=E&@L_ClJ$j%WXr+JRaDn{ZOodWrL>M>?n}RLA?x30>NxolHwraI4*d zsKOg7Ux9K=t9+~=2q1p1RD+A4J%G72ozrTxXU37vd*f2`$)gotT@Sbd0 zwjY%AhEcvvR~&tPbMbz(#K0rrVrkEFvOP8ZX0Uh4IjTW!aE?STbydxx7Qd^)lheNw zorc+Vr6B;^-_pMmiQ_B4MVi6<9<2z5_d3>M3!sLFDt)nMJGjf>I;aPMTN%>901#5M zQY+fTFDF}j7J2VI2W~~SDU-#*)Vj5e-L`{zqy9kK2&n#HH}Mf?s+iV4#o1Np{_zj5 zM)Z%o@!8I*t^NV`J=-P!Bqv@W`$ygS&rULa!OY;4MHkOjqG%}#p{pfU`}eFdVE}t~ zeEEk)ukMu{3=p^WDq8pd7_9iWLeU*eeye`XTiX)o zp@mIq?(YQXx1+ZjW( zhuYOg=@4yKc71->wxOE!o7~CRD+@UJ)0OW{7Q_jh#biNd%h_V$PiCuS;4h}jNw5l6 z(Q4*QBG;c|9IcjkIq_!hV&cqP*9lk8V^u`iWt73mK9ovxDQ~ZITND;S6lG#&E@Uz! zx~rm=DqK@Vh|8=A8(AE24VGj60Mc2Wd133za6m^eR#n^F{dvR2Q{ld;Kn_hI$Qyw+;7f z&2SmRUztQ3oO;gN;A|lE0F2(=-Ce7mI^sxIQ2`nd-_OK5N84DWvR0O+aS+! zz@zB1oT+^geqRbLhkaoZt*+UN(P$lP>r{RdDpkzYwnVq;^D`8xpu8-7DxeMO)Po&G zo4hiC7AU_fUFtz!m@3VcdNG=;0&SVZi_;@iO+T!E7Pa6HXrCsap1NnXbbLeetc=h_ z?^GS18?ZS@Q{(i;M$uU}aEUXI!YFd1S?Da5tJPw%2>l==lhq`c&Xx;89M|_&^JqSq z`R-yqTVd>Z{&eQymeh_KLR#I-me@+S+N*<936&cb%VbsK_g6HDbO96rYaEu}o;TI2 z_N_Tg8$31EXMjC~t@?J*q`zo-1CE6L8DL9zJ+dLXY#o%NwxD7p#uNBXU9#e<%b95$) zZgNZZutc>m6>SD+vo=y807^5nC}E|qk{ioh)E~o?~rSuRmVBR*tie?=NouV{qMJxRsj#hcKFVkC!JmjnE$H`FqcV-=A-=?VDLM?>b9ET4L zErq5^Ei=Y3+7Hn+%vq(zi_&kb)P<5NJer4WN0q#ZH`=R{*t@y{?<@G&m_x;D$*Y{&2 zEq(C^W%H-_DM1+BU0zoT>#a#%o>ZuWD$dWxn|JUP&b4u=bZAmJ&ekMQdS$Dh1&J^eF}hK z6QDki(yzo4MT+5Q?W{~+FZdt0FleH22da4r>X>rk3GnaWJNx~@b_m|W5n)Y~*BUkm2CRLu2sSmCupRKOdSJl83MyRRH#AtGJeU6lbJA}oPWu9+5zloKyEYY!I%6%7PCp234UI)Ke12!U@b10KBg z_aM|ey~{1R`XRbTg}O8vT~P`V6yZ)Z#j3S0dW@Y5q0?kqC`I+}>q7atZTA*BKKVdGf`dKOKI`IH$A9W5Q?JqdDG2pF4)* zIL>S`f&V*>Q~$p+37jw7iRVsczCZP6UpVe;;!VCl&dW^k@XwCtIQzo+?6K;T`zQGs zjYcOM8j2#;LbEW z%QO18ABUU|zy|rtASb`%XYhMQ;=c@dzK;pt5Rwnj*8Ux6*UIQ%vOk@W%&Q9QqAb zd>3fFpB$J}L<9fU0|4HEB3M;E5olp)GwCa%Uk%a48;U-#6Iw_o-`S!t2tLx9JPhu} z{mD@tKS=tb@SkrSP=WxNs9AVo^w4v4f!#fxe$<1>%!mbM*ypn|d@*Bo*}KN5ZGdek zLmx0O5-=F5)qWOW;QA_2qQtmy7-0hfqc6AHP9n7jL?E_aArbPxiK4uC!LqBgv|q$C z=TtEj7;*d8pIIh}dHdoi#`^*6&$L!1nHjw)pUXg47cX2C z%AOJW+5t=NG{>X;UJ#uNot~+qsBktU8k%omkVV!Zvs?1qAo_(-_C!_u0P`gk8tDg1 z90vNsKBO+uNn^{ht9_>aaGwhXalHO8_y`NoBy+tx+WWMdkLb1s@=-@v`Zd-}0`bH6 zDtdDpGI1a}^bV`6S8m&&2D*k4DrTxa~gyVk>a1eEJKHuh)+=?Xh0EU``Tm zE9Tm{j-ZO@_Qyc%c)nq=2ELW~2y(sxeS74E>usDMr#V zS!5K?J`OQkkn~2k*=$8xLV?aKv-#9Al6R2Z6lY>wb+A3oI9O6}2sB<(6k8qQMvA*C z7g7%D*X_+EdwT`gd$f~fI#kv~YtNO0R&K2pbebj^e(NI|}7 ze?P2^C*cDbcUV3VDFwTSYozK~3dcW=%yrU~`J=+Kq26p2!u4{d=fb&V^ukGK`tDa2 z=cm1pR4LKgJgli;BpC_eHo<2IJK!3@KmS4n2Fe*;fw!&1Lh|=-f*fO8A-}QDPPk#jF=C?ZGQi^>{kF-5xERC5MWYps)q$_l}V8Bz5iYCqLyO8|E4Ky}Px027G=VoRcWlxytSl zrp`(Ho9pxClO$vLqD#;j2(cH@OSd<2g8 z6r2eb=HLk>lDOfV39jx(Ex8o*0=*QfbC8+6yJJC()Hug3icp8{_>K3qqZhci*IaAQ z2TVO6WTFtjeTfRz9hgv%)GmT_H4#5#jiWC{L=a(|xA-_E77WHrVc-QA8b5g8`%M~q zGM!5Yg2!_Zy&T7SzWbC+NVKSIP|TnVAlc!O_pJ$mU7M@4*5XHMz(0MMZ8Nz?f%7<~ zQSN&uQ5-(rn*FLs#f|933CX4NDem;=F&YKQ4kJt6I+MN2d!NY?#ll__WSd=NDl}rD zdX%0|yu>~s&6GB5(5V0zXp}a%Srwdq4~k15*JvFwUR8sHJ~69=<``UG*}irK+FzjQNQir2J`~~`cnBb*I2Rbu4=18w*Cr*Br$)3)J7R! zAu`NMXnqU>%_Oa88@)@Y#W&Oc?;9$F<&6PPV1YM;za%>rbh^LDwJ&ZVqRyN-Xf5 zjzc*%y-dKU{ZcJU(|TTj7<2nO z`Ofv*x*HK58*^K^DB-5}kSO%&!H8NS(~!#pK>AwO6z_cQRE9xUugEtTzm-Fj3$1r4pK>s+*@4$+@m;Lp_jEUeujI*X;2xJDOyE+CpsiND9>>3!L!Ym7sD5>K zVl4lfAUF04gx>jVFS{k_Fag}GS6W~R4&2Z;XMLI%~rpGJ|NGt zb347ezw~fLAH5@PZxn)^Bi5avMf9uiUHh9*8KJ9Y<0*)FxY8;#Z$LH5m5@Vo0Yh6M zxGIBxpnZ7ieN&4ciXWl!g^_a14P~Q6bTZwATC|Grla9b3NDf05A2uTpZ#{g_s%5mO z4wec(TNysRD)IR!pgXL}ObqDx(wbXMi%wBdBd>-k* z*n;xvu2R&947nc1oC~S=g!tVyBOiYn9m7~3qa7=F2S#IL%k5F2`!?PU#Fo+GHHe+< zPo#lApadEM1%Elh38+3sY(}`Objtf<^9DyBp?tzt31MUwXXPjyoB@ z$KNA=eZ*CxK`(07aL-I|SoG6rtn>kjBT)SJzUX^_ilc4`O4-xqI)d3p8tI+WQv_Gf zBCIYSf045kTiAa*b3TKA3c#V?BK=VCdc&3)#J__g)*Ur9e_NUBe`Q*22Jv|l1*v8O z0Jm$9lI=&w7UF(J@_I9W2ZZ0?QGoQ1L_sl$_@Qn>!iallH~h@^;0UqKCJRT`IO2l? zQNHrRk;%%J0*^V{5WC5ww(YydIEle;8Qh)DpeJ&)?B{I;SU*Xi1UP9_(DAGIc@)fX z-gGhvSr?2^o;T{X1Bigz0rP1vKkI(2NAEq?>VxXEF|ZN4&^Yfi`6IUW<1;q#$3-O& z7P>}iZ#&+^592WalfiH4O<8W(_-X`H`UKWFkccm5;^gLp^EAi||0!`^MAeSm=by_6 z|G9)wYs%*Yd+2}rIrVpq$8`MY)j*y~+~<8kz!~-A^$Oe9F_)Mqj~{zv`shw;`%_&z z6?-L6cI)-(KS(~%9wP=3!iBWwX1WZns3v*es7`39T8d4MkMmxikGDf%PJbG;G@5V4`>Fy~&-M@JDe$$Y+sGQvhmBn(lJxgsxd$Ja4Pn(q zS~h9Df&D(+MmkAK0V&oulOJ;KUOpawo=*Qwx%MVPd&x`u3}wkrf?wf|7GVaOtdNr6 zFrS#3xMq(+S{+>gv@S2a)|i$l0(V+iEmJ36=xe8n5A7qBu+3{+#kfdVxRml;qdsn* z7~Geq3a07k|7f`W!sFB|?`(6q8Gl$h`)(c8Eh%ESm3PMeXY1yIWq#hhZo-|6ex#vXVsa{<{8$ z1>G_VhGpzEroZ9^f75U@*;+^Gry&YGzqRld7EHS^Ft4cXE<)1WW$0qqo{#a8jo|SwKJu^6d>jg2wz3jm&^*%%ZoO~ulBL^Y z(69J!0LyrPWiz`~46DH%mnI9ucgVKqZ@ntFoKW#}*v^fumR7|odv!SE%f4Ec=Wn%S z=XF-uuVRpz^W`fgx0Jxy7sCaWs~@9upi&psO?av!51aT?lkuRp5YcE0GEenptf$<< zA0||-SBZX6T-1Zp+1S??XbeW{5Ye^ZUx|o0td5K>`NwJmV>GvLE7R?XGsI&QAFXPk z{h}SCL(N;py0MlRES*9n#ymKJ<@!k2HJ-FZ;`V3QqIzd zuK?8cI_c;lmVRf+4!=!m9jNjdSPkh0wER{#;;v>0Ux>z02=(??-p@=@1y!xsU909a zQ~0Yug?|m5yE*bNdwJ^g#Mz&ctn?FIfk!nu=InK>fpQ7N(oApvtT!bdLf=y)mY+2m z`)2~|m;4LBpx=HiFF>Kmzou9fv!KRfOZ)KozNNh{`m>(x^ApOqbJe=vs>X$Dwa@wvS#E zyx7LYnGwJ0cn%W8tG`C-q}6z*m!d}#BF2G&tPAbTQJCRwBiZau`+c|0;(xfstu~4D zPuKOxv7)v{^XqyMf3@@~(SVClpdc0>VX&y+H7(;6aM;7?sM5}6&SO>6NHmrFYj!g* z7~!BZs;E^#`uqjoq~W@z6xIFJaxkYeL6Wg-hlC+-SnUWkth#Q(UmSUpg1J9;Sv*t# zt16DSg3EDc%&xXIK>Zy|-Wp*xg-lpArE~hisTvyp)%wq%q9zGdF@uXr^e8a#?zP2k zKt)W5;iNhApUps&j{BH+wMy`4N=u|14H+xc;Y0%qFN;J`2``r|Q$<@*ml{b!X6ONW zPE4d+uy@YJ!<~(oULoTE$9HZ8>zMt6FK!fNcT=E6n-Wlw3`PlnFPjm7#~_A81~vLa zR>8hKO2a~juB}h+MDA0*d+7z7lf=E?IyvZZ%f)?H9pLeEA0z12`vy8_xmINC7h2OZ zkgLoJNjlv`L@xK?AV{Jk`Mrq+J}v=EjsJzvHl~e2g2Ka61!?X7C!;-c)&Yy6m2QDP zjYSP{mb%e(hSE3cPOx{pmtr%(T&Lq`(^26>TW2!GGnv#+V7RDe9#i9$VeurtzE-(w@~A#NdM&s`7O5= zTsLXoc(;;KNVNiJH-C$$ye|`WanS`(VJBv1OSvrF{629`3)06_@@4~L6Zg0ms#RW{ zW$B}cD+iAlvv*F{8#Hzyir|Px&mddOn3fSED538&c7Z~!TvL*9W87oLU7q(gCIqY8 z2!Gc9mAYsT^_jG>$D}rB=t2~z&XhvePCjI{+)OR$p72ebglZ9sC!fqk)cZiKfi;dN zYtaCLm>UqQN|==|WWre36D=n?A zVCFs0BLZ#I;RhHgQBqY;Z*JOM6B=$p!!ZI5 zdN?&@^lWW0;9UQ-_%fJwxz1|0iM_j-)a1X9UCE*;(nvBBs`qQVfU+O>RL{|a>YoKB zO-inoa#3RRaac+LO-fza?y{1q`L09U5Y2>^zxTKy%A4J`wH7L88%*4kT~U;xQitZC zRPdJVd|TTeB$Zf#%GXR}qbsdv`c;igkL>zeS$0_dcR4&1oe_c^g02x- zi!eheNkyy|Q*9W0y0R;Bv-mLCWRQ))@OY3&)POskuc+2HJR{v%u$bT9XuUJ&+F_U5 z_DL_$lfVXByQc&WZs%+M4cO+wsE~QryN0?Tjm0F?RFIBJHWptuD0g8JY1}(=Xey_c z>7VbDOjiCps?!Q@>Zis@HWR00(KTxWcj${|EI1mYiDAX|g{A%#-MPs#h7>Q9kVX)w z^w&?9*g=`U2T-c_(0iYxW+WG5pxpr7Y(i?e@qj#Jp6z`|OBPnVn&VQd)1Xvul7BHM?A+Dw5cJ@o8_JC<3HWT4@*M-pm88KmZiLof$w|fPJy?iX zXd9rL)dW4;cVv_G8XDBL;XjwWD(mmF5OQfJlM<@jSVil(9+_0IvSOS3N#UToWQo%| z*HYKlk%(Vz5I=g|^^2mHMETRt4NuuUKnC7~5H||80knAJFurLbAwjVy^}wP4)3q}@ z)id3pR0v@Ev3ZS1h-=+e&6tdOz94=c)|z4{77>*SIdT{-hMa-I1CKv1IwRjZ_*Wx! zm9&SB$9%_*B`CH68$!*ffHOf_$BD{YoIOjJ=??~UdooEYQIM{J7?N>YxJuhff{qVT z`7TG1cP$Hw>M<{qq&g`;FI~{oG3`6C2SG08`H%8i`#*is7WlE*;R*;Cv%Bff9`->{0=u zWW>JP7s$^~gUz+igttcA&V&sc6MB7BA2A~A=kfJIeFh)~a-$Vd5K2<6YSJH+?|u6` zu#@U$GMD>#5A7I3djF`u-$vk|yQevKply+3e&_|bd9TlX$N=T29<4}UdnK++<&qHmf;E1y?; z-ohK&nA{j1>khS^=;*|QeSn6seO%5ivR3epKLmq7RJ8h)!l{gWIl+s)gjK@VO>8aI zJ4)nU=lVm{t8c4Q3%df}I3I(FXE}e8pHl(s%{m1_vq;*bX<+0cjJwH=n64LodA&db z9s}NQOk|{VsSbID8S}23gWM8jOUTR+;xp(G60wp1sa3K-kaoe8C)xd2E?m zf>QPc`1gSp*)yX(R1V_9gNl0wjviZsjL#RxR0%mVG}1lwMKC|oAF!Py`$;^KN!phGCm`#n(cwnpX(aoXjvxWD$M0vf0aH9)y_;`U26*?dN%WJ0Xmw2IKa4?%qX(V$TeQH13mjFEwXyXL zEOl(;NU0md7Vu8BD1w^B6?6G1_Evw1-ra%KFOk}(Oe~Q-p4alC&E`SAoE*~y>}-G zo-vUmw^Ly(X3+S5tA&Na!fqvn z!pdly>v<;3^G>giWC{a+|L1S~0}U!yij0LU|9G7n+A!!$HMOU2hdL}HmH~avr?ifp z3>g-J3L0T>h4BYBlU}s7WBgWq)+EkY${g--paObAF*JEDffxS=!Awx!4_Pd(?_vZL zjG8EeKyl|m?CY#6pA;_hOnF8nU!IBN5Q38if;}KRKz)-C-KUSimR;h=^c}Y-Wg=bi zeXXuptCy|~TRO&j5EzER+Q}f@rD{~4eAvgpLjL7z$1#qG6H&pM35g6@Q;U0MX_j3X zYaL`WkqVP}V79l5$N9%(M#U<4Y^|T2tRhJzC}wDu=r^nb36mZRk=HOHg%H1b4VrYh?9su+0T_p_K;4A-YLZ1Lxhr<0sC zOwu+^v=dYrvwZJQ%aB4+ph771x4`$lgGn5=eoJL$tQgPwn0LW7&4b5S#6db%%?p0K z?5)nVkir=$Ith;dak-Bt%s9v?v-K=uzV}|9WnZS`8pyo{9%5&H?jWP~6?(e|{`%BT z;=sN?zrKIA3cT9;cQ94DLIo3n5avgs|NFob4_mdrf&MWrUU55+*U#VQ#@S=;iC-HC z-3pkdpi7k|{Y(FSK_dmO)W?6QxGiG`NY1+1JNAM5@$D z5|01lYIejqZqrSMfl zqy@|O5(;OqL(=P@+4)Xxh;a@>zMhZnfwR9H$etd7JHU;HvtClZj%XU8ZR1w-tIGrL zi}#xmM}nw7g2dhH|2g`1^=Sc9VN1icJ(6bEGi#%FHh3EO9_L>%h*pRlN@MgV8v0(b z`QwmzW!42Mr|E^EgSX(kgqbKD`S-48Z%nyyNEeNH3JTfh&{m0+M#VHQm%i1A-7EaYC(!zNjN`6D;D zN%tE9SSXlaR_*j>n^b4bw)B8W0|$p;okHtRb$s0<`?G}~J^ywgnaZ!ehpAgpX0=oQ zZfAV<$s;BLF>J%PpYW%S1SVFEBHS2ipYHW|-tvP<`GLK^C6LWO$8RrUdH90C?&3)? z3c1Ac5}rSRfdv(BLGisUFt|&(9kdJx`mB->fkyKwxy@5{PXIvhJgVpmG~9jtM=qoK zpZXr{s;?n=PlH`PuhGQ1d7soWsk{v*tr>`&`|D%=&KAle`gLL!g!r2A$Pp!?x24oJ z#eVM@IkUt30e|sVl3sN}KKj#|8Yd!Me(gbFJ$|NFMro^A<#RrtnMkC3SqJ`L>Pz)S z=ZzfT6h8t5;T?JnTEdMe38BK>l<;b457(hmL74F&S&BD)Ho=PgpFPKAmF|W$F zM}jl>%DiWp!P;0`2+(#fA=pNo`u(A9d;vw=vGr_^_E%2X`kv}k3V!;|4y3;ERKk2z`QS3bP(Q6M)%FYF#c6Q;c@`<=o8Ef z&BtX0GViGU4W;88I^k(P7%ee6jk>;0N38dMv*LAa%#t6gL#s$H62mi!uM;Y2oAKGw z2KhYm0F-Z~952ZS_z8C2=gy{DA2+!hW`(YP7&|xH*JlZuo^7#>+oY@2O=SpJ46#~z zxXu?3jE3krN{epbHpA(#9rFYAejLqTq3lcPLSebN>4MW5n6Au-mkqnSxp|LkFl<`T zhW5g6k*^%dzIy@EnNp%D1Kx2UL&L6x-;nAV<28(vi+wb#bZ5OSl*@yT=}XYW1JznW zqYK7_%!dZAJu?m&1eXHpTb4OweiyM<2r?myqylov6*+3=6NT;`_lEs6v3iavbEms+ z|02C%KA-$$Mi_2=uA-Ixq(2LY=`X3)OLljaSpT)9@K_~$6Qjse6EEBQzPC`sKMn@k zYczvZO7ia#5rO-gWZb`}TDL?k4bFG1f&RU^1^hluTBB0@r4f9QUa-;O&;-;J$38JT zxyN>~XsD-`yi%;e|N8<@^r~ReYDbcUtva`3cLul%nSG`5m|8laZMMSdoSoxDAzAF>X^R zlRZVkUN(#%390ea_^vH(>CoPF_BT+7_P(Z3Fzs_4VJ$sXeoHAGx*}ipbIsr{l(wtJMP zP?lQlJ^pnq949o@wAh__rV)p1`q-`Ul1_Maw*x9OoO*$P(lwc1klA;|#Cq`s(V(gS^FWG8%}-a@qPp`7 zI!z{pPCfCF*)E*KQx1A+mu2tUMuH|uumikC4y(3i0PWUF|p~(PVeq zCo`FI=e3|NTvHH5LxN1pyDQqMyco51Qd`s<4fCjA>8R29Fw2mgAwJBzdiFHj<0I zDTi>w+`_VxXGrrwL;&rJTpYc6#2w8s^!IMJYT=QI~4hTBet8vAD z+l?K>V2Ub*aoeN*MrG$H(!N-bSAAdvgBJ&pS8Z&uU6}ToV9@@?@7p~aXwc#8EHyYM z@*0(=E(+qOS_%8!k6rgn5P&Rj{+jJ|^8y~H52CfOJ@Nd}W_k0Io&l2YlDELlbvV$gZQyTCHe;&*XAC5+phGL*;CXJ@Re)BC(1QT*> z-)(7Rl`syS*{ycru-h8>M28qvuXJEfTQCJJPv&(jIsjVe=RcwQ+O>vbkUvRQpe#B2 zW8}wP;?RkOOYXt>^|RB}yOLMq(`y3p;ow3^j#+kb){dqMR5_13x|1A2z^Ub-PGe+X zzw3q9$@H*VSpW{V=%d(Z+;!v|3YqB0r-x{EP9E3fb*bQIM(RsQ@AEp^O%D|}B_|&o zY=kktOVsgw?Vc?#gbk=soNd9vAl?ls24*EJ7_OaQaU$0r`Z(;N2jFF3Kp9IDq@F$> z_+OMbDc6lI>QS?K1VpH&67nrgIzP{mj!{PfeT;zOtKL5cjkBusI2~oq;rK-De?)1n zIU?wm7Sv<=j*O_XF>-u%YLG2uQ0>IltJ*q+cK8s^@e(?9PJPrisi@;r76Y4Uvn2P(Fm$e-6NfK$t8(o@> zlZF$9)#sY+AY8C^^tC&Mr`V(>{ncB+7%tWgIzI2-ZFVCg`6ZqY+T? zu=k9=-vHqHwYgpIVEvSP07i4u$ZkyO)D`xVWo$?L zqdq>ODyFmb#}JX?@>Ci)%$&FfZ*tPtPUpAwH9NVX8hE7j;gn%x|aCHc8#Ux zimPgMdyH%Mi<1p2MH|Nc6ez58!rMmFO{~6>C-Njd8g^)MKY5G#Vr$9;M54Qg-;a^p z7)&`v`1^F=^hp2!ICA~k-xZc#4QAjx9EXt8pW+Cj7Py@?;^%m6ZV$}OYjXU$5#1Sf zPYu^k%@{lLanJhdi;pTuCW6V`M#ZCX8WS$u7%W`vg{;T#b zsqfyp5GywLe_G%mR!R|=O3qR&+05@JVhWF$Z16pB({KjKIc>v70Lb+@J(w|g%HjTH z#=PHbwfl^EQ)M<4(n3{7B^+F(1Qbp7z;4$bDeHaZJ9Rnn(_F^Qr;g6&7Z7?!3F9uM z4(wW--UArg>zw5HSE%sev&_%eTcEl;bZ5Eduwn}ucP1D0PM3QU*V?XDuJD@er&fci zNoj;;df)T0H?Orob0S%7;g;W;3)%>^{RD&SXS6_9%rE#sNdVwITQ{=aQ6)^SEtPBT z3kU@I01choLl6dU$8cM>1msc8(73MbPe;X@>Tp&|WvD_kFkk`QzqXvAfT5`EX+1vI zt;jY9U)ol-#aiRCx<#dzlF|#U)0C$?Foe1f)10}2b=&S)%4NR~o}Z5nyTX?BUy^i@ zzZ;ioO)A$UBhRVx?h)%xGHC6q9)`ecfs;qYFd}C4SyWiD)#VKJz{GNaLzF=U$Mu*Y zxk7o#^iRN?f|@Tj`1&9tq*+PN<8wnKv%nf}fF-L9v#{vdP>{OW})O&`3?^HAJZ`0`gBHQJZ-}o9`q{*1g zj@L?$yX?nDKBF{d$r?TGm?yHNuKGf=l`Zi5QKb7F{U-u5Ik6K~5uPSYnB4pud>LYt z(3CwwtH?4c>}XdTm{}-t(xahZtaeF42nyE5!GNfhspVghmkH@adplGFn>h2;xZ;f` zCdFkR4=!IthZoLwH{t+|ZylbR;Jc*92;3V|Cs-ijz=PVrcb3*I5ax!a7kBGEXlw8e zIOtilRl-!t_kL1KE~HR*j0V$5t~|-)5O@^8_-^1gZ~uufBl+}kHT~hx)UlH}*s5{e zriJ%*g$xBCrKXl%ZaiV<43z_g6wt>gMVeikzqV?$3Tf++y2=mMXNiXqq8p>=_qq7L zE{~X!t&2Tf-N#c&B)Zt@uP11})&wFI7;)>evfWhgHlCsUXi9-BgB5H;t8rc4OVUbz z_HdFX+k;)MHuB|$Ptt9X4!@cByLEA0t2W}g55R&Mgd-!k)y33i`8!I~wgRw#dnI*5 z1%Lc7+S@oFRyQ+6AMuiYU59G_!|(fgvp;dHXxP*B$14EG~@&0E+UcXR2sKGuKlFuo~a1!tTM?y=a4O-+%rV-NJM! zZ1p**+| zP!Q$oRHNfN-n^BU&go11a$jE^%;O5Ho)U)QvDWKw*R6#qDnX6LCu%QFL#leqmXd~qbEYK zp;e6Q1wX(9X1_j*`_kyTbq)hpG*m0oWIWm=GmeHYHP#HMiC9%8t&tBwh+*62w5id! zR_789z^yP5)>S1aprc$SfGKZbOQ84tJ(_7YHs71DqF!UcnWc_QmuVqdBobL~p*tIX-L>sNSIr~5pRTU_gM zLbv{e{xrQxzGxd%Z2!35GHS<{^9((?BD2w)xNz4!zcmsH*~1oP~Z8l=*~8T{Q6(9*41|>W8>^`+4H|*&c@sHra^00_Z@pq>C2ITd{)WMMctQWbsWJfbe}_- z>yYe!{K)%XmsgV)?r-P+|K4qOc)F)=+~cm^T>Z8j-lkXFx{nlhZKJvVd0;nB3vEeM zZw)up?EHKES+ny;5vRGMtoi>kubsjCfBDd@nYVI5^*?mv&3h7f>2zSz{$Da)jUBu5 zjr|Yj9Ji<3u$w(LMtP|gdGe9Z+m#<$m+YnyQewhIdrg98*j-Kfh93I#x0x#ThzE)L8+* zc|cJa7Q38wqq`UpiEg8Ok*Tc_emHB8+3(-M(Dr+X^aGscTZ{5yRD;Z9Qd zryZ;h9XoV&=p3zwjLXx)l@cuf-G3RZr};=|QHw&Y9uuoAK!O-FXGw0FN9IS4e9)9j zp0*`M#rUwXe7JMKf?>Et^%ygmF)9V(j85`j40#cm02Wu(aTzpG^e`ec`*WCXThsXR zThR5T26dVE(h2sdC;^43Bjv(+RVokKWqw&jXw)%}gPpGkf0T;BG2omW5@EU!Ye=St z0)W<1E1kl0ey^?^Dlwv-)uaOpdW>$TT{nN4+41wEARz8)dnY;1F@Qz2p`En1(93B- z!>OFLH=iG0h;!nnwO=j)Ln^X$z0mniA!5BzQO+=LqOb>u99{?rgBNfTK!3`wpe>mT zjNVTacI6$45AeN9&Y@mf=Bs{4~8;g@20WXyXw|#H)$Vh3`vHM$qtW&zs z3q3SiOSusI@Z<@mdd{7`JI$#jumG0oPoS4y_s9s2(!!K_n+8U8Z}!(D#K;wQ)@WD{ z9AzQAbcm{dtMlwbYW7=o^iX7DNp9-S1ggLCf6f_^&@`~mvWpG1SOeQ@3IpHcJFgOK zozGvnN8SSu2E41hJ$Y(})5Z3vM0ypOuT3^fC8*0o^!BnV7iwV4DJsyQid*5l{Tj=VvYS zzr05D$2c`k;+>$~O2J>^M)DM{sI#2;WPC|TFeMJ_4WTefWV5O6vdttc`4;41`TD0$ zoV~4adGr&*KlkA-D9lu=8Fb<-rbJTBWXiTkY$eymjS@)8GdsWg-h@O(Y65QIgoem8 zoz77aAiu*>$g>VPpKp7aN-TXC@2;;;2|1WlG;zZZ7X{7*GLP}JOtDncGVw)9n+J=? z3%|PQDr*>pQ_G5;B~J5GBJZV}xWI=ufA$y~D$il=SIKDEM6{7hIMj{w3GF92kH)bD z>lljqo84RDa#Cz2fVt>?tC%sihVJkZXoa%RZij$g>NV;njc9`Dge#!?)HLKWFT?*h zO*Ismtx-P%X9rl>wQJwa6TK$;{jQxE_n}qHvy6Y;_o4+^%uUfxc*c2E|*8-r^ z5;fu3Ouqf7mw3`VQ+_<8Ix+2{9HeS}j{YEUc2acmy#7!tNb#Hd{>sBNU#n9mEQOoY>n2n#_ChY9?16>YeJFizs^9AK2KiI*MLGi#g##T*nE;JMvp~ z3k7R3xX$yC@FDK&o_AU{l6<+P~pwn$kbK6M|78;(~#oxZdfMqsQ)}use&+3 z=e}~nLv79`Y;>otY%meAHsVc34T&_%L{FOf%5=*if&DUS?a&8$+lz$D&Z5gVK+nY9 zd5Wts18^;0>4nlA+6@=LIygPYqI3erIGgp`KeniE=jSdUfp)*Aqy57^rWrT4>&NG{ z4YtGk!@u1vAi17Ue`q?2KWAh-0z7MJOgkr6O{V6c;#V7#9D~jtFV`1^kFr99my5?3 zvtmeFVGhWwzXq8BUFUdTyKY8yx*uK`jvSo25?+SCtqY$4qPqRzJE-hz*fIg?<0Yt} zaeVIX6ob2C>my?_WD*b5%Rx8|HdT|&nPn7%v%gJo#Xaq0mk4x|09E7RaY&}WO(oJ8 z>@ajG#6wbfa7H22e^Ee~ZcL~4>HY0fpZLzLJNin8*$<#pes7M>XT3{>GDgD8`WH>X z;}j$hA%k46KGx6L5@lv8T32%B^?O5lqy(9?iDIgS!5?C|?nhORC~1{FlI~b1MDv4) zePi+H6nP`txFZX=MZpWy;ts`lqHQ5T8^<_{28@bV1BcRdCy_hNCEfT5zxMH%jc>z? z{N_$ERo0F`7wsXXrsr>tX;qVhpIfv^>ea)$i4?j6)zjEE`q6Kv8XbM6TwdqU@mss~ zS!E{)MzR2}5e)L32fWna{b9|m+!u!