From 1425db158a7b30f7a000ca4ede4b01b0868bba6c Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Wed, 15 Dec 2021 19:33:01 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- stable/home-assistant/12.0.17/CHANGELOG.md | 99 + .../12.0.17}/CONFIG.md | 0 stable/home-assistant/12.0.17/Chart.lock | 9 + stable/home-assistant/12.0.17/Chart.yaml | 34 + stable/home-assistant/12.0.17/README.md | 39 + stable/home-assistant/12.0.17/app-readme.md | 3 + .../12.0.17}/charts/common-8.9.21.tgz | Bin .../12.0.17/charts/postgresql-6.0.31.tgz | Bin 0 -> 72408 bytes stable/home-assistant/12.0.17/helm-values.md | 42 + stable/home-assistant/12.0.17/ix_values.yaml | 79 + stable/home-assistant/12.0.17/questions.yaml | 1863 +++++++++++++++++ stable/home-assistant/12.0.17/security.md | 671 ++++++ .../12.0.17/templates/_configmap.tpl | 90 + .../12.0.17/templates/common.yaml | 22 + .../12.0.17/templates/secret.yaml | 15 + .../12.0.17}/values.yaml | 0 stable/home-assistant/item.yaml | 2 +- stable/unifi/{9.0.24 => 9.0.25}/CHANGELOG.md | 22 +- stable/unifi/9.0.25/CONFIG.md | 8 + stable/unifi/{9.0.24 => 9.0.25}/Chart.lock | 2 +- stable/unifi/{9.0.24 => 9.0.25}/Chart.yaml | 6 +- stable/unifi/{9.0.24 => 9.0.25}/README.md | 0 stable/unifi/{9.0.24 => 9.0.25}/app-readme.md | 0 stable/unifi/9.0.25/charts/common-8.9.21.tgz | Bin 0 -> 38016 bytes .../unifi/{9.0.24 => 9.0.25}/helm-values.md | 2 +- .../unifi/{9.0.24 => 9.0.25}/ix_values.yaml | 2 +- .../unifi/{9.0.24 => 9.0.25}/questions.yaml | 0 stable/unifi/{9.0.24 => 9.0.25}/security.md | 4 +- .../{9.0.24 => 9.0.25}/templates/common.yaml | 0 stable/unifi/9.0.25/values.yaml | 0 stable/unifi/item.yaml | 2 +- 31 files changed, 2995 insertions(+), 21 deletions(-) create mode 100644 stable/home-assistant/12.0.17/CHANGELOG.md rename stable/{unifi/9.0.24 => home-assistant/12.0.17}/CONFIG.md (100%) create mode 100644 stable/home-assistant/12.0.17/Chart.lock create mode 100644 stable/home-assistant/12.0.17/Chart.yaml create mode 100644 stable/home-assistant/12.0.17/README.md create mode 100644 stable/home-assistant/12.0.17/app-readme.md rename stable/{unifi/9.0.24 => home-assistant/12.0.17}/charts/common-8.9.21.tgz (100%) create mode 100644 stable/home-assistant/12.0.17/charts/postgresql-6.0.31.tgz create mode 100644 stable/home-assistant/12.0.17/helm-values.md create mode 100644 stable/home-assistant/12.0.17/ix_values.yaml create mode 100644 stable/home-assistant/12.0.17/questions.yaml create mode 100644 stable/home-assistant/12.0.17/security.md create mode 100644 stable/home-assistant/12.0.17/templates/_configmap.tpl create mode 100644 stable/home-assistant/12.0.17/templates/common.yaml create mode 100644 stable/home-assistant/12.0.17/templates/secret.yaml rename stable/{unifi/9.0.24 => home-assistant/12.0.17}/values.yaml (100%) rename stable/unifi/{9.0.24 => 9.0.25}/CHANGELOG.md (88%) create mode 100644 stable/unifi/9.0.25/CONFIG.md rename stable/unifi/{9.0.24 => 9.0.25}/Chart.lock (78%) rename stable/unifi/{9.0.24 => 9.0.25}/Chart.yaml (86%) rename stable/unifi/{9.0.24 => 9.0.25}/README.md (100%) rename stable/unifi/{9.0.24 => 9.0.25}/app-readme.md (100%) create mode 100644 stable/unifi/9.0.25/charts/common-8.9.21.tgz rename stable/unifi/{9.0.24 => 9.0.25}/helm-values.md (96%) rename stable/unifi/{9.0.24 => 9.0.25}/ix_values.yaml (92%) rename stable/unifi/{9.0.24 => 9.0.25}/questions.yaml (100%) rename stable/unifi/{9.0.24 => 9.0.25}/security.md (99%) rename stable/unifi/{9.0.24 => 9.0.25}/templates/common.yaml (100%) create mode 100644 stable/unifi/9.0.25/values.yaml diff --git a/stable/home-assistant/12.0.17/CHANGELOG.md b/stable/home-assistant/12.0.17/CHANGELOG.md new file mode 100644 index 00000000000..d18ff41bfe8 --- /dev/null +++ b/stable/home-assistant/12.0.17/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [home-assistant-12.0.17](https://github.com/truecharts/apps/compare/home-assistant-12.0.16...home-assistant-12.0.17) (2021-12-15) + +#### Chore + +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) +* update docker general non-major docker tags ([#1542](https://github.com/truecharts/apps/issues/1542)) +* update docker general non-major + + + + +### [home-assistant-12.0.16](https://github.com/truecharts/apps/compare/home-assistant-12.0.15...home-assistant-12.0.16) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [home-assistant-12.0.15](https://github.com/truecharts/apps/compare/home-assistant-12.0.14...home-assistant-12.0.15) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### [home-assistant-12.0.14](https://github.com/truecharts/apps/compare/home-assistant-12.0.13...home-assistant-12.0.14) (2021-12-12) + +#### Chore + +* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518)) + + + + +### [home-assistant-12.0.13](https://github.com/truecharts/apps/compare/home-assistant-12.0.12...home-assistant-12.0.13) (2021-12-11) + +#### Chore + +* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509)) + + + + +### [home-assistant-12.0.12](https://github.com/truecharts/apps/compare/home-assistant-12.0.11...home-assistant-12.0.12) (2021-12-11) + +#### Chore + +* update non-major docker ([#1507](https://github.com/truecharts/apps/issues/1507)) + + + + +### [home-assistant-12.0.11](https://github.com/truecharts/apps/compare/home-assistant-12.0.10...home-assistant-12.0.11) (2021-12-07) + +#### Chore + +* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481)) + + + + +### home-assistant-12.0.10 (2021-12-05) + +#### Chore + +* bump apps to generate security page +* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448)) +* update non-major deps helm releases ([#1471](https://github.com/truecharts/apps/issues/1471)) +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) +* update non-major deps helm releases ([#1453](https://github.com/truecharts/apps/issues/1453)) +* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) + +#### Fix + +* fix typo in theme selection ([#1428](https://github.com/truecharts/apps/issues/1428)) + + + + +### [home-assistant-12.0.9](https://github.com/truecharts/apps/compare/home-assistant-12.0.8...home-assistant-12.0.9) (2021-12-05) + +#### Chore + +* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468)) + + + + +### [home-assistant-12.0.8](https://github.com/truecharts/apps/compare/home-assistant-12.0.7...home-assistant-12.0.8) (2021-12-04) + +#### Chore diff --git a/stable/unifi/9.0.24/CONFIG.md b/stable/home-assistant/12.0.17/CONFIG.md similarity index 100% rename from stable/unifi/9.0.24/CONFIG.md rename to stable/home-assistant/12.0.17/CONFIG.md diff --git a/stable/home-assistant/12.0.17/Chart.lock b/stable/home-assistant/12.0.17/Chart.lock new file mode 100644 index 00000000000..c46b42f0b9d --- /dev/null +++ b/stable/home-assistant/12.0.17/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.21 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.31 +digest: sha256:80e513d2ac68eb52a019c1af28bc6410f932f5f38239ffff58a9e209b9464178 +generated: "2021-12-15T19:29:25.443689578Z" diff --git a/stable/home-assistant/12.0.17/Chart.yaml b/stable/home-assistant/12.0.17/Chart.yaml new file mode 100644 index 00000000000..5e1c2cc92b4 --- /dev/null +++ b/stable/home-assistant/12.0.17/Chart.yaml @@ -0,0 +1,34 @@ +apiVersion: v2 +appVersion: "2021.12.2" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.21 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.31 +deprecated: false +description: home-assistant App for TrueNAS SCALE +home: https://github.com/truecharts/apps/tree/master/charts/stable/home-assistant +icon: https://truecharts.org/_static/img/appicons/home-assistant-icon.png +keywords: +- home-assistant +- hass +- homeassistant +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: home-assistant +sources: +- https://github.com/home-assistant/home-assistant +- https://github.com/cdr/code-server +type: application +version: 12.0.17 +annotations: + truecharts.org/catagories: | + - home-automation + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/home-assistant/12.0.17/README.md b/stable/home-assistant/12.0.17/README.md new file mode 100644 index 00000000000..ab609150c2c --- /dev/null +++ b/stable/home-assistant/12.0.17/README.md @@ -0,0 +1,39 @@ +# Introduction + +home-assistant App for TrueNAS SCALE + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.31 | +| https://truecharts.org | common | 8.9.21 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/home-assistant/12.0.17/app-readme.md b/stable/home-assistant/12.0.17/app-readme.md new file mode 100644 index 00000000000..3f7d1730309 --- /dev/null +++ b/stable/home-assistant/12.0.17/app-readme.md @@ -0,0 +1,3 @@ +home-assistant App for TrueNAS SCALE + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/unifi/9.0.24/charts/common-8.9.21.tgz b/stable/home-assistant/12.0.17/charts/common-8.9.21.tgz similarity index 100% rename from stable/unifi/9.0.24/charts/common-8.9.21.tgz rename to stable/home-assistant/12.0.17/charts/common-8.9.21.tgz diff --git a/stable/home-assistant/12.0.17/charts/postgresql-6.0.31.tgz b/stable/home-assistant/12.0.17/charts/postgresql-6.0.31.tgz new file mode 100644 index 0000000000000000000000000000000000000000..61604ff26a8fdee745eb44df9a0b597a9c72cd1c GIT binary patch literal 72408 zcmYg%b95)c5^j=>ZQHhO+cr10ZES4Ywr$(a#%6nW;csmy31DaS7B$;D>OqRwcl!e*td!o{wjuFfu}Ve{L_&eT&?