#ziNTIrR911bVKT@e0zj&qrd4Xm(?7Qk+DPM z9Z1Sp6e7Bn?rV>3mgiqS#PhTC?lY>n!5)*qwO}D9Ybv%95S%e4K!iT-lPJ-a%L4)g zH~*Ce2EvXX=ut*i9OiD%4CArg*1(e8GD|fjKup3XKublVJL(qb|4bO95Nx1Sp3q^3 zD#Kg2pvde1RaOga%(IGD_SD@2`gE!ukfPflPnwN> z0z_2UmWO>zQm-p6wOua8GZ8`iK17!zg}X<|9Jmd$;b;6`Gv`sBmrJdEUoo4nElL&T zX>=lJ0N?P|$9JVUl+AsSBUaQIv{}^L^AW_z#KGkt{B7OMv=1@kjIt|B3z&Z_VBpU? zT&A}a0IEmne&my%<_p0^#BTg3IBukU(He^kOFW}0h`ER?E?J&U`>hiDi&3`OB!wFT z;3kItv;OR1t)oEpwRJuX08}1tMQJusq0w?Pohe86tr6S%WXTX8RE%z40dD!om6R#j zvQqA!R5r%=vy6n4PJdg!y;8T|c4Z)-6!qdzlPKpaZ{{m^cTii(S$wt6TRd$`J=AYQ zJ_pCuCn?k*F>M=i>x*pwZ?vXTTIx4*U-!SvBh)9jxFWQCUPJxeq>;#wgJ#adl_{2^ zT*VS$Q<1soh3qclwt|6PYY_16b^p4%yFV5aqw414;?enZzjrV+(n>6pOZe&H1jE;_ zDdTj^*Pmx#(B0$r`FCsXW&`DFn>bhR)DhFI3AA^AnAJ5fvB0;A)-4mV^x1eXZls@Z zj~=g`;i1n}eRHvID;)bqMk5(#PCpENxeg5 zP@cKA8g{BEaNnTq$d6wfGDKF7~1yECpy`fbe0C*geM zLA{*b-d|m2dt9@)3CT}Ax1hOJG{h{OF8-s6ay_VUmZR`z;cT--;t!-u&&u=6^E~sD z6)X880UP-vpX&10e;rHqrib3f-!XTbY(;H|Y&giybQVNylOW3~odTc(A&|;Hv-N4k zvQD~F+{A1zjt{NGwkjB0=b`0!r0RwV8VjhWj?+uUtD*lT6~U=Yo%wsMKZL_C$ok-o zD7&Vdz0s?SxFF<7jIArm&>~S${E|#g8jl77&6kP};Pb*RgB3+D{8iiy7y2ukkQu5_ z&5L8K(X~d=Hihz<{P==wc7wxUS-(#t-UplfgIvpG#aTs{EHNK#H!aTuplP?T7i5H+ z^JbQ7w+&=fk^E^V0|1me2;p=w^Ud=SF?B`TYw$7;wBXekhSb#cxtLS(f4ZqkNE2Dj zwjk;bMAPDyRFx-CR{keC*l&K?bD!>YmcdB)}M4V0{xeETT6o=oU% z{!wxbnjE~8E&hwzU(KXNTSy|@2*c}31$WO%hu8vSGETHpl+Ra4udHwO48-BUH^gFL zS=X+iaq&iCw6uBIN&fNkPY{R>sprGJqp<#P%anOWi3+i!%(ESt#67wiw3h0r7wBu! zSx$FIP;REKEQwcc#CI!!Je%Yg{mCK{_YXfqI)&oLt8Ldy%5aJcgsZo-Jx5~X;yOmu zgax772(uj$?dbAoZ+NDeY*?8%E>6V->Y8v%5&1wFa*0ETx4wjhtyTugkOBAJ5lQFZ zC!|!Xf25N0$9ucprR@9ZSuW$BiV0SER|M0MVTEOO-H{(W?z-6aneqkwJRxt`n4hjg z=CWCHHteA|naZ!@dSW)hYb7)ys=^hJheH!#m+c(pNliQ9eWSV#U?xpJIl-o=FNyzY z3+|>S7TWT*AOZg$y3PV9uCDph!6A5X7$CU2y9LkS?(S}b6Fj&EXK))}aCf&LL4pMd z?gS6Myzlq@cel1`tA15?rf$`lnwfjLPd|OS4@Ie^$q9WuL@%u%D=Ul#%~FbHY4*Z| zT?G%Pa*&%FNIU~`*YgXx#+`P6_tHrhE!u3xzrc~?6V+vJDpGwMntnPpk#0S!t(+9Z zTpS+HP!-p(uh}da2$-o0uUf?qp|I8AEwGTJBpP)?ju4#XmX_xIsS&5cJI_-nIgtz` zI;?jX)9JUtX|9dyT*VKy{a|Tg7jIFa!Z{|+xdTItwd!TDtW{8|z}x5{o6ZeqzU+pZ zi{{|qR7}{M2wKHrAfu0FW!gKpkEME=ec)v0L6wI<&~bfg zv8UfYKp#I8st|@{Q~ti*0Yx{SqB6NaLSN!NMOGMaq7h3?bCS?xOv3_wLaE8lQnC`CIFgjm^koKzn=6Fs&vZ&1Z6hooaAtz>JR&A` zYnMw(w=Adw67>+Y&#TQ*uu*1=aHvAfmX%8!9`NXqHiK!1p~1nPikc2mKd>aTx&$7V z!0?Xy*xfPN$1M#CM)&20{wmk%(m_pk*H6o19J63j@=l+Y*O!65%FqGh<{qV>5_pgy zHNp8U+XkTLo3X!lAhc7c%m4A{d1zwa+VA{FWsLQ-SdMd#oR&hZ6FrtZ6($TIzqIM*O*;q&Y+wdd{VB#ppQ%af*|a@lOpNblGnji(;X6M~XlRb>D& z1bQs8l8rfgoHqG;yF`P@yR^Z1fG&|o?~9`o6)}+j-&wQ(6>^Wb~w3Wab-f>ZL>GkQkMgL zO~WBlT(-%vN^+ooN}NwqcUUf1rLIvTdx4gv{vIPeR}OZz=`gUOhW{c_ewK{s&9mqP z|KRO^&lUa1cj3~brBDAspR|mJ+ziOD=;bq`QE=ZY!@`@SB)@pqK`iNrf2Ugi$m!^} zkxumsNqHDS*IuH(YdO|?dVi8e;)kZ=1^p0@?DnnoVqtd$IbBL$zSuRaVj{qwX=P5r z%QJbl{<}ce*G>LEZPN|1tZlUBTXcE#(^b;f=+ zqS|L0Gic>R=ywIKSxxmU8Nh5(ItE)N^96W%3hp5N*N30&?cXH2*v1+QBy9DD;>sbh z(Y%+jW>`x&ffR|mf&uF4NqRb;JE_;K`hmJIEruP*$t`*v$+NsV9m!>_L0I+K*6j^z z3_uqf#lI`R_nl3AVTfUqJ>0KsN>}bBtVkc z$n$>G`(4V3VH;aFZ4k~w^j<1xs|{bQ&oIP48crd`sGTRJX?S=h)uOz4nIpIC->54Y zP~LeQH6R-QVewY(6>ru;S{-svzuev{|#CmEHZAd>wYSYqBvPN>EoPQ^-U~nCKWrmc@uNh#i;Df z=Ie!aYT0LqjRYQ7!z?(WD+27?{hUCI52?OX)ddS2pNEsL=+l;~ishqeGkrx+r`2k{ zE$opPkxU(Pclz#6u<1!>M`*kGeAn(3KGHii8>=`)N9&~7)0vg_JT+@Lm2{kEoo_zv z53?Dd+TVj2)QG+H+b8sy=yH#3Uf$Jxn`0Q*$>@%|wss4jK;5H{%lbFo#(qAR7f(Ce z4RZ|>#;NYo0iIQ)x#QMlWuUrIziBdUCjSQ$KE(6!t{xeZym!P)XTOZ>|# z`)d(rnhv|!U>fKocEQlp8dL}JcLO_mjw#dD^c9P+a%h%dvzi{B&$YM4;XY@@>OoUK zwU;_je4Y0wp~5M8mXw!SzdWFoSv@!@B^nZ(@a(QQ{&l@=yl!Aq!)kPX-Xj+9`uoq$ z{e2AF{r1I(v5}!@(6i)P;CaKp;DPFS3t&4U+mn+gEE4!~`6qpmO^m*boOQm;8585j zqtFsgms$vV4zS$DkrqI|ETU&qq)FDevPR*PkgEiWwD?y$Ek2PJB@?Hti6^Xy4!?HV zQK>snsn2mqyjo=6)O_(_w9!|Rw1AVj7MJw@i0FP%tgx=W=Li~e0*&cRuUnesyeZmAw9!TE_&%f7Fv1RdVJwiov_F>@Nx8viOhI7V6fT z65o{Fh40o@;t7)U0!aq)fh1X-->-!y{-YsKb`O@DPvx;w=!sM4lNRw1qH}1K1MZq; z;{UCn=mps|k;DxhG-wC>Wk&|=F>7#VCFLP&@X7zk!5zh7L2~pA@&8Ed20bxlR2}j} z&iO5TK;2VS{gb@Pe|g&QpyuZj4?jol6HHq0erw$+!dpR{Kk&*PaHDF9=bU@J5JMrK zirfh51rv5yeD)WG!s>69`BNq$}1ei#`5(L{BUUPRG!C3w z_{5as<<$T6mBCxyU@02oF*(yo+IUH37Cd5jN8?vU=lAAa+x`Dunw?*7J*|ZYdfc9E z-t0bt$k#iA0+B$u(0?cG$@9hUx1yo7-}cvA&%1M&S%HCnp01yY>R)dw;+4)!P%jiv ze*QW}qzU|Hv)$G8U%cipm-9m-46r*sL;HWRwV6bM?bMR7l~81PK9XSMv^QFll_NAh zyOAE}KG}eI5=LyceRAbt|B*Mq_1q|OxjA9^dL;w6A#63bIN-3r#0u%lfR1^xXG2*8 zI`NhL{cz199bp@32U;E(L{HH}W*%DT4+G#EwsG~a0*`Cw+4ozHs}5wJgIt648ve&XQU>&ua9o;t+MdCPYyKW|VO++`-_0iULC2hI2^4Hr= zY(s-j8X6{^?+z~4vJ>8*tMJ^9zSV7O=jqhB^fxs6!u7m%8+@XGa@H=Vq^xwiI{|tS zI@MVYs_0&kDkC^&d+W)eE_QSv8QAgfB8=Dtz0YbXz0{bkL+0&LgF3BXx<05MH?4)e zPT;-5uhdri=&%0w4@rpip5$ST!ZNPa%taX#8b&0n`{=DJKUhvSM9eOw75D8etk><;?S^Kum4yTY=&c4M~#G0Yb!oR(afl;Gt8Uh@EQ512Pvip$>GvGMObt3a&uGE zM00cEjW&H)Q?)5mCaAYrw6@ykT{T027xoI#ZVNFA7lD%4J!{g`lSpc%TC;@U@X?p| z%FT$gwk~;AA_3i;vxl9!`;){z4fk*k-HOh6JRkGLXba6sj;|JD zKV7PsrcJB!TWg?AB%i!ON1d>i(J4FRvoX+{KZSyXD1B`5;uDN&n!H*IUA1 zo}k2~#)iWAxuatJH*xVo?J5#%n&iL$+XyTljkg#GuE=ga*@SsB5SD9dEOMXAmyu0v z(pepr-fak0a*WsiPFW40&$e^?;l@p32L>ufO{q6G5K_xQn!PViY0-vJDJhMTM(N0| zJlm4ZNmQ^jKBjVy;f~b#ZO7qh-bDu6+w;A)MpgXWdMn<1k$&x?-Vfp%@sJNjckF0v z&8HBzAVhrx{ul50EZ<&#xwKFJwY10)u&7)Z6*Tlx4;QpK3%2_FiqlUo7or1r7NJ~p zIzfEFDYmV5s-Fv@kEAmP7y|oq1e}>-O1e2GI4}^$(BqLOY;0CTezeFgkteqfs{W+5 zQx7kFr)k~}W2vsWw1scvC202EU&FDBBtX&oo7Q;ye|X+;Q|Fw{qz=jPMuPB2WxMeh z4`lrLnpWe|bmM{B5i`CRfBj^0lwpV%Nmf$I-WLdrx3M*kcY3R&(#)6D;<4?PcniDm zB!Enc+><*OrYS69bGwekrdF~Mue0-bPto2lE#%En#o`~to&CnADD zFEXP166tJ4osZH%&zDczB$m$Shqv3vZ{YhX&hTMu{qSY?YR>wyV_W3;bbVr?Wq(9Y z6En3a21GCds;#sC25&#e6Kl2qtM>ZXa?$334!9Ans%P^4{Z|Y0ZzpOSSP+}Y+%ghv zRFOd|Z^sXj1I#%cFaXh!N`>#f*`@i*k!o+br+Jr_g;*D^l;X_bCio~KA49oPn|sH6 z8uH_?$%x;zVvc;zU%lZ+sL$y5@AUFdi-be8@;XoRBh%y>B&Ji%;v^CZxxu-U*wryP z`I)Oz-TZ&;Cd?hh>2AtcwCzw2@O?C*dAtHX7@GfxhZVv{g7Sm^LTz5@kk}Ygs$$oE zcDxiXP1+T3TN z_!F*sC)r6sW?s`61d-P-E2|oV{6qYXNBaq@ToxMQMgNOw)mbsxXpQm~X1L6xaR6(# zH1bK4mx0A1WlbX=uV9j_JSNaUfPP4MA*KCHMgn7@Aux>cp_1!sWJrDda(%X|dsm1p zqk?Fv_Dg`d{dI=dsd;K_XFE%*)N~Uelbuk%2eKF-5>^N!ibH_TRB{+U>LIyU;X&A2 zKT?tO2jvIE*mT;$z)#Re2x6Tr6<#JH1D-j<5Mqc4R&`7!z7KOlU{JDmox$?EL<`pV zFP5q}H-`#(UGg|Kv@l^I%p_N&BgD(o=tQm-bkI|HsSDb#IqZ}i#*s19Umucx$Xabs z@+-mf%EXDlJjVB?E8mn2jCf{f#96Yi5k_x+0ixnzBeUQ}FC>9IQN6z!iYbK+#w>fV z)ZuI)d$E@u{2czLIpyb-ICrB`NoLwXvU_S%0o`X;!17#2OWD2cbDh1c1OV*=1qtq6 z2+Uy!5==!zfu!!B>)*Egsh@7Pg?a!1OP}^S@ycJ(AxvAS+aD=mn?vO5;{&rNAqw)% z8vbEoL15@xFQFScyZH~F#^=m*%9OSsu{oQ=cd#dely5C1+b-~A332SLvi5~Na#CACf%1|5hrcYOo%AIw`M}F5CE3>isRrzZLc%LxB}n6D6zJL zZ+qGqdb)`ZyN8$m3T{$PI)bigPmmd% zrO1Pfj-!-ZqX0$vU`v`SE4p^k3zwN?tfKjby~|4KS2jAMxpwG;tvY4*a0|%?*WkI* zPr`Jj!#cXkg9u95*s4<`_j;6RE-OogEZo@w48Jtmh>TXT)LEKFo4g&>zB`CyGzQP+ zY&XSK@L5h0^?xwZG>dn&h=GbBKLp)@by7?}{0?fsE8M12k!feFXtz~R;rZMCBb%;a ztYxqGG>qMYngkL{T`Y$lPEX}X6UJ=MnEDx=Qj;eOMO9%%37M2Axwu>|)M_A^p62a# zh{n(iH&9aUTlPP<^^nyUJW*`1cnHjb8`Zw*uN)O_x%d$xq$HxBTbc70<;8yO4Mp&v zmmOJii0u1Z-lVIELNvIDk>GL|og_pUbQXZ;!+kmQm7gkS$69FGsCHRt?@w{tw|7kp zE0zqXDyj>#x_k7H`eK^14*nkO0UB3hRZn+bZ~e4#2J^M=7<7h7Z!h2~RuqQ0Rn3R9 zqO`bvejop-CT}k3$zzVA75@ujo4R268HdNx;cXMWEDn!F6@*hycbHk#eHfw<3!qo#l@|-w4F}E6`B}%W5>`{TiyA~j>@{I0{EjAL9Ddjh z^L^9Kb11bDz0%P{u+k7*Vh95K9!@^vBq`*qD+jK=KHX&iQU`iqRK{Djt5&NI$0o{bI=QMqWzv;iLK9gj+(O)ek; z{c!(iGcii)CW z;L!wAyK0710TFvlhlBIWOm49espLb|C%9B_!94k*Z=J7xG*xk=6 z;a}^1b+#y{_to}PoPbu9Ubt@^3u33aB^4Je5~kVb(b>q&)M<=_#Hcw7X$Vo)$I@GA za$IetouBpuf=x#4T&EHEr5s-0!M0Ti#`$K zWHffCqKZCJ=c}QHN2(Qtf>&)#Q+&{?z$|^PA63FU4H%_BsM+I8sG#H100Ki;o^ngH z3a4lwp>ZjhCj~k05uhVRq;mrdyWXzQ>xiRkRtqJ`LOutg#aW~gX)h+_iE`vQE(UK; z3}e`pdrK^(L73}Q^Xyy>D~(xuuwlUowQnI~L`A~ee#H47VI`Jkp;Y^(!MpNVer|g0 zst4Gl)5@K5?8;Ogk6n4*)-UG5lcFPXm$;KZ0js!_241nP9WeaaTWt*{WX!n}Dxnch zEv(N+>i*uA5v;>(H;n7Lx(BXrep$0`)ZfePeorT)`7OOrjJ)84%ug?#G#QS*g@f>= z;CIyLMg450LXz@^EsKc4B!ZuNXX8Smm@(8H-`rz4ohcvrk+*A+Q!-$mfI>?3t~6px zaO6lqbMXaEME%~s5N`VlObbJ1dY%|t9))FX=?$%+6crP~8+e9l094kn&k~BWt=k>V z;oFb(Jk?z2*z=!(Dm{q3P_?Wu^$!vQHn|z}f*RDC&bjpt80`y6vK-V15I9~z*v&l> zY-G*V!#eDOU9AGPdQP_fn#M~0fcY{V)!18J3(dZ%!_Xei?Xd&$ZDXo6_jDgx#S|Jo+y$r3C(sad}mLB=&yhn;Ig-w}YC>89!JzJMbx zdOcPU=&;y!(yv>3L0O3<^^)bjj#`o&?Bd(Dk|S`(I(2pWP;qBmOSpg)I4*of19 zg1GBa2$aK@1!U;leMXQPQSn#Qu8VjUmw1oiVBC<~*3ke8b$j&6 z^_IdO#wPCRm(MKs>2m|q#M78B=>F+x4(aqTrHoB!vS9-Ae8Z-!CV_4JSHMbh6Yeii zdgsH%^@1{aUI6)~AI$o+X2v^X#XMjSM>d z%ZTXCr}Bcl@3#}u^Ne~Hjfuq$k1iJ0Kx2CE&pH%YS*Ncnxo&nBFv){v0(~D|WVdA} z{R3})-&cYjFl$7K?h?;kND=PVXwD~<#k#fFlr~;mT%WdfCMy&6&(}NsZ;#5-v!Ji# zJ*|@`I=W9xa8faVenr0&8~x9p#2T-opTtg{-y__vaCDwr z(Qml@`PPcb-g#2baZ-9Zme)`xeLE`5%yNE*9djV9_G05i;``dHq0$! zFS!oFCez3)Rdp9-tv38^bgvQi5)aT>!@Au)Je5Fo4t|zveYpWtNE6pTopbC~cpX8Bb$p|ldt|X0GNs;RuenxK5PN+I~<>Q@9K$G&d$8ITfGhp7W3EF zkzB|Yv+^G?x)Z0(*fJw7{`!prBIZ)^@HYj^E}QtWeCc})FsOC2EXsS)7Va2`w?~XV z5b(3wsP)bS`QO7cW-+u*qswq)%xOx8L?E2|W?_!8>7jQt)0DCGH8Cj>sFLWnC$aV| zjM3Sgu0?x|G;g6%54WtCCMNeMGJta)hB@V4GT=`-< zfZOCl?x;JvOC#WV<=9;{ZB2&XE7JAOLiGmIxS#aBauGeK;lW6K-G1B;cn=bb3i?5_ zgvV%0)ZV;PsC&v6ld1txyai!}@JHIGCne+A*-z+8rEThoB-oTL)aIzoGjw^1(Ffg2 zTSbQWUo*52$7Af%E?D&jDCHCydpt}lmNJaj3Wriz!^;+7KNqr!$m+p0$T#J<=m#^| z+eJHu2(uK)HKV!H96@IGz5+{-%o_B6RSDOtp(7ASICi9!{4FifkG5|c?Uw^3mJ)W` z+D4q~2N#;`m`(8Eo=Bjv{PriZ)OF)J=sa;^B>#yW0kw@jB0XO> z=(g4?C9w&vAta<+7|Md`AXjv^rNp;pk4Jij?b^K80P0_f(1@3!lP+Fr3~1CIBE%Oh zVKJ)Qc?>o9Ps|iR_~XlnI(~ocsPNa3<(J6Mh(45>8)9?=T1ept68d6j@hA^KU|0sY zc}VO_?JB^h%TT_k&^Cebr0UN-3PIX=fia z>21?0m{+)X9N}p!xxGXA%kGSd&}4h^?c139<0Jmn`#ZTHqI5a&z)+*b?Ro+W={xL4GPm_7*+2 zeJdkdRO>m4K&-ijJjZvRhJGhPS_Mww_F>&vDn{-wFclsX<2;4N=OH5C)gRidqX@i& zlo>APmpfXzYBFFlLt4!aQpv|?uSgH+$RVT5U4Fg}+Dvnsp9XoERDVI5!Mqyzv~LZy zi=0f8F0Ag+y->!S&gPoi+mylH+bT*mBR+d|OjZ_3)j5Uz*&0DKFW2ta!xERvQnpEn z&Q#}*Xwzf^*u_>1PKC+QtGHsUe-cI&PiTvOzYLrG*GmLIZiC|l^D6!BaO^M~gGb0LIBf<=tUrkTT5P%g?DVh-A0 z?xWobs!1(-xT*FRa0G_l5nHY2+*S`AATiP&pZni8$0>_qV56?TzVNuLYAEa1wMoc@JwC4#sj zl{bV%MEqVOhzR3PlJ?|WvRS0!MWF92%?0R-Mls#l6fQZ<+vEMCMRe`gXxGd9)A##` zUFgLIplCPU3!1wfhC#oInPnvL*U)4MHIG`Wbn0QVCAQgU%H>tmD)U0VuAsCpoMA}n z^dPXvYVHXW|r{Q*D6!mD!4Z`mX+Jb=HLkHz(Ay>i7Na}; zU1k4+c702Q-PL`7SKqn?=u1qeT)l0;rPN{T9gDT~@h;*QHcAXOa{vtJ(-)r9FW*{r zoW6{ZDfE7Mj4gnjG`gc{2&u%=dE&`oy)o6^XR|j{_sX}a(^zYT8>=@ntjBe~=NVTV zM@LaJNwT|5f~;EAd_=&`_p3d?>+bi0jl=0qwy%ebc4n7s(I#EO`Ya~LxSc4nrnsY| zyUzmg@paytM`1)iEGy2gPWv40N#hTjKU`lC5+u`|6rJ^)-9Qmy814%Y@Z@>Y_;Eba zNT(W5lREssYgZ@d>DHw3nhulQaHY>F`o)2YRLVSdQY|6?e-%0Y$hD8O24PDiK7mO3 zon1-RUy|rX!0Dgob{R?mV|BSSfuU5u*`Ol!Pnv6n{(0?!H^*A#)uhR`)#%@pRf**1 zsK*Esunom;8Hnp2_y(SQN{`0PAW4&bk;ev8Nmh{OkWA?>xz+4pMUiam@a+kqNaySY z=kT&yB~Ab)3Pe`hu$4HiMq(3}G#pvVq9)Tc92lE#YRmMzzgl~BuC3{%CTuHGnG`W* z^+~1E^VgJ}EiHvAb^UHK3wz_B3Prmul}c;1?PvL$_t}f|u1ro==I4BpWl)JS=xyeK zX;q;cCNXD@ko?9wx81C4T2*U@$ciOYIwmUpm2t(O1`~I5Ml*~sm|h{l>)kGn>zVY> zyQIZ*Wn&y7&nbY%4xnXA?ag@b7^@5GtD{$~wugUS^!WZxU(THyXIYNRG@k|Uq(fq@ z411fJNVb)X#8ykjRY}WT8(heqwtOD_1(Z(y*9umzNS}KAcZ6F%%AjZI<1Y z0fTfh#F+nhYv|`3@Ng(8B<5#JSL@>`jH6g#R<9MCnibK_lcB zfv`<~lcO$Fi8lC}DjcWD|~Q26&=)#6+%g;^As2=CoKPooPP-xWlA z46)DeGHiNe8;|(Q;XT!kDt9{J5o{d8C7f^J+4R`4)9h?UZXn$eJ zmZy^X3D+__{nNc@!K7#b@H~vyzSSyk-paOY7pF<6qZYBCF5|A3j3K$*FriJAlWf;p zaCbsdT7LA5xN2=;5Af4B_~hguoj2(3G8@AAH?6d$;urnh1x<|;gc;&Enf4=ld_5<| zV|0-)+^j(@E8%J2Z)2h0 z_ffp5PFh?(qR4_9n&tv5jxY2yQ;rXJ^~Yy8vw+B4w@7M-><$>gdNY=Z>Uz?6!{Stx zN)N1wt1YxX*A0c1`-kUMf_-w}^U3|##V+0RF6NQq_QGL;vsf2T<6HvyxzVAKVqXAg zjO6$v^Y-C11~ig(q4fIqaCy=Izq9Y9iJ+#Tc#Sqn(7DluW|dRvB7XGmR(V!KtF zTbk4wI)caPnIzfzFPX}1A&?jhm;eQ5&4oKlj^`XY%e~(t5}pG*lgH98N$Kh*k-OIy zL%X|H7LFl4wf)wIQ=K?ZKOfe`K{7fhD(-%ZqXGs@aGVbZ8EPFPh&B~hgkEKhA3XHw ztKmBrZ$C`;FG;W8P&2qQ8()Hh9(dxCYd876u7Zy{Sb2HWx$-~gbZ?uUWHuM*W+miD zPxdyTE!1d^7Bh>|^;z>Vn2WuB=8l*S%Vc=pVKB|ff_e-#&-U76Zb@^9a{p5*s|{&)Bl5NS0$6Bbt~%^C6KXF)Si0sZ9QWf@ zwLo7zmBVb|I)TgeWl(q8Sy&Z!ND2nJZ|)H-+2xbkTr|x@#@z2mY%SSeXqaj&5IkTG zCpd$R?Zi5}gqzoMJAbb0p9lRd?s>kL48J%#)BO2wG;i>1ArkPQF~{R38xcl>J8c>Uk-H)&CXTh ze24(Mavo^Lz|V2JTZNKF4xxMPp3jXe%(?13iCt$zxrw2Lyz==}N!XY#&XWQcNk>53 z8w(o1y0`px1cYcNvODy9Gs4RmWZ8AwLAnloEdpHexHL;@@z8DO9hl#0ly6_UWv5_b zzsd`>=IL+*%mU|vAt)4*rTY)Tru1a0oVeuz?|B^*`SKyz`n*tQo=_=nG++~76td}? zFK`O|ilr4O2Uhq-3+B!*yct(t#x*9{R7E$5bw03M9?h#W$44iQxkw547!jpUe>kIo zpF*`>(o4!Kwbtv#f=-1B$tom)lJch=QEqUtoMbm!n$OKundnQ*G-R#4hvoY7QIdWJ z7kvd$67i=aI#cN}60+2s>}YU&L=_9kVoTNQu#8_HyQwaP)d_gw&)Q7z{ zzSJ-6{P8R;?pS}4{1b-w!nz8E%U20E@jB``&OIsOH00m{e1X(mgj-tIgM#LKExhuv zXsUhbWCcsIVRMG5B-~*Mjjg4DT?;>1B*(BWVFCjK9s>L!`uLVX;T<0}!;~9JoGRgd_!~z^ z{Wa*wv~#BFy!O>Bq=X^bx#XiHUt21CvT-4@U*KLm(uW>=OM)M|0zedkgiZ&K?D*(U z5fQ1%!rtc)%)(QNy*JO9NKa2@%*@*3 zKdCIOC^hAdZNp1rojnk+PNEe+Rl+nsL^L#?^#pJogBYlOeTim|az~kV@zVc13Xkm0 zz;=b}Ck@=2Vs`?|PtJcXQZ}N|b1HF|?2?a_%HctQJ33`03L=v1cgVYuww*c9iBAF}4oRjfih|3X} zs+>>*mfYRCY~^`u8E%XoBqZRI_XV4dld#U*8Iq{_mfS`mwBV~r@%%@p9s zyJsb(RB!s$w)6EAR5^o-lk?j(gTO;6cKq0C&{Kd;@?FrL;P}2S(Gb6s6Jb(Qi{`cq zcdk2GkmZ?BQH?~hk2h|+I-7#R&v43kto?dZy~3Cud$pBT-oO2VULR-us`6PR7NF*( zcH3zpvog^ZPP;NkJ~txL4OkoA4LQOoF;%fOhkR^Np^3<~4EM70*_30lDd$|ms8{S! z*~sG zdpAK0(9_=O>;ANp;w1X);&!oDQ~~b(`*$v;veH_a?fhlXp9Nv{p(|^K=-^II3PX9W zG;2ym_qWacy3c~mA)e2|(qlFEyJx;1?{Le?5c8{ApPl9`4alJ|C#-Xp+3^%J1L+Is z$)KorkCvW2RWGXP3(v%EW%kHj#p`ux23&11nilTLTryMmZTx_;$1uz4kvK>ei2(eM zOMNS8O-75G`!U!*5NP~CIf$+Oald5Lp5Wq%=_?ALuWJT2v zspWe5_e$ov?4v{LmTVu=QXoVQL%WHY)D}5A{(V7&X}-SP+-D2l=xxgB3s`MX;>HMU zBg0hidnU)r2<;%7Razo->NR%W$r`G6Yj-a%LuFSfAZJlxu`KI6(PwXeA2(kJxbwLj z+#Oi@?BVb0cK7($gzJz#{Yh1$9Btg1Qv79Oei9eOF5>7{QvO+mg}82=rS#j6mOg^$ z(s7gdJNV~tixlsdRUC0HJT!_gFlY4Yr2CNtD;!AVsVs2=PG0&T^g3WO_hc9xtJ{|N z9m}NW&C%oprgKpH-!X3Rfmlwbu#nH?Tt}HTxoE(QQP=C?$yv$0-us`5S3@0q8s$34 z>*rt$Bd=9zol-ljAI=V7_{xYA>H=}qDNK zE_nNw0P=y_s?F=!kp^gvk)QE+7u)W7y4(469q8dNDSyC80K;7%dxx04Zo|_#DZ^cS zs-NumbJhc$q52)_=o-sMKelnPHUi6*qgqhGQ%buEbQb^aCB^S`tm}1WJ;?1`?EX=6 z>~<=}Z-1=oYG>WY?OeDG1b$NISB4rL-GWp6rpLPWcg}?ACOEI}?(ELb7tR7|y!ZxA zYUYhjYAgW56M~9$)B^^!)qPX}7IH3?6L@1PBNQJZ`3Kvo^z1zSZn7k^1rD^7>{Wg` z;z8ok@WNlrktCLk-H$r(15w=^1`5j~up5xO+K%h(7~9vje`TlXhX-nv@>|(E3&;2S z&l2;7pOAYhIxoy)7OOA)xoTmS9t!)BNy8_Q#x`ZFIHQFy)(qVlPJy#ahT5Snk~#

O^_D7r z5H$#GXgEK6T2jA0U%*-C*BEp0h!-}axpOjQ9&?HRD*bD&p)K=1&JG>l<;I#Dvy`Ie zkyKCLrVuJBMJ}f>ZJ79-;CcZ|Vkv!W3`Ai5@n>C{vv|h@CdZz*J_q&Cq2>4AmM#2p zeAkm0v-0ds!9irx<C%5LcT$uYg#O+u+x{lgXhT~kJ&{* zk!mLUe6lr(u#bL4cXu+*dUG%92hUwU-rn-H^7)28t!)r@MeE+S$ecUJy}d_!NfkzpC{8vUSVZb&DMswX8eC8Xvvm%25}p zPA}BST8)(_idP8^cq>qF4(U4X%-M^H80ml%``yZnd2<&ix_ymN%^AgYC5t!LNF_?M z;zxyZGRvq@{?oUDF@2T{k0rB2DgO@UoNGbl#CQ(BRGlI>)>?cANnw*};SWc%=X8_C zw5H(!Vw$r(Rj)ek`GmM4s=Ai z9FVrd9KEJpx?LSn^eb-377y%4(QEQ-3=Mdg9+Y`T(ugv>iD6Bo`tC>Fbj|AAM{~W@9{Hq04f$3!?Wo^+FR+JohN8FWA$#z0+RRmwHs+)hNUOZ{xTKO3 zv!oL^A1dM%cM5Dj{5HK!?I<#l()tp=!++EnbMK^M3cxP{OsW8i2I^vagJ*cLG`?l&pTYa3w*uVMQ>Fs^S?nM6 z^WIi=WPQ_jNXzgO8zd1{yz;!-czRu{Mz)5GD#JiUUJVUWC$r3~$Ti&ux&GCG2H6h> z!IV~cQhs?-9W{qae59U54pEIy5g|t5sb%Nlvv(q~!5EEb?gKagjK-ok!Sm1p5>Jfo z+4F|GCOiAf`XY*&w26$YnoTm0E$#3x7W6|Y;7U>wvOx^8hd*kYwf>)l^lqo%P_tq90Rt5gKwn%g>D zVF7Y2hPZ-o-y$qxI<6y$@qOqoe0g;Ax1&V#1=eY+Jt+qTkdrxYwWDun)LQzz|D-=# zcPK|Zv!{2Vj7R4vEmNl{kJkKP$&%@)2;GC9@qEx$O}+1lu3!iXZh!BoK8LpUHwG4c zC@ctO+zDd*%y0#38Kl|_weNNfO2kx&Cm?d|uJp6$PO`IEhqe>+DO5X2vZdWq|2 zisjp@xb+c`PUN{Q;Qj7pafF*U8n=6pu$5oI3FGSnx8iogTgtu&?j1c;F?t&x7YEH7 zW>cCX9u+G&1nHdxKk%|vu6~t@9qheK|M}B>Zvi#p0s$L6R%Rjsv3Bxt&=rar`qk(S zw?zi@NMc01z0z;#&u1nVJY~%s@dms}ZjG;o#-XL;<)fFt)dkG~PvJE$o)SI;TO#R? zz`~ghk$2aN0?)4SQz0$#uHfG}+y`IG9to}f`b2RC%^CHea0%0XS$kgJJX_x7nIc;n zj4xf)u<{S~UE9F#_cdXf`ROn)++Cp?Z;$9@k{KKaC-MdAbO?n&pw)!uMxX5#t>NTa9l>Tsfj=*@v@l zxkHc6cFiN2tdY1Jj{h{aYm!Jva34gQ+r-Bk5SYr=)fRQItH2o#K@xzLL_1D?#% ze9XWF9?a#X@Y3@Y@VVal3WN`*L*6KsE9bSdZL^v}`|CQQpYd;fsq4N)qrK~-mD(CB z_$-K!P93f+sP-@`9(riCsh4Hm+K%TPOr8;aCN(KDifOQO1VJG+#%-6mN=y))B zI}{~4OSB(BoI}ove?pRc4xJe1f*-jjggU<`gfn{7D$Ln*{bH7dxfl>1!#>c6_Qw@# zn1YmFg$j#e;OTPb@68+)RzCd*5|Tw(8jWgL12J2C5{ap(X=O_hT(9w8S&wsGWodQX zMBv=l?$aPZ0 z1*}No!r+d`_eq{fd{7r8Ce#&YSo9=)hkfLkK_I)C_iFa{UW-GyGz0Vm_wL=AU0vCA zrQF0VE+E+Wb@fL(avT2&JPX`XGZ3y4kL0pBr=6cF_GDZ5doAYd;Pmo!f+Xgy>^rDQ zJ}0U5=*UMlPL0hA7M2I*v0hu?=a;XI6xX_ngwBR0Yy;)JoBFJEWU#o8o0L(7>|{O4 z0U9pd)UB*O_N*6b7Ux^)fZwoeg*G!>7G;f0$i!Ij+tgI*bl=B1q60abII)MYdE$S* zoyy}4EoFFkKTbHQLYPz`TM)L9oj*3=@EvQ$**(91W~#50o{2FSHp{rFvDJi1A<@Dc ze^#nrUe0~~3w=%m0;%Wi7J}bPmar)7N}t4%o?wQGqt@43w;!wvaxb@6N=e@dgxht3 z6#=F-a-3fZ>D$IC-VM|DAlS+^B)o%vVn=rQ=>T}1VIm85$)eQ_{$Bu?Kxe<=qL$fI zoPy`?&sbwB%tzpm{yse56<0!-^ZIm(V*lIxVU4F+Wb3nz173(u!HqKW-lh*?1 zvF|g8Fs?-mD3S_ON#_(G!|&c!*hU8rz@1NLHmWg6ocGwq~WDmenCxlB>)z z;~455JV(U@&|F?%f}<&zp)4c-IW3u@VsZq&k-u4hBehMEym-WT<|~?}5k4ZF#*iVv z(tUxma|%n!9s%g6BWT(q(;S&gQKB*_rl<%#6h*gSjA*VCAA~W{H*(rO3dbLuCs}a> zOw$xPboH{BCjLR1_{U3@z9oyq(k0^HflyhW8t96!l)&~9!y#X{SFiqLEnm1=SOro} zae=dG7~>q=Ofc!_X4bIjK|n!P#yPkNiwU^8`l;fk(Lqt%*1FR$ba~;2af6WlY@?)e z6}(8Y@E3w90_TYjj>{s+Jrv<=P9^^zKg=nve;goQCXA_AT$lm{%Eq`jB8=3m6vm0|Go&L@E1DP=Q#6lTo7qa3ffJ%H+Y(4w=0XXR-dr7 zn`{q54T5=YEI4P(UCRzvAX2P5*+>Zcah{C**fY|3! zN8B!e0#DNj6}Ue7I6Q23F#;!1nHM;_NFt`+2*00%u^-0c&W_Jq3^mopM zIi;ls{ss0F^}*vs@gkrgppeys>rI(^+SL@QwDks#-VBsP3ZLug=+ z>JBCXBFR98r=-7llgU;#AAxr%A3?r^KLVKlgGDf5z*8sz~z*&GiI)djBMmZTcfNoHR zkH8hd;ohbw&v6c}?Yv@}oT!aBi&1n|A;^W@D$$qf7f0X_$GLXMH?3icrbqlcw-6lq z6E8jNfORuv6)4&BgkDtwu%Bn=C!+Z)uYmxNz+t7wDI=&VvZ~JkUnFIL+aNy9i!es) zWd2YY(f{O{F8Udx0^gw9qZa;p<4})Ck$^Nw%ZQ2aoNRUrrcw}o>B{AK~)|&YUT=A8y z(ViZF%iFj>Un?8a(ZK_7{18;zjR)Y#Lsr}A5%}iUU%}`CQ%)VdB`f8B|NG6s18`Co zIp9Nrz~;IG%9{_W*pTh+^&MT}l@2AWNq85=>?}+aeI4kF={m#z?5N zf+OJLY4V7f@>pR)0K*Ax!YBeRW`!i=Ps5lHa+OAPZ(copbN>4H>gneX$FJW%JpzYI z+Q}dfSI|!B{#Mx3JfswzCO7d7%6xEqenxOBNK|co`|kAV=eNgio>r4A z2yx_J;Gmgw^vOBhz>$eCiW47`UN|_YhPB#VuR0VWC}$h>#-vb?rId2F%S_9;H^F{Ml=}+qgn+%JRe%S8-TE$( zwn$zU(v4!ZTVN&(KIvO~&>AbH^`QP)qeVB@WN;-P#bcZ$WiB;@bYaI|$$*9h6}Oa! zb6gZed8r;$ww8|*99MhnBro2w6&g&@H3m7+4XCif1@Pm%S}YUrg{vgb!YnVylzG8m zzZ?ii=J#OD+I=X3AA&Gw)g9&xkjl5ij+&N15e>JeG|E?n<(oPo1b@a_5gv(ty9Wkf!K9H(@f72O_GF2|&YNueWPnDzkx@829> zzB&SmqE?zOiisLj=9p?rguN@+lO!(i*J9+MwDGM?$|4W_dVBc%{TUhbwi%2~=Mw>p zkl|-Z%7+j6qM5K!zNx*A*A95~wGMvH3?!Fr>Zq-{jE{5DCsixygXdXNrqz?6{WCAq zG{S@xP()u;jK#~H&{VnA+<6yYBuVim%%`aECYw<`CHg^Q=FAtVPqT0qMtCe*J~E8_ zcX4z}>U|bQn90-nB#WAX&nvj6xrZXIvegJk54=q%;Wd~yHzKVuSv@LI7+~+#i*Q%N z>H@;9>Wb=bf_aH+2ZXvu0ObJ1AdJJJF7b#cieWq^^EaGgfC><@5Fe1l(e3Df|Eevv z`HpMDWb1(akRI`s>_mZcI^A214)|HmQVOcWR}|mUnwmm%>quzuL+a~_vRe=qc$$yE zQ&MHCbY=0Gpcw`s5xh4sxW-gLzM9~99OM;it6$mnm_J$O<7@<8;7CyLfY;1-(w!oa z9W4>;pkD6=EdyHBu2obvxR%m-o+U0`@B)yeKBAoIe-$j#>S}t0=TSJrG1>Hzi5b#w zd4aN`Or?}mpUV$dxqP|RE=!WYYmN$}OXwzLmSX{+qCq$cd)gd*M=i7mY+KMi|85;% zvJKi7^6CrGABb*q6Xp}T2=LLrP0EZ8Qic4y#?3^0BX2nF92a@z{pDi1a|Jg-uTIVn51Nhd)ya8N!C3$hcyV=g&T9yBwsckY5GtO?dzt+2vR>LBvL>gf zm{c&!s+JG=u^~~%t6#NUl=KVJ*DI#Z#l7tO;a02HMjX{yz}3hIdt?*)rRqsK5|0>} ztd2<%`FVwryGc~iXesV4&HYlG`RKH_ z9&~I`0d6Lt$85(zNTx<2JZW!6zR7`r7Vu1$^?u+c3yT8BqpCWlC$3TxGfWL(9u{6o zC=F$@>yHxTOBrT)uyUEGkTWPhs5e9sd`R|JoC<2`s|Chc?1vuNWK5Eq{tanPgewEP z-{rsfh3p=`Q1j83XDEtXW0e8iC2Eg#Uu#hhSS)Y7l<)t zd{^}a2ICBQI4Gm&_MWJxw9{J87uJjU{j#w4sl?Pq2Z?!Q2jZS3%l6}I5Falgf$yo1 z@3XTLLMC?|tG94uE18GWFhW^%I`R!+$!{t&YpFh>ei&iAu$C-3!mkW{wYIUL3-eY-v>l+ApsZIRew@ozg4&Ib zouAM7s#Yx_3on0LpYL9V(=@{0zD|(uq6ozv&K^Dj;6S2F6txgFWSpJP^hf0X zrdUNt4+_A)mi8U9-uCD;L8j7P8Z1!B8YKwSUPDr;d5vgYD_+xTmUhV3H8Pg=#To%C z;29`mS&w%L*bX7v;tq-;rXKtaOp+Bxb7hItBJC&=FNsFNyUQ}AI0Q$7FJzbT~>Qf;PfBs_Iuq)naM`?1s9)^b2w%^UzG7zig;^v$R}x?dX9U&x5@_$%!5 z&5bY&^$Hipb*Kch01G>wFwP5%e2@e}J*4!PlvY7UV?;)nyK|5p^7+)OoI!FnbmC%4 zH(3qs4b}7f&T1;m zEpb|V>#dZfm0$dp`fBZpw_KK1wcNSBT6gX$h4r{Bk|>O?#lB4+sNik_$ z!*W6Zr2@5jo-1}`k-QG$>&3pWkN%S?unEPrix`-Oz8~G742vU3lLfvZZ!mqe&@*&4 zB>{tGWh$vwWC#c0wfN@R&Y819iacDoU=xDtSP71qc{bA{$wpCadO*ZUdI_Z|COcw+ zpZw-kH+9v%Yz-uP$?I#vV(O7>9og5kHZ$?t%A4R}iyT5@QWk)^L2>_(X;nLpeW}d( zIvmXREtg>uVD~(@C=Wf6VVb)C6umwb*{V8X|9x(bs>Q3lSXI-GdW0Q;cpS!GJBk)j zE+LOP?~@61_y^x^?RcYBZNqtoQdhY?qV++wamq!9Dwi)I}b*EIU3nWT*L7fDVdp(s)9Q~GL!rasex#>GO&=n5}!-^@{zcqnSLq@osR z$b!vWNvX#!5s!?s$Oxp|O%1h2hmA)O<$^S*9aS0owzx(rqFkV;3I^hye61*Je(Em;v)V5ibb(P z+JKom8d>HT^#so}DdU1HvhOdS03Wk>gst>=f!ak~p4HH)%J*yOT@g1|`%(&P59uB| z4WaDNtp-E!4M=D_QTJY>j`Jn#<<(BGYxWy8fy;IrH8hLdnhW=9gSPS=fOVmQZP;a+ z0!2_413oGcs4^(d$>TckfxwZ1Ep;PEk|W@vY!#<%&1F5uko%!^xNtS})Q6PZiF<+8 z)~P=|s?0|#5C3~Jgjf@4bQfRjRLP{ly=`VW|8T-t{!eIWuNxiJ6Kk%$T`Jz z{)SM*Dx}1*02}ZCaHr12lZ`MC(KaUx6de2114&|D$ON|X&|VP88`@G>eXC6=mqn7H zF$O1fXig)jTL`G>D91EP`-}AD5%6zgGz~qXk+GB}q%&!>WG)Ei78un&q)*Q-zdUMr zz0@dhw#0tG+qH;~%;{o61974pGnC_ShGUSkR= zx)O7bit~ys>pg+rOxVgAPd&3UmhzCsO4n0|45gHpF5NzGve@Lxk`#@31VT$J9@BW2 zH;I@utP+sL9P7SmjG75o>8YN~Vl}6UkLxManEhSu%*Kb0jjNBd{~t%XkvX2>kQ)jm zMqyqB?ns1+oEhU$-LxZcfsy|)3k&>?sIE=(uO=8ECLEKXrm<=TS$J^X9A0$xO&6T>)?2w4^=^Wg-PX%d4kG*wI)^Qeh0TyT+s^H~f|>U~MI_*9%h z24jLUqOTM;7{>rbVj#eQ(94^2a^17EK0nMJuJ({5B=|>dm8agovBj^Vd|v9y40wq_ zW{Ul=q}IzrmiObZSfbOjy&$T;l}!5TA^MaeiH$Qv`1$pn1Q9rw%~Oz7chn$V>Gyl+;H zG$}oBn2TxpI~-s>x_`dGy}zlSmGM#6M!3h+&&qhu7ybF-KsXklN+s=-GzpnnOyg1; zt0kdXF7r%w!x#if^gV-)FV_;|Kv0oY;Z`*1P_2by*(A%b19}|sX(u8Q))rY0Rr9xd)HOaPm$en%Uqk*iYhWt z!l|{NcrKM*F8qPb{X%>1&gg$iP1VdS&qm?{N10-e zT6(vzM^>_h*&W$0(ty@kYJEafo#D=(-PURb?xW ziFN$dI%!_?$rjA$4H@hpj&MjbOcb8Ic*~pBWJLP|^Y2}=@6r+H?ltR&n`e^iH`c81 z`hn)P_Z;PUtosq}5>S34plXL`+DB9IY)0tMmgul7YpJZ`qs2Th76*$yZ#)XG@$C^P zbDY%&(4h9qo8C&}EGbiYdMnjM4%Qrd3D>=FE^8bDz6jn{VeE&q&@WL$M&`P@KY`|5 z$_o^Gcyz#em>!^2X*+YCd6D|9&?JhY^@u#B55ag?!2|Fv1N7(+ zL}6YCN#kAQU6<)XEyCmaD6W{`OZI((`qk$l`_($<^d=ak5`QL9M_=CSZwX(pQ#jJ$ zUJ~a;hC-U+e4|B-C1?!ev4m&L6-P#S9*$$0Y$;BBEI)|p?P4s1_2B{eb=eAN75FX( zD4;P!w*pNpdGyBV`}&Yp)h40Xmrz`UQuXBFLG^73kwuawQ8K>0Ov#iy*^<&KLY)St zv*`4y0x738NKI!DMWL(uyiO)MMPDzk@y!wVpD-@)7-#>W>`?)}B6IbB@*)f4F?(|} z!SVYzM@5(iGj$w zQ5qy7@#t3xG0NqK2SPjQaSc-;FEboLMPX8)rj$uC2^>~#tzI%cte)N6+>Bb!+xaJ} z1PRsAbq-{9X-?je7I1V>=Tta401v=N49dKumxg56OQusC`_%tPNKVt_6XK98_#y!j zMl)`#qghG_%X?u`<^;1hNkYL}kgOpimfHkHc>=->yA<96*hZM zc6jLHxCjyRqU4EjE4vP<7TpDK!k+{JYWHp|9Y z?vm9(yvUbHWvcfv&qC&+|NC1t1fu(_8O;sNi)jS2GL9E}qLEo)a|PKFD^6SDq4;)1 zDs>TmZT7qiF(F=MJw#dv@OLUST74%}%5O`g`d@RSVP%mbJGPLpUS)5Rs8xhrQQ?Of z3#1p^MWcjg?kEzFW~`FdU{r`an%SH+jNZ9en`a~mm9>14K%B&a6qqMKcyq{I>gCZa zCp8{+qz&TR96-sRprRgEqCAlGe}dyS$px7o92viBjJl39H*1upRoZJdEvjH_>WF|Q z^}WPlmKOp~3HCUOo6~g~W-K+Ns1&iVk?5BDGjNH4!1J&W?)oHxooF4@xt`vjmxVJ_ zU~qZ)g2;`v>eDzZTB_3px}mTYo(c!x(Jyp&UMoBlu+&smPXRI<25(j~vMr&9Xn0&zug*rcFnVkzbqh|$^=xt;cm z3LJsk>p+9Klv0(FDkgPW6y8mtBLG!Rg~HQi6oFQzpenN}r?$y}Bh(`lc<|s(a^X%8H@l{Cs`^CHGYK1o(9?oQ{Z;t#*~iG_ZoKT70p%TVXb}nu9smyKdgA(Yu_(LGnb*5-Coax zJ>{!7DKHPqet+@$l3z0{tO#TXPM;9wEwe~CaJ#^Mm~Y;!jDYoP5iNSZjhYg^_T9~! z#R2;@j2FJIru}9A`M>d@6Gm=Xx8(Y2C;4-8QT%!0H`m0EiZtq9hoUHosq6HwqA2r! zRn0X10(BMYrluLX@fSr^OJ57x~}=g{Xssz{wjZWK$oyO4-DN= z@nc&zDsh^HF-sscskwpX`bRZCa91y$C=F%J_4myk@@-{mbnu=0-~S%``fKg(bjS*f zCMh}u(tnBeK;DJ{7=2(0PgP$Sk4Ic$@`9}BUneP|DFu!mS9grpSlPjUb&vfa7_}kU zzPms0fB$LA4uT3K;d3?iJ z6FN^Bdrv6(4~Rpu{1iYZpw)FFw5luGI)0Na04=K1G?!gO0&-63(C(*-~2uXY*yXS3($_W`G6{e)F;Ji{3pW1*5Y zy}OPg(j*-F;?I>WWMPZDY~-{FlH8)5J?LsRwfZ4(NmG6Qt%dII=(A@1M^UudTEFbG zX8l(TRcWvP&@{~b`hPDUy8iQf@r&%1#e_Bn)|UN)-Kq-C_-RmvsjY%+tf|!^VrR+q zy`U~4`x0)(;kjP?%6QSa{G%ummw)*?@SG*uug)G&?2CIXei6WTvZyo6tzYz7YrbGD z!JFYJKl!NCn3dSbF8fl%_(v8kYvz9)%dw3VSTp~j3bncUZ&`-6pa1vqq4WQO&g8jF zmi1()a_&_wG5m7nt_fVTOxHAKcS8s%J&{mHYvyGr9%JxV0`Lg@wTUY_dR!|B&BL~G z)0AG=DsYv*F2FDmq(T+afB$<>mzKX{Y0QM9LNWc@LN-noB||%?sgR%D%-1_=VQOgP zRDLFOk;)h7Jrn^CSueHPSj(h?rTD<%J37D&-68na550nnVm*BGRX&{S!g;|+56r|d zIRt-Qsh0_A*&k4J{wY3d|s+#lqpJiFhY3+me+<@)Mdy z-MDJmD0(S$D4;@-Q59{pl+0B`ig|(sI=bl;sH}`j8D@DoUxay)WVby3kg$ap>RVQp zA+GO3q(n?n;Z0r(L$hjdMiuPqC1YhW^c7!o^a8^Gu+ZII)h+At5$T3@m3Dj3TYaA< z{_$d;ujuzVWP$;w&AVH4kv&hwJjJi)Sh)|e3*?GdA1~D#8ZJo_f5{;3m4rL{tXu!< z1m0UH0BhENO}FOHe-u^G_v`R4@NJ9*d<~L^3vZGr3ghwn)Mu}SP76>N zfp6(V3BcjoqyPxaXw+W~Ufib46-k&t-~KIsc-U0&aG{?;4bQlgox1$`t3Xx{cFaV= z!Ms_5_5uERRZG83GBC=^Y>dIEjL{5*5ppA3cR{Oyqa`YZ0Myh!MPJ`H&)MLw&?DLy z88srVOY)=#mLgg&(Y-SIe@Gc!qyJUD@LQb$uGRmv1^bU~8hickK0egAE!zLj zc#y?P>p$pH;yAyoHvKpE2KTi5SAidb-M@M?XZ5f6wZrDmUkeuh3ePfozh9-ATD0Ud zwIM0yP_~TuTz#N+`ETdNOhqWa<@XT$_2I)+*8eu;Yij2<7N8_!d-(*xzQ--)4v4u!vZreEb!( z`+0$P)*Z_%t8<}BTI(u|Ybl!3dlp8p>BD8ru!{2aM?g3$UeMgnheAC|yKSBka8`_1 zK%sEDP#!zjE1eR!b?e!yp|qKs-sC z$){#$7KmVTyzRDF&GCg9PmyIfC!3<9$Kdd=5ABO}&QVW=-UQ{Z@NENlSaspUrgha| z%(ada^mtBQt!+tla?0Ubj+-^kYkZq8X~KVaNbw@_HiG}FE@Er+KOVqzoo$j(eTqbAsxSH7@!6Dvpe1f$BEyaXv~ZzQcO9 z30|mePOIc2Hv}@HUyG=gaj=O)9$nish<65ChQTcieVf@7tLad zHRTxup`CArJ1uvD7>x4Tda_{V*v`lyuGwpwPX5sRG@?}w|Gd6@qpVWM=1qPC{&~n( zfWv=@&FzaBuR#2?!aD>pCs|rmK}Go^(A3p$k?fdC!bS<#;q{FsupUYRMbhvEhbj`0 z_x>6)9fHQMwO)j&yYQl+I82{JiFe)kV&sK>2Ie+#sS6&nyYy;jbY5IY(h&L?GX-{I z66?WVJ)E}o7VJses>R#h4J7rqJ}%#`Ek0SY@dQlvq{yptuY!l*Tc#zE?s>S-&?H+5 zHWH>jMbTB{>DQDn1hp2hOLF(YAj16B2)$3i(S8t zJh3AdXcS)dB~-+>Ikf{=M_fI6F^vGQ$Sw;n+l(@gk+MqtaBh*T$rnV0)LE#tKduI? zi`Kr})CIooAxdHd8$KYk{*E zMQ3q=vw&vF7fyjYj~N%i4#5ZrGg1MqKu?|yYe{0^Fz7gc7Q^Fde*00AjZrjCf-V;w zY7T8+YLCMuVyB_7NsPaeGSbOaTKL0xI%jE2FW6}x-Yg|=md5?)nos|?LAO<){X4CK z=ttUo2DS}It3dmcRza*G?MWF%eiIQmMd@m`Zo=h8-AvpdZ6d5!hbhmzcF6N$R5Z=l zdF**f85eV9gJo`n%Q~uM`JB7t2^`Kj^$Oa<95G_Sg)iWoBMQlrEb@!B|+9HZNsaiZVY9E9xH2%Kz!FBrI%)9gaA5c}S z`TQTIvXB42m(N1{|9O+Ao?nYf@7Wug4S=pf%bfw!nYY#fu<{r?|8OF@*VM`MJv_G< z5v`S!uGgw>@z3DfIzWJuL*Fx@NFO}pu6z`XCtjqDUN8m;^$I?Ogg9y58bC2Fl^><6!_1;w^$I*);>q)Y6cQSJ{6p8M}h)psCy6qm@?{9wxUnBqmY?6`{XGT0Z zj+z7tKmn*K6zYQ$ha-07%HdsUx(C+DEkJc`#ko3-ptz9Z*P@p&frN`&4wVYTN&_9bdNYe@1n`sQ>3+)HCJ( z>1h14{~zTk>3?LN-04no`)%E|BNy`)skbI?Ue`HCQf0g*G=x!vOHt`;1 zT}QOX!benVw!V+3986swQGIk@C_ZF9!FqFb)kH;gs|;)>uRCIu=AM7@UK(qQb=#t> z^7gxuOLCjDU&UH9o&B~f#*(vN-iI&b>!)5j=VNwR!6C zf1jVaT8aVNUwGg-g@8z$hQ4o7%j9v18mvm& zi@wqzfLiRj`$PhK6Q9Bee!)n9>Q<@|3UI}myJ`>+uwHb(Z4m>zsh<(V5}XRy)_8w; zDd!AU1O51jf%pW2K5w|)tK;{Tww)`?o+Z$qbK5;d-YaHpU0gX|OCiPd-^*==)&WsZ z>9)G+%A@6D!Ayj4jd7k|2dcPesbwpmAfQuPFlydE2`ERPiZ38iwf>xhP;;JPPI7s~|;?BE-e)vm<2z3w zhp&)lYsF@U$)R!ekOy{w%_fOXq&JU}TR-x^vyvt2KZ`2CLXV4=l#q<@>E zHH^3Cek*y+Sge5D{y0+CxBneDPE$$``0=9{Ns<0usPO$TWFm+koybplxW|toOO&W# z$qQ@tx0{#d+-sI4OU5EKHxvb?rr*ro%2|u9TiC>fF;H1{&(O^^qpU7q*1c@ z32wxtuh6=}WlA>M=*10bouL~riwwJkHr%kuFW{GrMr|Wd=2X<*DTYn7pyQz zmLBldO5a2e_Nq`8miK_v<|}Bb++D6)4Eu%JRyYoXRbO6tCQYyaXnS8(^R}wo>MFLj z+iW&uK#IDv;R+!6(Hh=%D;yUxE5pr}WC97&=YH1iN&h$VsV=Td z`7&AuQjepAQB|9%qv7osATMY`b=D;J`Bp!$KC1A<+2ZCoc(zC|QDX-S==3#q-tq17 z69uc>O?|S!ptq;2PO)0~SaN)Lv>#qRm_5fuTHU>{HN0=tUQmMj-eWJg{{Fq?pnuh; zjr=c!joKFi+w6a)(}^knkET!Z|D!zl{huZxpb!SWAuh9^pBQG97lBn0G2P}O<$eBr z2Q8U0!P69m^6MG>*v(*?U__E^13rH~swhbOIr#k9<1jB)QN)8j8QMs_PMQ~E3T+sy zGDJ31-i9AofTU~{ALF+eW=EhWe+skd-VTh{M>`68fbse@!dsY*EMzL5Wo@oP%73v# z6EECR)J0lhL62Ec{WGtvDPulrVQ6xdwRgepPng;X%{Hv5eO`T*WXhZY7_U*5#4Lf$ z+RqS`L_F6;rOk7|iW6B!pz`iHc(!JUERX%pGT^m3NV{rC1apy)lvN0drB3;*wqlw} z4XkTvmXIV!q9bs9ay{-!kMDV<%g7?>A6N|ok@n4Oo^v{;&!)+t!>vbk34LXyR&mdiep^ea^L$H zPDXW0U*$H##gfd=b^KC59^sC_ewHL;zl-r=AB8s=_PHK>b<01CcONT!Y|6dKRkh5U zL)F_hG+X9US9AW~+$CTO|L^ywM*jD~U^?wR@&Ctoa{m7&h4H(Ka}Z>ZE*s=WSg2WW z&i#4F?*`nzq!j8r!cK1MjF1~ZRNVn~)Xn~IehHOlejOPlcLh#Hw(u++hRIiiG!V9i zC{VwZ1wS46zOtt|{pVc!LFxanbpGr0pZq@_<;m&4P-pLEa0W9N2PmF{IUyT<)7I7DMvk269`B8LXjB8QP1oV0+TAKVOhbqrWE=A{`Y2+98E zB!ov`FrH8*K;TmFwhp+1n_OPy>dn+9!aiyB{%B7v`Y+?&wNd`np#PJRDgO`q{U`hX zM|pDkp9fOBuktSst7ujI$*(rWpZvB(?WY&3qx92j=qkU)IzIpcKlN`>gb0!bQ+^mq zE2$1Re|dd#eERd*`A!4> z|HBc4DM0ZI#fWUSclv>qG+*#(NdNN@HgN{oLjQZyu|@y$7D z|NBv%T>i^reDf)8sPoOkd@I4M-5b~z6x^w@Jz)@k_S5!$S{>P-rn7CNv6b!SUElc2 z=m>n`H#+R#E+xPPA?Z!Ttp09NcAI$EJLrjz^DGVYkNgXhbya_m8HykuQUyufyMy+naorx`t~5 z@d*la_$<#LGZ-@*9HJ!fqeX&A{?>GR0kkn&JM_7^Nqw@oxe;d#`hy)994-X^Vk(U0 z^#8%n|ARsK{NI~C(f>zz%Jl!f=YN$Il+XV;CAOUZ<+m;8f4x|p^S@r>p6CAthkAw2 z{SgoK`I303L%oWRFMp`tVs(>urnb!uXIEXynP2Qf5)^b%lM1|&VT&A$EG8h8%thQV zb;FVJrwsbxn>gAWu}pRMw#=zvi&Htje;obCzxvaV|K~IOfcl^QbZEx^8BCwz|2@v* z(*LL_pB_{HQ)GW?aD24uf7BE0!|Q)+V$K)V{}i}s?D3Z$%iX?yMUh%#E>c#N1}ea4 z11(-RcJ?zh6ZiM}%g3?)Qm%dmr~l#(f2~ii4e5V#F`nA=U+jtf8@^^A^8DYQn)$y6lhITDuSa=Y^k2FI z@!1BF3HW&k3*$%~AxuCrvmUK?{5WJaeT#PyrKDW{JVVHmYre;7_DCHtT8=*j;3QJ#|j=Y6k#EmX3& z{S_Z=m%rlEmb+iARGq6|t-}3+Jv1=Yo3zie=8OtJUJyfCKg=b`S3 z1s1;iHL>H8fwq5#qUh>9BEdp$?T53=m%kjpeyz6Vy*c-kBA0L8UcbEQYbE;ALAO8Y z_PV|O{=l;*y5`7qEQ$}@81J0tkjFP?7weJUGv4gSk4)SWQEUe`yf~&jpAtJlY(1D1 z)t|}lBFjBqPk2h2yoB{8e#_Y0uwMYMs{{=Dk8jtWwOkkMnPYqq3rE9 zLa};K?Q{x-Mi(#q42IpjphP3@4F6iOQWb@VHb=Rdq-1p5p&L&hrK0f0$>-&X>v#`b;G^buGJ} zxh%WiU7X(>zrFtPh(}a6*h(FeTaVm+0=JV9jDxSk%&GSN&z028HGo_9|D^2y`(*#~ zIFC#J_lunF2hjiul2J`Jlxq;XcCYBuJ@tFJ%C2M{Y4k+X_3eED4WBaR+CE(mI{$6< ze^U+6HvP|JX!8G2Z}epU|0qw+|BKCaUk#9T_Y^vy{Ig99lz-f!2Qtdl(F7S)n&^VY zlLJE=#NXUoA5@%6u3laoUmjn-xzscU|KUBUjLIsbKcvp+r?c0uuYNhZKKW6bVP*#C zRG*BP`b5_oeGy&CsHQGuWY?vX2YK`I|DL>ld;0S9{N?p8Z!Ukjx;eXeH!3ZsGJFH~ z|NMHWnz)-7xT}qo?Th&jp`L*xP-Kwz^WMLhqUH-d)$*T+{om5>Uq0LHKc>U6ng4k- zcsl<*%2S#D)i<)g`jIrk|JhF;H214aGGT-d5F~fDiXxdGWV;T!WBN4w?5DDJ0ZJ)V z$}!v3ofryvN@T?E+VfnfF8S*BZrLY7Z}~+_#4uI#s&PS-_|x8&26;2toEE=NYG1^T)uOVSAJN^pCc z64S*)>amcT^dEj8FpK@@EG96U`2oZass9_9_J6}+@5%oAQJzNh|D{+3AYTS&?Pwv+$zGAk^?jk{XJnpbEx`tY(;o0FYY#x^FfQ7G^30C$5Jb%QvV zby2dv?t6k}2{HPZ5I@(qj=-PTS2mK* zpa1lGNP;!@zf3#U$^oQ$|M&ZYiK+kV_Xkh*Uyt%MmjBK~;0CVLIM5X{NUAW{4YIt?y zn&p|lBFSqM-#su`5$^h`NCNL#A|~REVU{L9|6VZ>mM)a%!&0b53+7@fwI&lIQdFAo zSf(IL+z>q@rbsB1qgS{$uf@JFfbQ+JSj)Ti6{voYs{A{2e-d`s7Y3(8*UD3sHD^Z|xHqcDu%dq3j@+OzkKJJkPRR*+=W5E>1@ zJZV1%RBBVB*|f!6ij%J`9etrGf}aDnk^h_R*1>%OoraNsDP^>A=-!w#p4PPZh4rUhZs}ABb#XYNuQy6+*v7Ox4q! zYm1_kw%^)|7dg?$U*#u-xZEGLM@m)pTRUM``lPK~j`LJrR5P5j0Ke9Sudel+E*Rfw z?Q52u@8idU5?*9*hCX;4IQ?t`Tk07Aw|;O3Ogi4EyD( z0K}{1EzEfJB3Er`9GYZf^yqwh`?y$GTbnXb=GubIE;XK>+D}dWZ@Laz2LGv(|Gj6% zf9wrLPx(I{lH%i!`YF({EQ)|KkPF<~T z3#6F^JxkX?GgbA&sCEUEI3Zvc{$?-fbv#2!COcc!I?6AVO`1q3Mw4q)l1!6Ej8^T% z3TX7S#}8`OC1=_h*iUh?ITcSymbaZj;-k3Xt-dluQD2^p7BE_N@nT<^esxl2VC)@% zI|x%-qJ{gPf2zdRmbosr9#Tm^`oxxUyTJ8D6n% z=TUO&M;>^lDoB(i!;LMAMOpmTx~dej`3XPR6>&}eFNN|iaR1wzPWvYRf4cvDtfw*m zmv<^(g5!%-R>}3%^XPpzzIm=~#O-&~)9>%a^0oHMTwML?gk(xEcpb3gt)hl!K@1h5 zsmzYJ<f<6|CMa#zD| zH_Z}~1WBY%#UAi}yuQA;$~Cmr3R;PFp0EnzU;!zf7KEhOq0;0%k?X>2{B`1o-}{jt z2QbU~Kqn%KZo8`((N7l0bgq<@28!w>JuX{HO*gkvdPUYtq*3oMB4o3S0A{ z6nhPolDg7g`B1*gv9@-0;cY2tSrCqXnVU(eDDj}b(>iY}UZs(jgT2oD*$f4R=U;&! z?UNN#mdaIas(rj-vg)ND&*iO{>+6w=nz*1jmv~2?s%?|u8U}`#QrzPi&wk6x7%z1( z+g70(C^yu!g65xGSh2&YgAyl2$&FAiu)aXfE}GhQmxi6LZX<*j=Lw;Qo6T_;QYtN% zgzKw@-D(h3jidAje~F@vx_q_FuiB0TddYv&Yty;EL;;Mka{7;v^{n|@A!D- z{Ca(Ip;!mV_ebFR}6w;OjKf6rS)tJP260++7%2v77 zit|?1xmbMM+sg+jUnxV7uN0nd*MZnJ1hg8VKRI@Z z{#j5Hw||F=s;D#MmSgkQURR5?u1l9Kl7Leve;J3|(BPrP@)BzB>J~%kxa#L5Gxxa{ z!e*Je=gV8tnugS-ir(<1Z8WDKCI>zB?#sQ0>^Ia8bUD^c|8v97YYnwP+x$O=rTm|R z;i&hd|9Omu>3=RES!JwRkLa?BIHqP`Ft=7R00qZeFEeM6Y$ zz`}0Zwr$&*wx(@s+M2d)+cu_c+qP}n_->zb{>9y7QF$txB$d?5N-eLJn}OQ~xcfVV-~d&YAVQm>o*gjyd)$18jfl1JSya;GZyWv_CO# zeBIl=K#QYnVb|b{q=j2mk2tcFDfQ^$V4q4#4{NQ$Q8T>MyUL z*>g|ww)TmS2>N4>GyTPFqXi-q<@~O>way33|HZyxoxkCf`J~FBfAnR`PWkK+KcM{j zL7O;Waz;FMm9Noh?8ws~0TAPcT7x`_gZZ(DmxL{L7npi?qX35S%#h$$ujcaI5;ATBO}`=~h3!_Os1bfs*xC8ko&b z%-)BS%mgbS{yj{x@g_(5b$82=s@4~?(BtmG)@rAT%?r3Qt(sV9TGL~dsws0MoqZlv^(5cpc?y6JYZonhT3C{%W z_QsTQkRTS9a%hqEZ@KpDoe1P|v+U4Q9H1R8)<|0LKPx#L=9!SGs5kt+4{pi|A7ueX zDKuUD<^Rt%1XI=7gmk_oKZ?+K<`M=)fnk`GyNq=HP_$5lepiK#@vn!OXWu6DxND#} zimp`QlbVxqN5;G}bBqj`C+YGBshLQ57qT`hCWm(>L(j23IQo-LsWp9>?l!aY_V{Ar z=`u_4a4l;u{^&!)Q3j21a{XD-`Y%V@WHCbpUD!A?a;4o>Sqp-F8Paf$-u~})u-1jM zOEyG=0e_rk+27aJG88(RC}P4(32%Sh@QPspUQJ-eOS9rG{R%mj9t)d`xd)o83v=v( z!<-h?({p9s+J6+sy7tX|0UJ+qEmpRflpVdeN4wm4U03hFu6C*zIKR1|ibp-R_5K4X2Dft!79z_2gsGfgxf<4mLO z;4k{}m9h2MNDy_@68G2wOdAgKKhxrlga)_0&PKB?yQ&rbF1stOrOPCz6xFhBSybx3 z^VC8o@z*a-GKHqAPa2SKL=kgIpIy)YTvYo{i=0dgC+77(sP-AIl7_{cpXftA#(P-vs9@pFz)YGjY^@KlW$?E<=7K~)e*Jfget>p}?>Y{kOE4$t z-dFI**E>sM8(;!eO`Lb=`Z(v16}9$`pmtaf`*+E#hn%0HD&8w%f~%~t5s~ou)~45a}lQn1ap*> z;n$90Y}7sENU0QMQ)E28HxAcdNLPDM6dRlhFhjE}HxH*Qt};2E*)J-FM~ewgI+Uup z)w(K;>SY&1iR;2ow=0Qk<@@(mJ{RKvr!8N&VzJM?&w^b)v9Rd zOv5i9?x3Q9-f-V)^}3wOUF_%W-TFeZXnF#y;+ry%{i>dQ1NFwfYhIE74~hgi#*7gO zFT15n^k_UR@prU)9Bhjxx_M@ro>CP=xH`&r`QFRc~_T-L>z({D{>9PREmPcFarQ5Dt(%JcV`_r(%`7ruA+ zD`Vl=V$u(UdY1S#Qpgu2*Yz3qPBOybcqD1c=LMVXPU)@$9ce_{#C} z2E;dvh+iVP2_%=?(i__}Qk3wu16n>g3De=(JTgQ_3oge{>4|zHUBn69uNytr6Ke>T zX<#m-_yO$5rQU7gc-U`@0Q8ct!Ctd$%&s2|esFwTz4g9y2Z@XarU1BLSQI{Dl*jaQqwUBh*@#XRyuZb{_fQT;uICqrG%;MHS0}|$F%oxEltj94 zlC(Mn+6@dzy?2j9Ei`Ir0VPGb)u~XX=!7Yjo(Oi8U!}z}gin6_w!H#66wDzAt(O<* z)^Hf8xxH&NMt(MNHKM?{mvX_{^uPidAILENYsc3uZZnQgqvFZga2eB;BP)kJpfwZU zQ(yXgOds@7Ep?qc{jICT;OM7HGzwOvWn}RmTbr@Ml5aK5pRvT6P2=C4U*C2-G($i8 zrrc`)!BHKZCdWd=(aR4{XqGnhCJ>g;8w&=D7J_nrN>spqZx?WHbi3ta7-sO#@l1aW zTv~aAHeu2bjpvfCxF8=DRYNOlc^lN0X_z-3Q-d>mhHt1Mby zR+)+&IYpuSI2tkPcx8&06ka}$>x+2uRs{Itcy0GyP*4XH`x~(ceE8@n7J1KP{tGdwO;Vi`v3H4RQ%^h+Y%iaXtLS6}6pE!SDEF;7)5<`ZD)m0O?t z87Yhn&sDdX(;{2h1~&f^$~0X3m;d#$#~P{3CXql3`J1KG22i3RV;$pSoBql2X)J1{ zv_F${>R+d_0%}@CMD7nNPj&gT%s!NCB_Au$`?&kH6u=~kD@!XmGk zfi&K(Ip>1g!?BUr!62g+YTgY^{Tydjp~Hs#P)S%i?4{ez0q;>^RV`B?Fm+G`U8!i6 zAz8k`;V$nfNw!HR)kYK`RW!6{NRa%i(ZnSN{^&s#@v}l(OC0oowi#DUpOpE@yGF5g6Wff<*o{xf^qA>xi8gHPekvX)0w{oGpmaKe!kCeX(j9*~s zgd{Eo`4=3Of@>`<3_JQXb|MoZaqJX9!WBwv@M{WbZ8j0)Q>ga?JWACaBfRoQIcJ$# z-1!V$v!x1@YP&+`P@TD*7N;qz4!q7fRc5tlx~9!Q7MA)0*)-!z*CsVhGlhJygSjP_ zAnWv}z0OtAX%=I}fz@_Yg2!Hxe6cxW3@Y_U!bmUz{lPTg<5n1+!dTH^RP=)1dr!XD z;L}a+8PhAJ6)vT}=uPX5l51cAnZt{yBDJ4%$_P>)Hqov%B3zAZR)|{i%qn?=mr0U< zWS=SR2Ps+;W`J3*Wh_N_^fZ_S4Rlz2d)76PTc}~!w%xF(PqP6J`;HdR+sWklz#yB@ zMsu7%s>XjV9Ib06-%wX))hix~fKA}K4euUol2V^7eQY$ENm+ro9nXGP^l_3-$Y+YB zYK@PYs3>Pnh|OT~32MlrjnN1{gl*IR```T*w+LpiYK zF~gDymsfE%4P~1rKlgCZc2Yi;fEDHf(U=CL=G3q`pLdmjwWxs_XcK8-UH_JQaWWAkt6a{?zT_NX5+Xk0xLCGrhqRhAofx*XT9I*qoB z3dD03F?K#!JmQ}P;6SXymh@1>_`dZC0=A9&U;qdV$YTb?1?J^o@P2bEZj(?xj{)M#tiNlc_iXli`dRyhF;qhd{vE`9hB1FR*=R0Vyfe^eAY z$a@wr^LB8fsG24%iqIo)q&WzmU>WXt%fh(+oo>m~@-lQc-#D(fw`i9e_AxtzF%*!6 z1(+p_I%Mrw`YUZ&F(}sO1!mw;>sciYofbogD6yhKdDbjIBtlsJYkzdO2v;hk>Mi`3 zqTS_sO*WS%6dy?WWO{U?CAt_R}Uy(|I+?mw3H4l4LMw7Nz^CZa1pM^Ls4VZf+;Hr1Ml*lbri)_NMls zlFOO%>x=Au?p_P0k^dNM`Pw{O-ueu8WGN*^6QpwGd~bx(ZpOE~G~~<77Oc)!L>}DY z7lNf$pluz10HM_M)9(FX?E8T^XZ#aj0^DcQ7_cc}oMLi0#iBVxqYUILZwsvXDl3&% zwV$ocCBt$?Ig~X)TFp>Bic^ZEbY>+BJvpLcy#CuklaOaXwoO$f0q@vs-HLxkN0Y)# z#Bod2RTelKbH*8MzjT_JcI(OI4fnS?ab8l^cG5vNGg?#1?0Udc(fZJ zzm#vCS3qR^hhl`0oA{0^YZ?VsJlTfdOl~Y*a9Hk%-ExVjiLS=b$SZxw8uDo!=1}k; zvY>cfOLZhfQxwhI7+bDNK$0)$EbtHOa03+gYZB$pNqSH^g{+GJpyJ%g@|dz@VmVf1 z+XT|>f7H7C_chpCE|Uh?uKY-b0J&s697ND`tF&Clmf+XONbFH3p%2#l%!LZY$q%Q= zr0+_nX(Q|=fFy&yw;IeudkvhT&Z$9mV?5gib}-gA=jH(PykgPGsQrqFM3*8Z*)s$9 z>iUNFdIx(=b4&km?6C|u<3v*R&7`l~QE1ME$DVP`__k`r_TG(Iefq8vanra7v4cIkwn){7Nq(KxNIRx64oxSkDl5Z(Ix_6jX!4+K@Zt(-ZAu*@aAa8(G6+ zeU5Vk{|;Cx@YNP0RFmvMwc;-EjF!AmX3pB_F@8f7enb}y(_l*rqFNTHf{a+jdIVQ?SE+EknC6ko zD`&6~h6?&ZJu!14b)=NjZdxBOGj){7IjrOEJ!4x<#qtx(GL<9!JFAD6m!G%W-POhU zr=v2Jvy^csJG--!WnGh!iY`MbtP=R>@&0maVj?r~AoAd5MlV-4H<{>7(d5h#;pBa0 zI=%hdkz2ZOnsdMDD9_;qk5Bsn4`IEJsD;4Y#ms9rq~dX+-3e`uk>QCox_W(V*N!%+ z56O*5uaGW0HE9&%Ihsxdqk~%3)ZnaCV;QI$rBP-(MoU)Z2e5ioBs$e>Yn^{1m)V>M zU1M&yqbNZdtKoM}gDBA(6<8-8uQb42C9F5G@Kb9|q|&M_3lFzu-C^~uB)d9>KlB6J zr3o|TIh}`XYoS}+WX;zsN-?XzZ-h@Lo09ncSMNH6ft+Y71BhbI>l!FZ`Jj4Os2_P8#v--WM`wvkg)$< z1~$xjr0AX0Y|_JiB38|3u?>bZx5W@W?S`MhZl2dWQhr4zEP)JiDU(nGyp?@!U>Z4g zEi<$>!TBfT2kx*{+w#Q9*nXjpF7P0T3Wg%&VNJwSVO35+jPqPsB)Z0m#Ymm>lUj4N z9DbWxz;T$EM2EgzC;Jn!*1@E;jGQp_p?5wsa!9%^a`J@Fs}aj@ZhIeKF;z0mUa*@w zi}YkQos-%MIkPeP#uuIzt1W;ntyKctjQ z%8dcl%QkREy7Hak_PRS=3^nT`eRyl`y%oEf3Ogh%(2-ix5bcO_+}HJ~=7&sSjq=;3 zETBV@Ny;0Ajz9shaS=Om`~@(0{{a~O=16n{dVCz;kD-E?0>A>8psx)e0!-2=uMDe zJ@akVG)&v-EFB1V9dcvB!NWUT$s(AnCj-Soahag2aQEEx1>95-{Sg5AG}-X;d1 z1u~TbfQ59&XG%=zuGxIjTlM{V!KJn;f}$?*>c+mND?W^Pq#3zY_4ifu1hT9hg$Oh# z)*IHuA#HK$Q;n*9t=}F^KzdMdR~cfcQiEeoMr4YD4@V#|;`05?_AroywA|# z-X@awzC~sj@M)>WelSzPJh()CB+buJ8JrV2iQxLM8i^-F<9Lnw%-f)j6h>Jjj=|UueUNp}$#ELSnBE#+@7|KdJ!SVufaP}BJtb#FdqVeU zog}K(sr=*&`!)SZI$*NKg?6_*S}BIhw;V5kokc(xuToyKwO=n>Sg|elCs+Pc<8pRSts@;hj;~{IUDa^Yuhd6@}l{Sp!B-x8cdHMuY8>W zN15{>zu%}hv~c`&-KCTR>P8k_HZ=6Y$1yASYCROZ8-3j7?d zT(#kks?jR@=BI`$^T7&_EJt7BrNN@JYrHMHuGpzwHXd-wcK!}neJQwhZ1-Vk>w?$X zmpK^x|jJUpD>KfQeAf3Uh_nR=>!d;6A= zNhMOH+f~p1=)j~1S^2eeFjs>`$qS`s)~$4lr-teJc~TF82U%6NaJh4K3@Xw*7L)!@6RNH-(l8 z5LIVlQr3ITykGjbdw=gYer`W{QEx_Eq5Q|!0)lK8+xs*oHl|hlD$T2Rt-$RSgIhMt z2hVZ-?z!=8CkaSblvIYOodWo>;HN$MGI@;usCp1f0oGc;FU7)Aa0MnY0Uj#)Y0yXC z&lVvmKF#s&cS9CyWY5JSL9esuOPcc{s3lSDN9a@Gv$B?vG@wf7;mRF)8n@B+@f7#W z4DAz<=-wMg!;<^7J^U5yB=RLgEbnzKW?O?ZSS~f3)H7C-WpX(w@=TCwhdQ+)?=2YJ ze)9jMzuodtT-h^}wG(ss<&n=l^HdZ!S?h+1+9tv&-1FF3!I=Od%2=!aL?Llv*}Z;9 zPI+T!bJUu9_Xe3sJ1xdIO#dE>;?9GX6}wI)L)hcRW!MNit0BqoOTW=HUuRc#)quNt zKDRO8WDYnrGoO6I%df{Dg0_Z;``)_2G$mzTbo?J>x2~sy3H3`pW7}C9(5?Y+d9Sjc zLAJB7y-{YgKiHWn%BE^;0ZQ?D7VUm`aT6Y-Y!)(Tt=cwE#_{aJmA#FOl<=QsU>_$K zQr|>KR=2~Q5D^2tzzG}aGu5@-?%XpU;o9sT|~V{&>PWlfXs5_Oa0s3 zH*0bcB$rwrb~m9xE2QwmR^tjWhp3%%ZG@NSbIKL`ddlM=T_5o7=z<9CB&XnPEu_S) zQxqC8U>L!~9LFaxk!XZmWo93*S-B-(d%AE%(1TX)o?97u!|IJhHK=v;+#a2(WTb1F zT4^j7ldn^(;J`y3qmIB2Yf2Pef$GVgPGq+xVKeMngq)Gp6YG38bG-CrOmDi~bRaV- z6L<-VHQ+D&4yVi47bUTc@#B;ve^ACMA$Rh+=%EOVkBUa~Q`eLJc$g@)$rEH7x&47<pwEhQ{68=reAki$R0nXBfgL^ zg)iR_foy@SX~2RI9)H;;@GY3g+@Bd6G8ro}F4J%lW7fhsO@JF-phS8*exYz|VBW~J zR&1Lu;}O$8n8G)}1uqMMO#aTHM%GDAD^psYpgNc!Z?|KXzf?3<%euNs4n!S1?oyKC zzD2@k0aH}ppa?LN8g7bE#b4JNph&`~uB>NqR}UlCvA~=abVR-D6#GgLJ|Btd0_SU$ z9Xm$*^ZuP+*K}LiUQ`;O)sIvqozcI~!U%bCmyjdoQEdxc=-azu9zLnfZ$;{EsLgv> zO6O?;w^A^Nm&}}Qa`e?-m);@n=~+#(S-!TQw8D#B=fi9`${A(v0&3uUD0sR2;Cn>zQd;S|Xph zZ%6JtIw709pstA-M;>biF4CBe1-=}Kug9ZbWt{d2J>(w(cR(Pyel>o#<^8cZ?qm2qo!6ZZ zg2vQC?TtR$!7(~G1goIAy;mk^{X$a5DvkP(SoAvJbJj_B@uuF3yXIF*U~1=uMWe4;dBW;3*zf~3}zOtVGU0yV% zeebC!Y~LLnY>>iW8eH&ve-RV&l-po$)FgIG^PacA9O{~f4( zPlf|dX7U<#S0KH9sMBvmBnlu2q!I(5(^xEzW+!~JhKC>>6QqH(&jp3GnimUszy&Q( z%NZb~Q0aT*?sW`spqNu511MzQo=?whp|CaFK^WM4*;Zjq{xzlF$MJ14wZGu{Q%S!V2yXo}TGojl8v=T@ zs6j8Fl8ayEtW67l@w`tx zrYzobv-IpOHrdYPt8NR>v%~t(6XWq?`M8mA@2-9z)Yg6BerE<+Rwjh}^2C4DxOfqK zKsRW{`{>_bbus7mh#!%-^T_dsd$yBPAiT66?N!6yeFV`)(EMX=6Qi0!Q5hqnJIcD!sR%Z@ArH$n%V2DV07g=@7)bB%Hi?h#O$=KV7R>94Z3Ed~%f;&({`@UTY zpV}*d;sVd z9wEN~|3WTW{2WRsAlK+6y@nemS-a8^t{*qr1Dj1^YQ&UUkLbKLq$%|Q7S47Mv%z|He;GFaBCk|;Op7f zWK!T0%p8&Wem{c5`j>|Lh5&@Wmj`(OG@iLuEFUm5foK8Yp62~DtX490X=#{omRO{c zBv(&rk3n1W#uO_(r!8tC`mGt7bkfm6aZTr**%@lyO(c<5GiPB;fa!y=ZAC!s$H*Jo z39cp9Ub2`g&Yp6^KA9qRTq-!Nqc*wCPr;DO+P=oWd$)BjW;(mz=-9vG=cHq7Q-NUk zR3@$tT*d_>#Yx$$mmze-&Q_Mf6~O_MMv*@V5cuMyD0}lNk}{taNok=AVIDgH@gYhF zuF;Pz>y5(NlkB3UqVO8YDs^DD#SEg&$ z^etLf(WY#g+a~ZW8rkq_b;ShMocu9mecB#CQX+f7h?M43+8&u%cdI8o>nFaZWow_8 z06X@5!0-2xFV`MHe7zi+eDiM}_f#CE(u$l8pE z?;jGxkkUwp`Jz&=^2QTE#q|8yYx~i7yu-l}tAvW^NLZ3>e@QFy5K??NM7U}2kkhoJ zCG9_ltpw-e6o;cLvK~RPbll#_+b0InoTq3n;nF9o$aSVr)9tFr<}01bOy_BQm-6{? zvwlLR+Q%@BaqPb%F%84Hh@_b^-9p2~_QHtd$)m`_B`^f=Nh)pothv9T?WO{fk+(Y-a#*Sjq5%h0BQaZx1-2w=-)91% zdHXk~mP2)v{@Tkk)(~7C54059#+Ck0vRx^0>QGIw_`a>*5c3tVEO8r05ewXjhfn;EKtiETm#{MEu@6#|C{18Zte<)DgaxHhOtlBLBF7O)4 zdZQ*Eo!EIsVjT3SK*{;(^tLsI7Oa9LUR?Q&vRqp}Qr5{E7=?^~>Kl^lNsVA>Dk^*$ z2fLEm^ezqHRIb`!jhYF5QL}vy7%UDN3gmTa2##oj=ju;O0Oekjp z64|sO*=m22``O$Bip+)q7xEJSwTwo;3i9_F5nwoiyBAr;XV-BhxVml|`69$x&kNOs zyc)J5L9JSKQ1$9930S9QGC`5x=cIfl{Dgdm6I+n=jM8EnL^D^auU(CQ;1fg|&ggy6 zvgG~i0_=QfM(w-f!uO_p?cBgi9RKVBO5{HP%sCJr0L*R>Ki|xMVG6otQfSQR&4M-S zuW$RvM>SvW!S4VTDaj>*7GdRJCl@hmOFuz>xaqx6LIpgKn#8Xo#=RcFk08wNA5LlL}I!VDQQ1k!8G6G4e$eYP3gLX=Gk; zPA$VFoA}~WXV}&!yWu5U(`U~3{mFG1rpD8l9HXS9+U<)kdUodCI3f<{fW@LmZg_W# z<7mF{h5wTG<#YQ{H)oyT+V7!)G^AOmzZC_(z+we%phpNxCo2iI8gpXt?f@NAQ?d9O z`(ZLg0P%19%_Kyd$qj@P7x-m08Zb_K^ToCK1~I5`c)R|al}m)sU=&pQtEP*=AiX~! zZK+5XgnCja$Y^!zEJtrkC!Q>jcgGL4S-P(ykrt@{?#AgP?6Sev{l&Gt1u*)&)^k5( z)GZH)7rf)yW(3-L@7tpJ(}{TFwK8N%xBk2$*{ECt zd};)9u)ce~=A1sse(XCB@LZa&cX;AspMrJ`fc3StH~HK(icX|?wUgS78@W!v`;0fB z$EEx2827gF{kx_^2_v1fUSo@eI>>~UN-Zh3#9Fi12jV3;;=s10vVRS&K346ZRZ+y_|gmBx6TfJ>AC3JZdoPEX5nc5R0!%&~kMzd2`>|KCy|46Z9F7*`Xpq zB)3035AaOz-_q~FendpHbcQhO3~H+Z6&^CV`1$cghCMWHW*&a?3y7 zfAa+gLI|2`<}K1fn_xmmJ$q$2t#yI_h|{#pdwNv$FhEdD#&Ne@wu1p`N}_X zdr`GDf9rYd^gEk0@fC>+Ab=|61Dcpzar$uxr+S@wYw*X!v4!eTGR=4Xh9;z(jlp z7_O~3khowcZuZgBMfBE3o2gH*QG6&*2s~6JI1>9Es2TugOUy6Rg*i@CJqH6EQLG_? z8BG)$W)Sz0Ys55>KrW#Nkt$%s(|W)*gs0wR>Q%Gic*`%qgjubHETh(7w_8D!8aTb1 z2j6x{$YCtn=rxpP^O)dk&VQW4eB8}*TvsO$KsI3@bXu@`=znC&Dg}xAQk2u19P7za zfz=W%e2Yjw!cRTrERX+ECQ4gK*4luOave+*=tMj_la*3{6|ZAOeXD2}0psWsDRRM#*u)&095|V` zK-ffL3mF;>#Y3;pYzp~++hXct9QYQEe$09L=y^5FXF~>15%uf8`Yh{d_dc~IefkQaNf z{P?%1qLYgZJvY(i6^~s(@#Xb(b@6cVdbqwkzx-HXw3E~C=H+#FcLwWp4iJ_% zFWLv|YgS=GMt-=tVKy-}z-~?*F58q%wkxQT-2!&LRy3^8j_?hDT?# zm>~uSkHM^@5yU|d>@Xp>06f~aiw0pH0>Y7yXakDfE_q+eE=7Pt=3W+e*zIs@(Ts&l z;8Thox|1JChNzu*nExvw6i14HjdIL-^1u{w^K8|-7r%Y94-Xfcomv_eq^ZK`HZvL6kfRRSV=j5R7pxk! zo97ch)E*A_>~AbQG|$xxBSiQJ{zWR64(-Knr`c1KsFWHFCWHzB>)%U|#lH)bp1PAO zdOSRbk7+{=y%V3w4>Ure%;qr z>7Hp;xx9uh>&}rc<`}gu*j0XJ;;|`j$|7t=Wah}ET{U5tdWJAS|Ksb%&8HZvmHhsJriZR9&WSrYGOa(;Y&{`%t}Xg)Ze|@OaLFBA&iAW@oWc@A zM6y)i=lawLkKT1e9+igZ-%Z0}BeMpj zG%Va|HVW`DkA{v;Rg$EkSjQKl_zHphcVlAE7+B5x6Uy~-#Z{~aQGCY<-EAwbnXVuG zb=Kbj+}XMhh$MvV;F%PVK0{X~mRoMMyEQo?EKan5VO!!bms$4X|D9nQ=2IHpRJvf! zVbc~lkV3Djg#~*2&sr13jJU*1sDZ{bZ%NvDv=&8mcbIPX>XxZn5k)yIgTBta;-)PP z8oKps2kWMnXS>}|Cnc7P=H79oHUDjT)uvm7_oiP$MryB?_Z0i}wDQ%Qk~%6BeuVEI zPJ^ye9^raSo3DA4W-{9Q72C^!4{NynrmJ*NV_*#PN@s3E^qUZ&BVd-tv@WjLU=WT) zgw5DABj`^%cqQFCs%eMMnb|0!oxkj#6TE4EE3PN|<9qfr91$Lc(8JCsDqX0CGpo__ zkuDgPE!S|TuVoV59i+1#@97Hb7~2>}|JgbuR(%vfZJh0iX1(+p*s%pPr=N*HL^i0y znAO+vz1B|L$~)?X-)5qOnT^w|^+Gg41xL0_SOxXlI)nw3qPJ?8LnbD6U>1k6c5I1U z6Z=)XRa{k3i5G3ggyW)R-qheg{6t6ilMs4xX#$rvY!-wFyaB?Lsnhaf@*i8X~(3s5Hfo4p@P+gHLb|pna z0{Ygm#yE;YU?$-^d?x~cj&$WS4{cYENK=nobZ|FEDC88}RS2Y2g}a`ELOTiz#7eX}x%|SbQ}}2Vef%zEZeuw+R;$qb z4fp%mzpBow&n4%*S=%|ze)l=&*6HGLYn@Dg;KV1`gjvyQfkgW4o;?ZhqY=CIq910x z54?8MHUgU+J@aO+`~_ORP?m{MOzRucrb+Iauy%l-axckbPwu56$bh# zTYN)-`#|X7U7I&%jrQY8DQu3)!x`j%JGqbR;80;GDQA$kJj!Ce;f4SQq%djT!M?rB z_5@=0{)lnr4SRV1LWv|c_s@!AhEQZM9d;A2w9d2=zhLvW%?uLr|6Z4tN7ePnFrQc6 zIm3PoGCz+YVZuhY2r2Z^OmI(fOzj)pFDi zpVSWRbVgF@4kY<)J&On~B+lzxike&JSgRN{iv5llPi;TRIe*mte9{POit|m=xCC>d zpJ6#KNl6-6_^Hnyg@3hix9X;YMz+EuWGbWCdQt@Clm)Iss)2s~$a`1&q(^Kt%aKit z{?#e9XjU-Sb%j(Gsn@9@ux4{m%FzoP@1tTvQ z{rl^F#KE4r|F?g%6iOc~wS@`PB4CU!@U;cXL`qob-1t*qOn3$BGOE)#4u({GNW=Kh zxn>h$!8Bpq;57)W*e~;-R0( z1dojrCNL1Dz`*RiN<r9N);uWIx|*C~&ilih^#qb2hU#(v{Nd{j6px7L&(FMfBF*2M-^e9MC(1f`5J^bu^NP-sK-c<<(p@>=9!E~&N%mA}CFvKirGf#DCk zJWiTo@Y>p9@bHyo`IhKQ7jRjnj`8@$JxEe98oOaRY=2?r@Qj3++0qe88|H$H3-{m; zg<8tXp1pA3aBa&Cms08{RtJ`wHAMzEtjg9+RrA+Zl?FmCEHs*OE|sotyPGxnjq^yI z^Z1Rm?;f{w9A(;yQ$k{;E;efw;(f4R6l9?jv2Im7;6&iJY#?o2H}Y*4iw(<)k@zp4 zAt78sU|i@p0GNFE!Y6-_^3g=%-m!rLPkIr*lD2-=*2X+u%K3t^T=ETw`L0{{Je8tz z$bN-jf_wWY8Z68{tnG9ADWEjSK<}e+X^SC;407YT_~-hV^W%COb3mM1r@78iO0@%f z1dQ085hRfjY2;BI5g@<%5oaofq?C##XGT1<%;%Lgj+^}s zawLIui4N$)t1_IdNqC2^QGCC)O3I&z_?Z_GvCPLdyP!PB%6|L~&@=>@r_(G%0*S|s zL=@1VOGKLV8mw9PM3+)ZqemW&`e2of%FH%@H$DkBJ!RU(X=dNWae)VZRuB`>)c-B- zVkKC}CPoMAQ$URUn2H=h3}x3x6UlUYBA0lbKR{x+x=b?8G)zc?p=gBmY};Bix-48o zEFxDmI@yw?f=#t)oh;TrB+~BrjLY+rb{OXhYeSi?LVpn!| z)4~2-ou^%8Y>Q3Y5~8bW;`nie<<*e?-Fd??OW-QGoL>+~PVwj?t77 z0he#CQG?6ip4Y{d=W47_gDWSu-Hb~?ShE6;Ibc1;2zgxechED zY2+rq*kSc`xbERq6RLZ#UO|lvLznP%u{XE<^AJPp^Eym5zpniidI0U!@ZcJJ$L_in zZ7a@QjYsgV))ssR*BZ~O>P%LWRG01QQQmT0dep3JmoP%XmVGvb&Rx7#h{X8HndHqx zt)9M)QxQM*TnBU63OsMA1-{m37~LW**KcP|ouW$t1`Th=l3wGZWE(;o;gQUA+F3Z_HEntGaEh=EClttud;N_#J!||GrEQi?z;1q2MA+e>e-tWpqw$q!FT}#?KS=kTq zCyMSOBb;$EQ+TVt*TD)cwEN5}V8xY1m>hyA|1{xknHK{WqDy#i4y&4@Hjcy|1Tneh z{}_6@`_n(50b?!9#o`tzU`WQu653>zu&RVX0~Up&0-?$h2D#-TrdiF&*rn~0T<3X<5Bz4W)?oEGx2Ma1P5`M#`BG)8YgKQg9~0>tH1t|JrQ>@vLiCo!3+l?RmdD zM4?km2`|UzbjabxBjlQY52<7m2G-?CKmqR$iEG=(M#+ZtW~eLbQYk2uPn7aFCZT6Z zzNdjWPf!&XlcyJis`Q066L4+*kkhe=yiJSm$=}Q+OE5g{3wh-jP+{t&3IfIl%Z(L3 zCJwC@RZ||pHd}v=VqKcyQa*@M7N>~hlEbD>4)QWpbKgr8BPb1iSoujmV|5Dg8O<7U zyq=7ki$aMCU0%gnqY)TBk@89>vu1$7G0EsaInx-UON|bVf%6N0cZ{KXAsE*=ET*h{$ zpz8^$f1{L^#s{V6j+AB*9?9uI+`-?Ck>`mNO_Q-_oAc*{J^gzc;XvnMLFlfH3ai&t z3h!N(YvwVXmTeRTW~7wHKx}*Gxk`6GnooNhcADq7ct!a+i`Qt}{{#hGsp6LKfvn7E z{;Wgt8zvI?0Mg`0VlIRMB?tSmHho}+_~GTFrRLahTJWQw5by6tDr2m?ug{up2;!o6 z&C11ZanfgiUX9szk01fuca&St z^()7&H{BjA@6gBWBvf^hev8B@^KC8U?)<_UTs|mzwHZV`j61=P%8&+e{5Z0P&yM>K z)BX#cVdwIX8bR^UjOYp4U-J_$4!qwT_r@E}R-MXdk}`18#_+5#t#`F_3LKhZ7bD>X zX;`OzcQ;)i1cor6D&89O)4+c>!{u+zEAkbo{FIN!o1m^VelNLvy6712_S&0;Gi(DE zN?2^~&i92_ZZXI8eC?-rMPblcGzf2nR_P7NtY}qC21OlXv*y z`o~|cNk%KtCV>xrWu&(Wk&fZ}{a}$K81C(KI-Q;4C<2#gz95(iO)y)-5Olz`zO;q; z>sLhE>pV94zkt!QBTmW>!2~Mlf4?^zmgxU@+8aF4|HpVJ4da%yl(KZ*v02~QQPwrW zAkEOy&rq~sL^z~Gn2Agqw*JqLuY|=d-QL}uACvcR4YTLqJrw?-ysRHZg8pNGi64i4 z7V=hkOI>glbF!c3vZ4^slASoz^j2DSeCEYMDFfH8OQOg~CR^8Z1WZePyD9h*t-v}% zlH7I{`!Ouy05Dx(GDiXD3KBD)z)z4;_v=kcsk_7;{fp~~Ra##r@*Rx_?0f>(e+Hib zCK;vppTOU|x7R1$-@qqu1qsNLcYVxY6Sr{g`b4B5;Yj;H4id?1wVFF<|Nq2@snoczNfUtxFu-&%`4O$(Nn+fkMOi942A?YnRv8SzDh^@B z7ZB@E(P%eFLQc0cvwc+|sP#gM9(g|~Hdxqb3alfb@lG+NK@dQU!3;%^u4Gc9gFhr0 zSJa_+mORhdE&;#N)fpy%V78RUB?0a#hf&78l2z7Wv|1zI9ntfSK-m5_N{9FCSn0Cl zc%MLoFk3*sdYz8HA`9=i7bh|F{wi0bf=JpL+aoB3z|ZDvd*Uu#v>1i3$Tr#OtT45L*VMQ5PSl+NkS*{Z!2Cn5v3BV62yU0T9gmnw~MvO^Lvmp2z z3U4y(|E+?!c2PXfAjUQJq8|fMSkVTXbk)_2aL~3iLj`)Zl{^?;^G4n$*&T}Krzq2r zyzi;ZmBJJy0V8hA0zmA^B!w{yg)fdu&wVm~jFRZLQU zA$KV|Kq-`f-@pG%OR1xYA;F6zDQ(IYOfLsja6FPFE4r}RYmurp4_<=Ef^FZ6B&^8| zE&Xmp)AJr~Bj^hBcH}&7$)x2futg@<7Og3dxVM7u>IYa?TS6b8w8yZa$O?S1XyyGdq#`h1 z0Jm^P*96H}Ns{o^`OfmmqRSR%p^i58Al+>utVgN4cB0dqFfb#tW;B8Bjhf^@^z?y< z*q84smF_I$qd4)vm_iht4UCm-2iB!W<(OX_m{jZ}qsIe+{0IvZhM2Z0#!H*J62k5- z+bb+hMaSO*Z{kQMy^@jG0Kx#q$!fkZJ7U^HR1!zZw`Ajrib#&Q1WRv?XDV6gIgm4wWQtWWYjie4F(MnwE;xlV6w}k0ED|I!W+}f2$W~05 z^Xsn}oc*=9K)B2IU>7BfLhlDj9Ke*|eH<)cxQb9b@4z)ztL@X{>^$zIN!W>#5bl2? z+v@mn*zse6I`WMm(ou?Hc*d5ZV|DQ&m5ZwY(oI)Ubdf|TFwVwjv-5;p@S|P{=f}JW zz9T3EkO~k6^h~|=QlQTlK}Ip8-mvvkH(ElTGvxuU*cA-OiX=GjBR-ORV*gVv;s2tfE)0PWeoQj-4_Y^( zM<{SCDhfEoF|~4$sA?ehLNS1~TP*7F*1lrQW*V#-1$d2yZH<-J(5Tz*_T&s}gFzAhYx4u7vgYk3_^oO^Dac|%U2fbj_AHc&~7!LZ={_OBza#&u_ z4mX;+Ix6K%T2YuCZU{o2VO zv#O?ppfbrP@V7o~<9x+J?Itr2LX7AsGfhHVuDnJVCGn34Q%d_9Et!g502(sYIER15 zTwr)%&0}^}T_9ZA za~82aABE=_yi>MU0u>iKB+0Z@#oA|DgcCpYZ&8E@g2txz{4n&6e*NonFU*pZ{>8|^ zNpVZftQzQg)ekM*K!usC2t8EF6XUD5XLMWZRuHs1+-6iK4!{0Y;~xV)%Uses>0vd9lx8k^Un%LSA+ku!Nr&l!$2`T zw{n>Wb5x6&^p1YzAH5@w#Uu5edu;J}M_%9i{MY9mhJF?-AkODSUKfJX^DBA(i=XGh zt2B?}(M@?XVCio_25}OtA&7C5BzLP+-bW-ccj{2oCm51dDpqe8V~fNq_Ufs$2q6jZ zPNEeiF#7>zn0Nrqm_Fw`zx)799$?!@EBXr}iywJOTP@1ecuzQ669@U%D89pPVPjti z8r&_K2j&v$47Vb=$f?xmSSxCE#61s+=lend(eYF6_Cu$-BMR<+!}b02984BazTOjK zw5g+h_EBu_cNbij#Iq~ryd`PH5jfrh*MB|&Z?8|l_j};t`0DDH(z5U+L;1OV^P`8_uhx5KW!1*GO z{mA@d+wqniMd=4r5FROt7MCcLXx?t*0i_Era%(Y3(s&msy`t^SqvY0)y0cXjQKFC^ zd@9%^j0wsh^C6(^ptukl1T=&N@hxu_wOE}7{TL*&h#UdW{hD9Dimo%rbStx%;EwrI zzYA$zWITg0$q;|L4@t03OJdLgOFvC%x6UqT=?r2~m40V5_Wpa<55taVzC#kGnu6s2 zXYX2{+qRW`KKrlWWj-{X5oJoEUY^s=IL>LCxk;+Aos)a#PNxD%(83Kx=n$k`wI~1k z87v+IpOS1jC+S2V5=#Vjmv}4|i`^dr2PAOrNw$JN9VFyFJJoNhlvYDKe<)HW%#sD9 z!K6@(aMXYjp=+$$WxGU^xkIk1mBo3-CdT5!+fD5`0wK^9WLF)%h>q zuJy$NeXlJ69qzA0*-KiaYT)kjUuJJWkO z1mebn&-)Kz|HCFGc}Dqy+%)tr@{Gp(nb9ypJFEB;xIBucSx-a-fo~qJs^_Cr+?mVF z+6@ATweLsrI}YEHFpM$R?yO;Jtjz+d>~xf9{cNpyU0Jo6#X!33s}kWN;RN9kFLa6~?uPxu-Jns9>xth6fcpf$=!08wU_U@|kXnRRa$ z?QT+ogvZSWC!wG$GDU!C!G-Bq99>g9G}gOZ0R)sc1WLYQ{Jmg!!>u)ZS`vgyM{|hA zqDEE-*Pu!CYvX z2$~(7&Z|F~f}|F3YWgbo(6a2lx_RBKW|R@DsD8ytruNFaEZNd|g0O}1h}*C`dbGw!B!6rh z)|t25vV+>fL>A@Lf*=l|Ng{4CWj#JM`F}VI`u+ZC-+B$kbc(q!YvD~oi8W9JdWPi) zGSej97LTD8Nb?sWW^Wp+-jNtmD&3wDa>qA8^X7 zD(+%fXHq*|hT)s3)8(-{4oBX|#o;s%^23W4pnuFJ0E`yjZ`m{9pdy;6gbkG&DE+)yeyg zhU)%)A~1+lNYc?`krIfM5RwQtkBp+~oaB21x0z%f7E_|axq_G!o{Z{rFR?jbw##~s zAif{(8owPA-w#G;Jn@IYU_M5k?*(`qOs0|V219oqjb`p>G9C`FAC3l-FdCw1IGOq0 zaO}?mZ|0BO{iIUUzjREqYx0|gA7_N@8403;_YKZ62%=3|m0MetwH_kO+DP}sD)yFE zjAZ)?qwqsYGW<&t2;bU8QBr$-izG!6blw*>udqp}oS|U-i^XzHL#z#K87MBAYfJM~ z-%2ABj?@1-Y&whDXN6Rb#NAYj1gHk?QmX4;8DIuiG&3Kl(EE86)m{Gy;p32r1xGw=dV}tMi|RpgFq2Y16? z6mBjvEacX>Y`*qO=b_89zwvkcjYhv^EBu?N_`|ZN9q$>nzH`2l2iVM{?&n!~U>Hek zt$lFhU9XzeE!T{CNkEhTS71xvQd*W&;<7Kt zAh%L(~VT*+IFrLj_pyGGxsvL^f0(j1g+ogN* z&z~1PYjYR$EWF-i+gBv*NncB^2yg5aSdo0a7ssW|a<0)v`M2Bbh`-CnG=kKB6*0Tk z>9U!d@0dT_0?>>6=j_@+SK=*#wuF0qil1LrKQx~ZV8@Rxx%1vWGC-4FvKWp z85IV#zr=tr-{&*-L|+i#R9ka##PAZm@ej$5mxqRZh{3F^rk*j8lnd42hmpAHfO;W``SvlxgW7BK-4}l;zaA`Q_CwmJHYgGlqgK z{Xf75_Q=2w&HQPC9U|ga&hk3kI@3U+c zD8zSrX#?FXLZ0JvT$@B~oe<)?V|0Sap~bQFpGi?|l(c2IeC|=wq!rb{S4Am;2nVS| z&4l4>VO(<45?TTWj$oOZH{ys;t6)X%6LB>M-1ghZN?2Zd5B_T?{u$>$A)g+oQidm) z5Do0U?0I1b{3T2eL!2j{B?hnZWYGiUX{Joh(j!?0IZMAv>p-?Z+u|f&>lpJTe^ zr~MIc?Q>fJ4cI+QNpFUqzI^z_zLKM(vwuQLu9Z zEgN#L-E)QS6K~kq3Z>xFZ$3lPxk$=^qnKpWf~p#cyL8(Rdz5|yULi^A2858dzs4cS z8_x+;T$?PBQOkad*EHSQ#dt$jw%$a{dU18}*6|VONH|#9vJ9_JO}`oRopg>Wk}H&1 zyp}wwreTBMRm#c8A6TVfHXUhj0?TXi2Np8E1X;v3m@TacBe<{QmUjVQcu44rEzRL9 zgQ=h%3*5?(4hDoQ`Bt(;>+)rI-JV7M;64X!h1VM@z`|s^HSuohLDf-TP&b08Uu-Ad zp;UrteHC+8iu>hHUM1+4-0^ANYOQ{O{hsE@S2E+JuwQD|KRU_yh?&6~8eZ%~qG*7H zP-uze`VYjIFo?a`AO4|M>u_WTgT!?^iq`T^J7Pa^L)$(dPi8&!?Gn(fMUa$zZvO&z zmAxfwjj~{6_iVVr%&Z4Lyk|I--_2W$pj?qoU5-#y!dXf>H7XYR1=0+~ZK!}?YJM^& zs0#g-_3Ed#1<|gE5eey0&SVx13v>;z8=%Ls+Z3~Z)-X$z)>{-MIs<77N}n;7wqV*B zXlJ}-N330i*u%o@3|7sdc2zD1MB5crce8C`RmX1{c>Q4k;4~UXqoFs)?$n)ob3E}U zb8qBLB7ZuXk9}_%1yLAHTrV7qW(b9mk9==98O%L*G8ni)v|B12WtS2PGrKF5=2Dzq zsj^m}gD8r`%#5$ekmxQ!EoHc-j1U)D6K%s{k7KY5v5&Aiia;V->J6P;?#n|)>rI{;Zf-`p%@O%-vZP*h+H@aJdzpKG0n ze`+LesX9$uS>@ogdW8l&j|di*T=TwWg~zLoPFHHKzKW<5VU0MnmZERY0iR+i@8lBH zS2PZpqNVcjrMj+AZF-MtaEX0$x!~=mZ}}I^2gLwBJ)xQO-s+S3THoja+}1)@I7DQh z!Ko=7cXVp9wc%MX+-rOmZ`$4npLc{7Y>zxd%WZbFFK#4OBksxKvD!JSxqWI@*{l6K!~jqmM^GP4BipH5Pn_^=T4% zpzT?Pj;~psB@Tz!owDLChIJ-&i*wjFKxYTj0d{9$5Qc+r61a0eiss%t7)=B0Mc#Bg z@#h%3gV8XWg)?t58q8;t2%+I{G@cAmLuyAwAZ2c*K58Ae%By2Z2$d@ui)2;f`%999 z3IK)E>IcQM-COnY{?=sEL{IX11lcZW<+IK${YBjyuqX9LkS*vvARFS4t^+vg77?%D zS(k7uhiYy41p2W&BdrV4w@4DixdI|UKE1>8NG(+A7zKeo{e-I}J4`Xcy0_&}|1<8$ zQ_N_d1~ueB0KsJT`JZ;M$?bF7b6t0B_iW*wv(N3>PsIMzvt=~CQF2f&H+J6=`%}qt zqIjxMerBBs&`s8oJuF1kTgA2wXdN3#F95|hQ$tv(qvTpMYy7c{S{u5_W1(+kd5v=* z7fDzH1;@ViQo@f3A8Q6l*#_byUzu5kdiBFPsC-wX(gZoKw!-sVMHR@pk(XQ za4VRrUNnyNB{qFTV!4JYJjY6}F5bU>B^_t)-(Fn*w|zb=^~^%1`M+m4wO+rnUhoR1 z7EbP*JCs@qz$M<6m^AzQASz^$k~_%hL3pRisVF%n8`Ut0fadO`aUiG;(A|Nk(+a2~ zg=hoR5hJk`O{e`8Xhs7N-cTNVb1tyII8{}quWp$)O@JjYyX=YoulXN0my0EI_wxO# z#jbGax1>)qn4n5lq-%IDAft2giz=CyIC)b&ysN^fztYvdNN zen$Cq7a z+yG(d1i8+uW+;F;IVczE^KBpvDSW{|e+rXmbg07od zglCzy*nRfZy{`;nAwmW2E@8lX77|1VQ%Vbm(utRu*uxr7(Gc*!IoN5V1KBKu5cpbC zzEbF2MOzv{L*n9Q8d_J!hdgCO(+`6 z<+S1ARb}5HkrYvsd@OhoP=rg<3aavSI-?sJ)7$O!hHr{5HDFR*Jayq)TaAa@`li|r znoP8tBJVJu?-UqL>Oeiq8Uwfwo?16I|686|@+OfdN6Et|SXnqEa3M!7t_xAw;argj zX++!_Ko;C+WWNTW^cKv6%Ecn*=FJ~V<8BO+gyfEdIg0sK<)cEy2DCz!A$_g7z8J9c z*y969@lSAlV8^*fnbgA$J_<(7Cm$6a2ONFqnmc(m@M(y*>AU@*I~=(4fv54UrU-k{ z%pJ@|v+)dvlhJhUPoh~gokTMndC|c4rk+0>4*i)so?>@C@R93#cpOcJ^Z9(IWa1R$ z&$CvQF)*_|6BTt@v`yB8AC;M6H9^o_P%%B<_^ZA;q;m19)#bp!ZFOZCwBzjpPc*+AnsQwj=s0ms#qwTK22}We&gDi1ZP=F z?za7aF&p+E-`g4fJv)Q%DUQFlS+`H*ZTSEI literal 0 HcmV?d00001 diff --git a/incubator/kutt/0.0.1/helm-values.md b/incubator/kutt/0.0.1/helm-values.md new file mode 100644 index 00000000000..c09f4c67188 --- /dev/null +++ b/incubator/kutt/0.0.1/helm-values.md @@ -0,0 +1,67 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.ADMIN_EMAILS | string | `"admin@example.com,admin@example2.com"` | | +| env.CONTACT_EMAIL | string | `"admin@example.com"` | | +| env.CUSTOM_DOMAIN_USE_HTTPS | bool | `false` | | +| env.DB_NAME | string | `"kutt"` | | +| env.DB_PORT | string | `"5432"` | | +| env.DB_USER | string | `"kutt"` | | +| env.DEFAULT_DOMAIN | string | `"localhost:{{ .Values.service.main.ports.main.port }}"` | | +| env.DEFAULT_MAX_STATS_PER_LINK | int | `5000` | | +| env.DISALLOW_ANONYMOUS_LINKS | bool | `false` | | +| env.DISALLOW_REGISTRATION | bool | `false` | | +| env.LINK_LENGTH | int | `6` | | +| env.MAIL_FROM | string | `""` | | +| env.MAIL_HOST | string | `""` | | +| env.MAIL_PORT | int | `567` | | +| env.MAIL_SECURE | bool | `true` | | +| env.NON_USER_COOLDOWN | int | `0` | | +| env.PORT | string | `"{{ .Values.service.main.ports.main.port }}"` | | +| env.REDIS_PORT | string | `"6379"` | | +| env.REPORT_EMAIL | string | `"admin@example.com"` | | +| env.SITE_NAME | string | `"My Kutt Instance"` | | +| env.USER_LIMIT_PER_DAY | int | `50` | | +| envValueFrom.DB_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.DB_HOST.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.DB_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | +| envValueFrom.DB_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.JWT_SECRET.secretKeyRef.key | string | `"JWT_SECRET"` | | +| envValueFrom.JWT_SECRET.secretKeyRef.name | string | `"kutt-secrets"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.name | string | `"rediscreds"` | | +| envValueFrom.REDIS_PASSWORD.secretKeyRef.key | string | `"redis-password"` | | +| envValueFrom.REDIS_PASSWORD.secretKeyRef.name | string | `"rediscreds"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"kutt/kutt"` | | +| image.tag | string | `"v2.7.4@sha256:2fa9480755229bd9a14ea03fb2129eb80412600f3c5dabc8f9f9fbf35ff88fce"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql.enabled | bool | `true` | | +| postgresql.existingSecret | string | `"dbcreds"` | | +| postgresql.postgresqlDatabase | string | `"kutt"` | | +| postgresql.postgresqlUsername | string | `"kutt"` | | +| redis.enabled | bool | `true` | | +| redis.existingSecret | string | `"rediscreds"` | | +| secret.GOOGLE_ANALYTICS | string | `""` | | +| secret.GOOGLE_ANALYTICS_UNIVERSAL | string | `""` | | +| secret.GOOGLE_SAFE_BROWSING_KEY | string | `""` | | +| secret.MAIL_PASSWORD | string | `""` | | +| secret.MAIL_USER | string | `""` | | +| secret.RECAPTCHA_SECRET_KEY | string | `""` | | +| secret.RECAPTCHA_SITE_KEY | string | `""` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `10195` | | + +All Rights Reserved - The TrueCharts Project diff --git a/incubator/kutt/0.0.1/ix_values.yaml b/incubator/kutt/0.0.1/ix_values.yaml new file mode 100644 index 00000000000..8802554b77d --- /dev/null +++ b/incubator/kutt/0.0.1/ix_values.yaml @@ -0,0 +1,85 @@ +image: + repository: kutt/kutt + pullPolicy: IfNotPresent + tag: v2.7.4@sha256:2fa9480755229bd9a14ea03fb2129eb80412600f3c5dabc8f9f9fbf35ff88fce + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +secret: + MAIL_USER: "" + MAIL_PASSWORD: "" + RECAPTCHA_SITE_KEY: "" + RECAPTCHA_SECRET_KEY: "" + GOOGLE_SAFE_BROWSING_KEY: "" + GOOGLE_ANALYTICS: "" + GOOGLE_ANALYTICS_UNIVERSAL: "" + +env: + PORT: "{{ .Values.service.main.ports.main.port }}" + DB_NAME: kutt + DB_USER: kutt + DB_PORT: "5432" + REDIS_PORT: "6379" + # User Defined + SITE_NAME: "My Kutt Instance" + DEFAULT_DOMAIN: "localhost:{{ .Values.service.main.ports.main.port }}" + LINK_LENGTH: 6 + USER_LIMIT_PER_DAY: 50 + NON_USER_COOLDOWN: 0 + DEFAULT_MAX_STATS_PER_LINK: 5000 + DISALLOW_REGISTRATION: false + DISALLOW_ANONYMOUS_LINKS: false + CUSTOM_DOMAIN_USE_HTTPS: false + ADMIN_EMAILS: "admin@example.com,admin@example2.com" + REPORT_EMAIL: "admin@example.com" + CONTACT_EMAIL: "admin@example.com" + MAIL_HOST: "" + MAIL_PORT: 567 + MAIL_FROM: "" + MAIL_SECURE: true + +envValueFrom: + DB_HOST: + secretKeyRef: + name: dbcreds + key: plainhost + DB_PASSWORD: + secretKeyRef: + name: dbcreds + key: postgresql-password + REDIS_HOST: + secretKeyRef: + name: rediscreds + key: plainhost + REDIS_PASSWORD: + secretKeyRef: + name: rediscreds + key: redis-password + JWT_SECRET: + secretKeyRef: + name: kutt-secrets + key: JWT_SECRET + +service: + main: + ports: + main: + port: 10195 + +# Enabled redis +redis: + enabled: true + existingSecret: "rediscreds" + +# Enabled postgres +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: kutt + postgresqlDatabase: kutt diff --git a/incubator/kutt/0.0.1/questions.yaml b/incubator/kutt/0.0.1/questions.yaml new file mode 100644 index 00000000000..1251af939ba --- /dev/null +++ b/incubator/kutt/0.0.1/questions.yaml @@ -0,0 +1,2369 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: secret + group: "Container Configuration" + label: "Image Secrets" + schema: + additional_attrs: true + type: dict + attrs: + - variable: MAIL_USER + label: "MAIL_USER" + schema: + type: string + default: "" + - variable: MAIL_PASSWORD + label: "MAIL_PASSWORD" + schema: + type: string + default: "" + private: true + - variable: RECAPTCHA_SITE_KEY + label: "RECAPTCHA_SITE_KEY" + schema: + type: string + default: "" + private: true + - variable: RECAPTCHA_SECRET_KEY + label: "RECAPTCHA_SECRET_KEY" + schema: + type: string + default: "" + private: true + - variable: GOOGLE_SAFE_BROWSING_KEY + label: "GOOGLE_SAFE_BROWSING_KEY" + schema: + type: string + default: "" + private: true + - variable: GOOGLE_ANALYTICS + label: "GOOGLE_ANALYTICS" + schema: + type: string + default: "" + private: true + - variable: GOOGLE_ANALYTICS_UNIVERSAL + label: "GOOGLE_ANALYTICS_UNIVERSAL" + schema: + type: string + default: "" + private: true + + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: SITE_NAME + label: "SITE_NAME" + schema: + type: string + default: "My Kutt Instance" + - variable: DEFAULT_DOMAIN + label: "DEFAULT_DOMAIN" + schema: + type: string + default: "localhost:10195" + - variable: LINK_LENGTH + label: "LINK_LENGTH" + schema: + type: int + default: 6 + - variable: USER_LIMIT_PER_DAY + label: "USER_LIMIT_PER_DAY" + schema: + type: int + default: 50 + - variable: NON_USER_COOLDOWN + label: "NON_USER_COOLDOWN" + schema: + type: int + default: 0 + - variable: DEFAULT_MAX_STATS_PER_LINK + label: "DEFAULT_MAX_STATS_PER_LINK" + schema: + type: int + default: 5000 + - variable: DISALLOW_REGISTRATION + label: "DISALLOW_REGISTRATION" + schema: + type: boolean + default: false + - variable: DISALLOW_ANONYMOUS_LINKS + label: "DISALLOW_ANONYMOUS_LINKS" + schema: + type: boolean + default: false + - variable: CUSTOM_DOMAIN_USE_HTTPS + label: "CUSTOM_DOMAIN_USE_HTTPS" + schema: + type: boolean + default: false + - variable: ADMIN_EMAILS + label: "ADMIN_EMAILS" + schema: + type: string + default: "admin@example.com,admin@example2.com" + - variable: REPORT_EMAIL + label: "REPORT_EMAIL" + schema: + type: string + default: "admin@example.com" + - variable: CONTACT_EMAIL + label: "CONTACT_EMAIL" + schema: + type: string + default: "admin@example.com" + - variable: MAIL_HOST + label: "MAIL_HOST" + schema: + type: string + default: "" + - variable: MAIL_PORT + label: "MAIL_PORT" + schema: + type: int + default: 567 + - variable: MAIL_FROM + label: "MAIL_FROM" + schema: + type: string + default: "" + - variable: MAIL_SECURE + label: "MAIL_SECURE" + schema: + type: boolean + default: true + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10195 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 10195 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/incubator/kutt/0.0.1/security.md b/incubator/kutt/0.0.1/security.md new file mode 100644 index 00000000000..3f82c4a353f --- /dev/null +++ b/incubator/kutt/0.0.1/security.md @@ -0,0 +1,1100 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: kutt/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |

Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-postgresql' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-redis' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-kutt' of Deployment 'RELEASE-NAME-kutt' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-kutt' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-kutt' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-kutt' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-kutt' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-kutt' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-kutt' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-kutt' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.2.0@sha256:35f3249e070949e6b694346fb7395b47fcfdf604d138aadfbab42619406110cf + kutt/kutt:v2.7.4@sha256:2fa9480755229bd9a14ea03fb2129eb80412600f3c5dabc8f9f9fbf35ff88fce + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.2.0@sha256:35f3249e070949e6b694346fb7395b47fcfdf604d138aadfbab42619406110cf + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/redis:v6.2.6@sha256:0800060245b18936c783f2c6c927abfc884f1ef42f61cedfb8c93797987ee891 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.2.0@sha256:35f3249e070949e6b694346fb7395b47fcfdf604d138aadfbab42619406110cf (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://ubuntu.com/security/notices/USN-5324-1
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| + + +#### Container: kutt/kutt:v2.7.4@sha256:2fa9480755229bd9a14ea03fb2129eb80412600f3c5dabc8f9f9fbf35ff88fce (alpine 3.15.0) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r7 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libretls | CVE-2022-0778 | HIGH | 3.3.4-r2 | 3.3.4-r3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r7 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| + +**node-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| ajv | CVE-2020-15366 | MEDIUM | 5.5.2 | 6.12.3 |
Expand...https://github.com/advisories/GHSA-v88g-cgmw-v5xw
https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f
https://github.com/ajv-validator/ajv/releases/tag/v6.12.3
https://github.com/ajv-validator/ajv/tags
https://hackerone.com/bugs?subject=user&report_id=894259
https://linux.oracle.com/cve/CVE-2020-15366.html
https://linux.oracle.com/errata/ELSA-2021-0551.html
https://nvd.nist.gov/vuln/detail/CVE-2020-15366
https://snyk.io/vuln/SNYK-JS-AJV-584908
| +| ajv | CVE-2020-15366 | MEDIUM | 6.10.0 | 6.12.3 |
Expand...https://github.com/advisories/GHSA-v88g-cgmw-v5xw
https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f
https://github.com/ajv-validator/ajv/releases/tag/v6.12.3
https://github.com/ajv-validator/ajv/tags
https://hackerone.com/bugs?subject=user&report_id=894259
https://linux.oracle.com/cve/CVE-2020-15366.html
https://linux.oracle.com/errata/ELSA-2021-0551.html
https://nvd.nist.gov/vuln/detail/CVE-2020-15366
https://snyk.io/vuln/SNYK-JS-AJV-584908
| +| ajv | CVE-2020-15366 | MEDIUM | 6.11.0 | 6.12.3 |
Expand...https://github.com/advisories/GHSA-v88g-cgmw-v5xw
https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f
https://github.com/ajv-validator/ajv/releases/tag/v6.12.3
https://github.com/ajv-validator/ajv/tags
https://hackerone.com/bugs?subject=user&report_id=894259
https://linux.oracle.com/cve/CVE-2020-15366.html
https://linux.oracle.com/errata/ELSA-2021-0551.html
https://nvd.nist.gov/vuln/detail/CVE-2020-15366
https://snyk.io/vuln/SNYK-JS-AJV-584908
| +| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 5.0.1, 6.0.1 |
Expand...https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
| +| ansi-regex | CVE-2021-3807 | HIGH | 4.1.0 | 5.0.1, 6.0.1 |
Expand...https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
| +| ansi-regex | CVE-2021-3807 | HIGH | 5.0.0 | 5.0.1, 6.0.1 |
Expand...https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
| +| axios | CVE-2021-3749 | HIGH | 0.21.1 | 0.21.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3749
https://github.com/advisories/GHSA-cph5-m8f7-6c5x
https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929
https://github.com/axios/axios/pull/3980
https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31
https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31/
https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E
https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-3749
https://www.npmjs.com/package/axios
| +| braces | CVE-2018-1109 | MEDIUM | 1.8.5 | 2.3.1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1547272
https://github.com/advisories/GHSA-cwfw-4gq5-mrqx
https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451
https://nvd.nist.gov/vuln/detail/CVE-2018-1109
https://snyk.io/vuln/npm:braces:20180219
| +| braces | GHSA-g95f-p29q-9xw4 | LOW | 1.8.5 | 2.3.1 |
Expand...https://github.com/advisories/GHSA-g95f-p29q-9xw4
https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451
https://snyk.io/vuln/npm:braces:20180219
https://www.npmjs.com/advisories/786
| +| browserslist | CVE-2021-23364 | MEDIUM | 4.12.0 | 4.16.5 |
Expand...https://github.com/advisories/GHSA-w8qv-6jwh-64r5
https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474
https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98
https://github.com/browserslist/browserslist/pull/593
https://nvd.nist.gov/vuln/detail/CVE-2021-23364
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182
https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194
| +| browserslist | CVE-2021-23364 | MEDIUM | 4.16.3 | 4.16.5 |
Expand...https://github.com/advisories/GHSA-w8qv-6jwh-64r5
https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474
https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98
https://github.com/browserslist/browserslist/pull/593
https://nvd.nist.gov/vuln/detail/CVE-2021-23364
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182
https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194
| +| browserslist | CVE-2021-23364 | MEDIUM | 4.8.3 | 4.16.5 |
Expand...https://github.com/advisories/GHSA-w8qv-6jwh-64r5
https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474
https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98
https://github.com/browserslist/browserslist/pull/593
https://nvd.nist.gov/vuln/detail/CVE-2021-23364
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182
https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194
| +| color-string | CVE-2021-29060 | MEDIUM | 1.5.3 | 1.5.5 |
Expand...https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3
https://github.com/Qix-/color-string/releases/tag/1.5.5
https://github.com/advisories/GHSA-257v-vj4p-3w2h
https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md
https://github.com/yetingli/SaveResults/blob/main/js/color-string.js
https://nvd.nist.gov/vuln/detail/CVE-2021-29060
https://snyk.io/vuln/SNYK-JS-COLORSTRING-1082939
https://www.npmjs.com/package/color-string
| +| dompurify | CVE-2020-26870 | MEDIUM | 2.0.8 | 2.0.17 |
Expand...https://github.com/advisories/GHSA-63q7-h895-m982
https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d
https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17
https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2020-26870
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870
https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/
https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634
| +| dot-prop | CVE-2020-8116 | HIGH | 4.2.0 | 5.1.1, 4.2.1 |
Expand...https://github.com/advisories/GHSA-ff7x-qrg7-qggm
https://github.com/sindresorhus/dot-prop/issues/63
https://github.com/sindresorhus/dot-prop/tree/v4
https://hackerone.com/reports/719856
https://linux.oracle.com/cve/CVE-2020-8116.html
https://linux.oracle.com/errata/ELSA-2021-0548.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8116
| +| elliptic | CVE-2020-28498 | MEDIUM | 6.5.3 | 6.5.4 |
Expand...https://github.com/advisories/GHSA-r9p9-mrjm-926w
https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md
https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f
https://github.com/indutny/elliptic/pull/244/commits
https://nvd.nist.gov/vuln/detail/CVE-2020-28498
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836
https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899
https://www.npmjs.com/package/elliptic
| +| follow-redirects | CVE-2022-0155 | MEDIUM | 1.13.3 | 1.14.7 |
Expand...https://github.com/advisories/GHSA-74fj-2j2h-c42q
https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22
https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406
https://nvd.nist.gov/vuln/detail/CVE-2022-0155
| +| follow-redirects | CVE-2022-0536 | MEDIUM | 1.13.3 | 1.14.8 |
Expand...https://github.com/advisories/GHSA-pw2r-vq6v-hr8c
https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445
https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db
https://nvd.nist.gov/vuln/detail/CVE-2022-0536
| +| glob-parent | CVE-2020-28469 | HIGH | 2.0.0 | 5.1.2 |
Expand...https://github.com/advisories/GHSA-ww39-953v-wcq6
https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9
https://github.com/gulpjs/glob-parent/pull/36
https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2
https://linux.oracle.com/cve/CVE-2020-28469.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28469
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092
https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905
https://www.oracle.com/security-alerts/cpujan2022.html
| +| glob-parent | CVE-2020-28469 | HIGH | 3.1.0 | 5.1.2 |
Expand...https://github.com/advisories/GHSA-ww39-953v-wcq6
https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9
https://github.com/gulpjs/glob-parent/pull/36
https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2
https://linux.oracle.com/cve/CVE-2020-28469.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28469
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092
https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905
https://www.oracle.com/security-alerts/cpujan2022.html
| +| glob-parent | CVE-2020-28469 | HIGH | 5.1.1 | 5.1.2 |
Expand...https://github.com/advisories/GHSA-ww39-953v-wcq6
https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9
https://github.com/gulpjs/glob-parent/pull/36
https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2
https://linux.oracle.com/cve/CVE-2020-28469.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28469
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092
https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905
https://www.oracle.com/security-alerts/cpujan2022.html
| +| hosted-git-info | CVE-2021-23362 | MEDIUM | 2.7.1 | 2.8.9, 3.0.8 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/advisories/GHSA-43f8-2h32-f4cj
https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7
https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01
https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3
https://github.com/npm/hosted-git-info/commits/v2
https://github.com/npm/hosted-git-info/pull/76
https://linux.oracle.com/cve/CVE-2021-23362.html
https://linux.oracle.com/errata/ELSA-2021-3074.html
https://nvd.nist.gov/vuln/detail/CVE-2021-23362
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356
https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355
| +| immer | CVE-2021-23436 | CRITICAL | 8.0.1 | 9.0.6 |
Expand...https://github.com/advisories/GHSA-33f9-j839-rf8h
https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237
https://nvd.nist.gov/vuln/detail/CVE-2021-23436
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266
https://snyk.io/vuln/SNYK-JS-IMMER-1540542
| +| immer | CVE-2021-3757 | CRITICAL | 8.0.1 | 9.0.6 |
Expand...https://github.com/advisories/GHSA-c36v-fmgq-m8hx
https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237
https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa
https://nvd.nist.gov/vuln/detail/CVE-2021-3757
| +| ini | CVE-2020-7788 | HIGH | 1.3.5 | 1.3.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
https://github.com/advisories/GHSA-qqgx-2p2h-9c37
https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1
https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)
https://linux.oracle.com/cve/CVE-2020-7788.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7788
https://snyk.io/vuln/SNYK-JS-INI-1048974
https://www.npmjs.com/advisories/1589
| +| is-svg | CVE-2021-28092 | HIGH | 3.0.0 | 4.2.2 |
Expand...https://github.com/advisories/GHSA-7r28-3m3f-r2pr
https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b
https://github.com/sindresorhus/is-svg/releases
https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2
https://nvd.nist.gov/vuln/detail/CVE-2021-28092
https://security.netapp.com/advisory/ntap-20210513-0008/
https://www.npmjs.com/package/is-svg
| +| is-svg | CVE-2021-29059 | HIGH | 3.0.0 | 4.3.0 |
Expand...https://github.com/advisories/GHSA-r8j5-h5cx-65gg
https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02
https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0
https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md
https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js
https://nvd.nist.gov/vuln/detail/CVE-2021-29059
https://www.npmjs.com/package/is-svg
| +| js-yaml | GHSA-8j8c-7jfh-h6hx | HIGH | 3.7.0 | 3.13.1 |
Expand...https://github.com/advisories/GHSA-8j8c-7jfh-h6hx
https://github.com/nodeca/js-yaml/pull/480
https://www.npmjs.com/advisories/813
| +| js-yaml | GHSA-2pr6-76vf-7546 | MEDIUM | 3.7.0 | 3.13.0 |
Expand...https://github.com/advisories/GHSA-2pr6-76vf-7546
https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235
https://github.com/nodeca/js-yaml/issues/475
https://snyk.io/vuln/SNYK-JS-JSYAML-173999
https://www.npmjs.com/advisories/788
https://www.npmjs.com/advisories/788/versions
| +| json-pointer | CVE-2021-23820 | CRITICAL | 0.6.0 | |
Expand...https://github.com/advisories/GHSA-v5vg-g7rq-363w
https://github.com/manuelstofer/json-pointer/blob/master/index.js%23L78
https://nvd.nist.gov/vuln/detail/CVE-2021-23820
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910686
https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287
| +| json-pointer | CVE-2020-7709 | MEDIUM | 0.6.0 | 0.6.1 |
Expand...https://github.com/advisories/GHSA-7mg4-w3w5-x5pc
https://github.com/manuelstofer/json-pointer/pull/34
https://github.com/manuelstofer/json-pointer/pull/34/files
https://nvd.nist.gov/vuln/detail/CVE-2020-7709
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598862
https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925
https://www.npmjs.com/package/json-pointer
| +| json-schema | CVE-2021-3918 | CRITICAL | 0.2.3 | 0.4.0 |
Expand...https://github.com/advisories/GHSA-896r-f27r-55mw
https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741
https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a
https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa
https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9
https://linux.oracle.com/cve/CVE-2021-3918.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3918
| +| jsonpointer | CVE-2021-23807 | CRITICAL | 4.0.1 | 5.0.0 |
Expand...https://github.com/advisories/GHSA-282f-qqgm-c34q
https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4
https://github.com/janl/node-jsonpointer/pull/51
https://nvd.nist.gov/vuln/detail/CVE-2021-23807
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910273
https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288
| +| kind-of | CVE-2019-20149 | HIGH | 6.0.2 | 6.0.3 |
Expand...https://github.com/advisories/GHSA-6c8f-qphg-qjgp
https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b
https://github.com/jonschlinkert/kind-of/issues/30
https://github.com/jonschlinkert/kind-of/pull/31
https://nvd.nist.gov/vuln/detail/CVE-2019-20149
https://snyk.io/vuln/SNYK-JS-KINDOF-537849
https://www.npmjs.com/advisories/1490
| +| lodash | CVE-2020-8203 | HIGH | 4.17.15 | 4.17.20 |
Expand...https://github.com/advisories/GHSA-p6mc-m468-83gw
https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12
https://github.com/lodash/lodash/issues/4744
https://github.com/lodash/lodash/issues/4874
https://hackerone.com/reports/712065
https://nvd.nist.gov/vuln/detail/CVE-2020-8203
https://security.netapp.com/advisory/ntap-20200724-0006/
https://www.npmjs.com/advisories/1523
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| lodash | CVE-2021-23337 | HIGH | 4.17.15 | 4.17.21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337
https://github.com/advisories/GHSA-35jh-r3h4-6jhm
https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851
https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851
https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c
https://nvd.nist.gov/vuln/detail/CVE-2021-23337
https://security.netapp.com/advisory/ntap-20210312-0006/
https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929
https://snyk.io/vuln/SNYK-JS-LODASH-1040724
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| lodash | NSWG-ECO-516 | HIGH | 4.17.15 | >=4.17.19 |
Expand...https://github.com/lodash/lodash/pull/4759
https://hackerone.com/reports/712065
https://www.npmjs.com/advisories/1523
| +| lodash | CVE-2020-28500 | MEDIUM | 4.17.15 | 4.17.21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500
https://github.com/advisories/GHSA-29mw-wpgm-hmr9
https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8
https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8
https://github.com/lodash/lodash/pull/5065
https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7
https://nvd.nist.gov/vuln/detail/CVE-2020-28500
https://security.netapp.com/advisory/ntap-20210312-0006/
https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893
https://snyk.io/vuln/SNYK-JS-LODASH-1018905
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| lodash | CVE-2020-8203 | HIGH | 4.17.19 | 4.17.20 |
Expand...https://github.com/advisories/GHSA-p6mc-m468-83gw
https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12
https://github.com/lodash/lodash/issues/4744
https://github.com/lodash/lodash/issues/4874
https://hackerone.com/reports/712065
https://nvd.nist.gov/vuln/detail/CVE-2020-8203
https://security.netapp.com/advisory/ntap-20200724-0006/
https://www.npmjs.com/advisories/1523
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| lodash | CVE-2021-23337 | HIGH | 4.17.19 | 4.17.21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337
https://github.com/advisories/GHSA-35jh-r3h4-6jhm
https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851
https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851
https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c
https://nvd.nist.gov/vuln/detail/CVE-2021-23337
https://security.netapp.com/advisory/ntap-20210312-0006/
https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929
https://snyk.io/vuln/SNYK-JS-LODASH-1040724
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| lodash | CVE-2020-28500 | MEDIUM | 4.17.19 | 4.17.21 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500
https://github.com/advisories/GHSA-29mw-wpgm-hmr9
https://github.com/lodash/lodash/blob/npm/trimEnd.js#L8
https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8
https://github.com/lodash/lodash/pull/5065
https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7
https://nvd.nist.gov/vuln/detail/CVE-2020-28500
https://security.netapp.com/advisory/ntap-20210312-0006/
https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893
https://snyk.io/vuln/SNYK-JS-LODASH-1018905
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| marked | CVE-2022-21680 | HIGH | 0.7.0 | 4.0.10 |
Expand...https://github.com/advisories/GHSA-rrrm-qjm4-v8hf
https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0
https://github.com/markedjs/marked/releases/tag/v4.0.10
https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf
https://nvd.nist.gov/vuln/detail/CVE-2022-21680
| +| marked | CVE-2022-21681 | HIGH | 0.7.0 | 4.0.10 |
Expand...https://github.com/advisories/GHSA-5v2h-r2cx-5xgj
https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5
https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj
https://nvd.nist.gov/vuln/detail/CVE-2022-21681
| +| minimist | CVE-2020-7598 | MEDIUM | 0.0.8 | 1.2.3, 0.2.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/advisories/GHSA-vh95-rmgr-6w4m
https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab
https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95
https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94
https://linux.oracle.com/cve/CVE-2020-7598.html
https://linux.oracle.com/errata/ELSA-2020-2852.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7598
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://www.npmjs.com/advisories/1179
| +| minimist | CVE-2021-44906 | MEDIUM | 0.0.8 | |
Expand...https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://github.com/substack/minimist/blob/master/index.js#L69
https://github.com/substack/minimist/issues/164
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068
| +| minimist | CVE-2020-7598 | MEDIUM | 1.2.0 | 1.2.3, 0.2.1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/advisories/GHSA-vh95-rmgr-6w4m
https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab
https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95
https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94
https://linux.oracle.com/cve/CVE-2020-7598.html
https://linux.oracle.com/errata/ELSA-2020-2852.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7598
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://www.npmjs.com/advisories/1179
| +| minimist | CVE-2021-44906 | MEDIUM | 1.2.0 | |
Expand...https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://github.com/substack/minimist/blob/master/index.js#L69
https://github.com/substack/minimist/issues/164
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068
| +| minimist | CVE-2021-44906 | MEDIUM | 1.2.5 | |
Expand...https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://github.com/substack/minimist/blob/master/index.js#L69
https://github.com/substack/minimist/issues/164
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068
| +| next | CVE-2021-43803 | HIGH | 9.4.4 | 11.1.3, 12.0.5 |
Expand...https://github.com/advisories/GHSA-25mp-g6fv-mqxx
https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264
https://github.com/vercel/next.js/pull/32080
https://github.com/vercel/next.js/releases/tag/v11.1.3
https://github.com/vercel/next.js/releases/v12.0.5
https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx
https://nvd.nist.gov/vuln/detail/CVE-2021-43803
| +| next | CVE-2021-37699 | MEDIUM | 9.4.4 | 11.1.0 |
Expand...https://github.com/advisories/GHSA-vxf5-wxwp-m7g9
https://github.com/vercel/next.js/releases/tag/v11.1.0
https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9
https://nvd.nist.gov/vuln/detail/CVE-2021-37699
| +| node-fetch | CVE-2020-15168 | MEDIUM | 2.6.0 | 3.0.0-beta.9, 2.6.1 |
Expand...https://github.com/advisories/GHSA-w7rc-rwvf-8q5r
https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r
https://nvd.nist.gov/vuln/detail/CVE-2020-15168
https://www.npmjs.com/package/node-fetch
| +| node-fetch | CVE-2022-0235 | MEDIUM | 2.6.0 | 2.6.7, 3.1.1 |
Expand...https://github.com/advisories/GHSA-r683-j2x4-v87g
https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10
https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60
https://github.com/node-fetch/node-fetch/pull/1453
https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7
https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/
https://nvd.nist.gov/vuln/detail/CVE-2022-0235
| +| nodemailer | CVE-2020-7769 | CRITICAL | 6.4.2 | 6.4.16 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7769
https://github.com/advisories/GHSA-48ww-j4fc-435p
https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js#L75
https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js%23L75
https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54
https://nvd.nist.gov/vuln/detail/CVE-2020-7769
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742
https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834
https://www.npmjs.com/package/nodemailer
| +| nodemailer | CVE-2021-23400 | HIGH | 6.4.2 | 6.6.1 |
Expand...https://github.com/advisories/GHSA-hwqf-gcqm-7353
https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f
https://github.com/nodemailer/nodemailer/issues/1289
https://nvd.nist.gov/vuln/detail/CVE-2021-23400
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737
https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415
| +| nth-check | CVE-2021-3803 | HIGH | 1.0.2 | 2.0.1 |
Expand...https://github.com/advisories/GHSA-rp65-9cf3-cjxr
https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726
https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0
https://nvd.nist.gov/vuln/detail/CVE-2021-3803
| +| object-path | CVE-2020-15256 | CRITICAL | 0.11.4 | 0.11.5 |
Expand...https://github.com/advisories/GHSA-cwx2-736x-mf6w
https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68
https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w
https://nvd.nist.gov/vuln/detail/CVE-2020-15256
| +| object-path | CVE-2021-23434 | HIGH | 0.11.4 | 0.11.6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23434
https://github.com/advisories/GHSA-v39p-96qg-c8rf
https://github.com/mariocasciaro/object-path#0116
https://github.com/mariocasciaro/object-path%230116
https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb
https://nvd.nist.gov/vuln/detail/CVE-2021-23434
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423
https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453
| +| object-path | CVE-2021-3805 | HIGH | 0.11.4 | 0.11.8 |
Expand...https://github.com/advisories/GHSA-8v63-cqqc-6r2c
https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884
https://github.com/mariocasciaro/object-path/commit/e6bb638ffdd431176701b3e9024f80050d0ef0a6
https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053
https://nvd.nist.gov/vuln/detail/CVE-2021-3805
| +| path-parse | CVE-2021-23343 | HIGH | 1.0.6 | 1.0.7 |
Expand...https://github.com/advisories/GHSA-hj48-42vr-x3v9
https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7
https://github.com/jbgutierrez/path-parse/issues/8
https://github.com/jbgutierrez/path-parse/pull/10
https://linux.oracle.com/cve/CVE-2021-23343.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-23343
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
| +| postcss | CVE-2021-23368 | MEDIUM | 7.0.21 | 8.2.10, 7.0.36 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368
https://github.com/advisories/GHSA-hwj9-h5mp-3pm3
https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734
https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4
https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5
https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-23368
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795
https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595
| +| postcss | CVE-2021-23382 | MEDIUM | 7.0.21 | 7.0.36, 8.2.13 |
Expand...https://github.com/advisories/GHSA-566m-qj78-rww5
https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956
https://github.com/postcss/postcss/releases/tag/7.0.36
https://nvd.nist.gov/vuln/detail/CVE-2021-23382
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641
https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640
| +| postcss | CVE-2021-23368 | MEDIUM | 7.0.29 | 8.2.10, 7.0.36 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368
https://github.com/advisories/GHSA-hwj9-h5mp-3pm3
https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734
https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4
https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5
https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-23368
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795
https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595
| +| postcss | CVE-2021-23382 | MEDIUM | 7.0.29 | 7.0.36, 8.2.13 |
Expand...https://github.com/advisories/GHSA-566m-qj78-rww5
https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956
https://github.com/postcss/postcss/releases/tag/7.0.36
https://nvd.nist.gov/vuln/detail/CVE-2021-23382
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641
https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640
| +| postcss | CVE-2021-23368 | MEDIUM | 7.0.32 | 8.2.10, 7.0.36 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23368
https://github.com/advisories/GHSA-hwj9-h5mp-3pm3
https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734
https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4
https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5
https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E
https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E
https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-23368
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795
https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595
| +| postcss | CVE-2021-23382 | MEDIUM | 7.0.32 | 7.0.36, 8.2.13 |
Expand...https://github.com/advisories/GHSA-566m-qj78-rww5
https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956
https://github.com/postcss/postcss/releases/tag/7.0.36
https://nvd.nist.gov/vuln/detail/CVE-2021-23382
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641
https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640
| +| prismjs | CVE-2020-15138 | HIGH | 1.19.0 | 1.21.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15138
https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c
https://github.com/PrismJS/prism/security/advisories/GHSA-wvhm-4hhf-97x9
https://github.com/advisories/GHSA-wvhm-4hhf-97x9
https://nvd.nist.gov/vuln/detail/CVE-2020-15138
https://prismjs.com/plugins/previewers/#disabling-a-previewer
| +| prismjs | CVE-2021-23341 | HIGH | 1.19.0 | 1.23.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23341
https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609
https://github.com/PrismJS/prism/issues/2583
https://github.com/PrismJS/prism/pull/2584
https://github.com/advisories/GHSA-h4hr-7fg3-h35w
https://nvd.nist.gov/vuln/detail/CVE-2021-23341
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076582
https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581
https://www.npmjs.com/package/prismjs
| +| prismjs | CVE-2021-32723 | MEDIUM | 1.19.0 | 1.24.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32723
https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018
https://github.com/PrismJS/prism/pull/2688
https://github.com/PrismJS/prism/pull/2774
https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg
https://github.com/advisories/GHSA-gj77-59wh-66hg
https://nvd.nist.gov/vuln/detail/CVE-2021-32723
https://www.oracle.com/security-alerts/cpujan2022.html
| +| prismjs | CVE-2021-3801 | MEDIUM | 1.19.0 | 1.25.0 |
Expand...https://github.com/advisories/GHSA-hqhp-5p83-hx96
https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9
https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a
https://nvd.nist.gov/vuln/detail/CVE-2021-3801
| +| prismjs | CVE-2022-23647 | MEDIUM | 1.19.0 | 1.27.0 |
Expand...https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c
https://github.com/PrismJS/prism/pull/3341
https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99
https://github.com/advisories/GHSA-3949-f494-cm99
https://nvd.nist.gov/vuln/detail/CVE-2022-23647
| +| redis | CVE-2021-29469 | HIGH | 3.1.0 | 3.1.1 |
Expand...https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e
https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1
https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3
https://github.com/advisories/GHSA-35q2-47q7-3pc3
https://nvd.nist.gov/vuln/detail/CVE-2021-29469
https://security.netapp.com/advisory/ntap-20210611-0010/
| +| ssri | CVE-2021-27290 | HIGH | 7.1.0 | 8.0.1, 7.1.1, 6.0.2 |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290
https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf
https://github.com/advisories/GHSA-vx3p-948g-6vhq
https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2
https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1
https://github.com/npm/ssri/pull/20#issuecomment-842677644
https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf
https://linux.oracle.com/cve/CVE-2021-27290.html
https://linux.oracle.com/errata/ELSA-2021-3074.html
https://npmjs.com
https://nvd.nist.gov/vuln/detail/CVE-2021-27290
https://www.npmjs.com/package/ssri
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tmpl | CVE-2021-3777 | HIGH | 1.0.4 | 1.0.5 |
Expand...https://github.com/advisories/GHSA-jgrx-mgxx-jf9v
https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6
https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df
https://nvd.nist.gov/vuln/detail/CVE-2021-3777
| +| undefsafe | CVE-2019-10795 | MEDIUM | 2.0.2 | 2.0.3 |
Expand...https://github.com/advisories/GHSA-332q-7ff2-57h2
https://github.com/remy/undefsafe/commit/f272681b3a50e2c4cbb6a8533795e1453382c822
https://nvd.nist.gov/vuln/detail/CVE-2019-10795
https://snyk.io/vuln/SNYK-JS-UNDEFSAFE-548940
| +| url-regex | CVE-2020-7661 | HIGH | 4.1.1 | |
Expand...https://github.com/advisories/GHSA-v4rh-8p82-6h5w
https://github.com/kevva/url-regex/issues/70
https://nvd.nist.gov/vuln/detail/CVE-2020-7661
https://snyk.io/vuln/SNYK-JS-URLREGEX-569472
| +| validator | CVE-2021-3765 | HIGH | 11.1.0 | 13.7.0 |
Expand...https://github.com/advisories/GHSA-qgmg-gppg-76g5
https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1
https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9
https://nvd.nist.gov/vuln/detail/CVE-2021-3765
| +| validator | GHSA-xx4c-jj58-r7x6 | MEDIUM | 11.1.0 | 13.7.0 |
Expand...https://github.com/advisories/GHSA-xx4c-jj58-r7x6
https://github.com/validatorjs/validator.js/issues/1599
https://github.com/validatorjs/validator.js/pull/1738
https://github.com/validatorjs/validator.js/security/advisories/GHSA-xx4c-jj58-r7x6
https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9/
https://nvd.nist.gov/vuln/detail/CVE-2021-3765
| +| validator | CVE-2021-3765 | HIGH | 12.1.0 | 13.7.0 |
Expand...https://github.com/advisories/GHSA-qgmg-gppg-76g5
https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1
https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9
https://nvd.nist.gov/vuln/detail/CVE-2021-3765
| +| validator | GHSA-xx4c-jj58-r7x6 | MEDIUM | 12.1.0 | 13.7.0 |
Expand...https://github.com/advisories/GHSA-xx4c-jj58-r7x6
https://github.com/validatorjs/validator.js/issues/1599
https://github.com/validatorjs/validator.js/pull/1738
https://github.com/validatorjs/validator.js/security/advisories/GHSA-xx4c-jj58-r7x6
https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9/
https://nvd.nist.gov/vuln/detail/CVE-2021-3765
| +| ws | CVE-2021-32640 | MEDIUM | 7.4.3 | 5.2.3, 6.2.2, 7.4.6 |
Expand...https://github.com/advisories/GHSA-6fc8-4gx4-v693
https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff
https://github.com/websockets/ws/issues/1895
https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693
https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-32640
| +| yargs-parser | CVE-2020-7608 | MEDIUM | 11.1.1 | 5.0.1, 13.1.2, 18.1.2, 15.0.1 |
Expand...https://github.com/advisories/GHSA-p9pc-299p-vxgp
https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2
https://linux.oracle.com/cve/CVE-2020-7608.html
https://linux.oracle.com/errata/ELSA-2021-0548.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7608
https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381
https://www.npmjs.com/advisories/1500
| +| yargs-parser | CVE-2020-7608 | MEDIUM | 13.1.1 | 5.0.1, 13.1.2, 18.1.2, 15.0.1 |
Expand...https://github.com/advisories/GHSA-p9pc-299p-vxgp
https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2
https://linux.oracle.com/cve/CVE-2020-7608.html
https://linux.oracle.com/errata/ELSA-2021-0548.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7608
https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381
https://www.npmjs.com/advisories/1500
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.2.0@sha256:35f3249e070949e6b694346fb7395b47fcfdf604d138aadfbab42619406110cf (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://ubuntu.com/security/notices/USN-5324-1
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:0800060245b18936c783f2c6c927abfc884f1ef42f61cedfb8c93797987ee891 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1d-0+deb10u7 | 1.1.1d-0+deb10u8 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | 1.1.1d-0+deb10u8 |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2022-0778 | HIGH | 1.1.1d-0+deb10u7 | 1.1.1d-0+deb10u8 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9237.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| openssl | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | 1.1.1d-0+deb10u8 |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/incubator/kutt/0.0.1/templates/_secrets.tpl b/incubator/kutt/0.0.1/templates/_secrets.tpl new file mode 100644 index 00000000000..d3634d0df77 --- /dev/null +++ b/incubator/kutt/0.0.1/templates/_secrets.tpl @@ -0,0 +1,20 @@ +{{/* Define the secrets */}} +{{- define "kutt.secrets" -}} +--- + +apiVersion: v1 +kind: Secret +type: Opaque +metadata: + name: kutt-secrets +{{- $kuttprevious := lookup "v1" "Secret" .Release.Namespace "kutt-secrets" }} +{{- $jwt_secret := "" }} +data: + {{- if $kuttprevious}} + JWT_SECRET: {{ index $kuttprevious.data "JWT_SECRET" }} + {{- else }} + {{- $jwt_secret := randAlphaNum 32 }} + JWT_SECRET: {{ $jwt_secret | b64enc }} + {{- end }} + +{{- end -}} diff --git a/incubator/kutt/0.0.1/templates/common copy.yaml b/incubator/kutt/0.0.1/templates/common copy.yaml new file mode 100644 index 00000000000..edbf1b24944 --- /dev/null +++ b/incubator/kutt/0.0.1/templates/common copy.yaml @@ -0,0 +1,8 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + +{{/* Render secrets for kutt */}} +{{- include "kutt.secrets" . }} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/incubator/kutt/0.0.1/values.yaml b/incubator/kutt/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/kutt/item.yaml b/incubator/kutt/item.yaml new file mode 100644 index 00000000000..8c73e8b7bf8 --- /dev/null +++ b/incubator/kutt/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/kutt.png +categories: +- productivity +