$(~Qr z%*Gbzs^`;dt2LFA+y9b^b9R?S%AE>$f2V5$Z_EvuLjLM4wb=W_R1i5)Q-yRY8t=BW z@3wo?v*(et4*`fu30dl%n8!-S*FZ&USX)yQbQKOpGmu~;DPFX%z37_?{^$TNw*%0+ zg8&3n-Z=e(0HpaXAlmq0uNW2ujR+F;U=JjnSo)m>)G8}+KoMz-`-5|~y>_whM?rAq z=@(-%_FA|TNH}aHOv{Z>SU?~ze){P>7H*sj8b~nOH3;w9-LyMB$dvn5AX2DzFeQix zDuil-Yl0$S+Vf00%)Ws}55ehBD~ZX~+eWjU4-6mlo~MXENQAjgN|-Ch8(oMW5fpA= zs!{*7G5rc2gqYYLm%WZ~>lSK-3$bux*}T0Wh-k;0{V|V8%vmpG8Y++2v?srG?*DV+ z!T3z|06RAvSr*CF{G|nd3<)8`8YLnu&VoBaiYvy%uE#u?y3pT1xd|Hy=dUydg!0M) z`Q>2Q;b$BtvKJkWA1NVpwiSsMT`O>3lyI3&1b;gWi}vY>>5(+R*3tDWlI3W)yKrdz z6wQMO#$(n-Ip0@@k~E$1o(J%N4p+njLHas148vm>jg=4%i<_=Lx`B@6cmY`dan0Vr zFcMC;i2x6Z53!@F^Lz{y#S-;H*8Z9?BW!DH8xn(ICjh_K6LbT^1+6t{sNhWRV{wHH zL&o*FR(lxxuAcB;YpZSB9s_?zAT6(%@K?Jy28j6Fhz)Y1AdhqjvyMnAxhEJ&W>!?N z&yRM-*4tTwP8>DZYWL&+DwpPFG7F87!;z6>LtPSO4uBqL1x|>BKsii692?$6b3+tV z43P|Z0E>4=bJa))17{``Q$Nmg^AcKkO40#vtjkHdAb{_OJu_4w*4F;ByaovN$;Qf! z-$_Z~&(J=YzkduxnAHD#Yd##^hhZaY-iwi-c_%^? zLhFo6KF4yZNF?2=?11Lq>ap2r4eCFJx=ak zeeNuP3V-4vwg^y?1_A&X& zSvlfrn1_%)a)LVw%q#XPfGMI7DLe8sTr{FgUNq0_>6V@(-)9`qGnE~{#ezO`k|}ijbHZB_O({JHB{9%jGav6=MpF+AZxWu7gKGG*=2Mz;&mo%-@^`eL zQa+sT=lSyB9rinqJ3hljm`>lW{vXhnFVm zt|V*THHg`TRDgK!$AsyjqGmQ+=({e$e+H1vw~2Cr#V#(*T@XtA1Q|@MVoYPw&yA<&CtZ~qQ2vN(}eYok? zfpfqxh;k4eUn_plu$gxQe( z$A&`Us_RH$kAEivp&Jv(>_=>$zTx}f>&`}F{r!23OY0Iv=r4QTmnL}p1R~f& zb*4@j6{`UZGV0*rx-ao(Zo}WPRa>IMA-xZ5>UDIsxW%k}0-%!6XagY17no`81^&Kmf&n7`Qb4EjU1qP(~5?y1O-xakt5`#2F-Cf)wfulrFa z5U0fpDthp2y+Q)eW%)NIXc32H3RKS^`@YE|-0mN2dkU`OMhozfg0#-D6<0I^4` zg-V+KNj}Z$uh3rC!*ku7lU!$@UGf)!!wj8}cz!Z`wx*?;(j*{2VtmJd(mrED0YClx ze#U3Uqnq0}ZN#lxI)rH@^L=%`$-)qp@mVGd)iepv*O3B%YEg*5W z@z+>X=uVkgfK?So1+DZzXkT&Q%ud;$N#|b+DO3VP)ISFT^ z*GUeToUC|LU?%o0r2?KN7P1=~OgV|>iP_rtU~PZ;U1SU9Kkja!c*hjQOosPQ zIeLNLm}IG95pq`_H!7%z(IpPWQ|U>W1V_ZVD!lSS;|}%mPG}A+Z>7p*elKS3l3@7EB11!3V}V#>YZ26cu-Q zCOk8?GJm%jcKsSGi2m+JxHm-<(}yKIjyfrT;mhrrL6a4Et>EE@|Hyt>laBI#b40^L z`?t8Knt#o^+m4pI1knpTjbASgjm2VAJve0%POG13Z9*A@UlwUarJ==@Q3s^XFco0G z4>WC-pV~RdEo;5m^aRr)X8}+{nK1I+d3|-!r);ptd>X57(gae7Hf-2t%-5UJP7mOt z-R`)at*H7Nfc_@DaQGe4y?{S_$yksoxJ!$$vf$D#q(}Fpy|jbIU+e!pe03hBARkkO z<>UB^U+3i7pu|2M7pW8Ocs89&+w`(#;7q>D2%xpNIQCpl)mV9!!bz$lv!HZ0thI3zF!gZ zBnGKsO_0435I;BUZm*L)f-*R3uRTzR`d8U<<1INoNOfg%Bqbk(NQg3#*U-po?V(wI z>vQe?^(G>vkIlg$2Ib5>@f*wK^C0yw9i*i?a70XOc+6P$`2c(-6$p+*?R&!}CX#}Z zqUw&33=Q1ve=T`lg`3_D}K1E0+cf{a!yDi+}yT1%^)(>IFu2L)w4-La=;|88W^Bv!K1O+Be^^Zs+)a zF%AMSdA*(_-%dA&0G_%e&YKSw!0;26XxOmfLu@e$A!E@teH6bo8A?)X_XpgC2a`C; zXOT5AtQLvUOgOBFjaMuM|FyIQ!XiUfLILaw8&)3?nSH3Z+Wq%j&LM%%g1fi8xP0ZL z33*g9QtX8ng}Lzjn5pO*=?g5`DPQA42#A4SA-PvTLNmF-9GgZk{Xn_ zWe|KTPyB%s8tmUO2#tZ*_d@LR;QZxkK8if|LR9;~+R+HnBYDzb>=1%IYs`7S1h*L7 zN`7BGlk0A*9|twibTs_(eO%vwS-Y%Rdxu$jh6_%u0;hAwZdPTq%{R2Hprxw@sW@bH8oLz03=tRkJ)?&d0l5&WVbY5_U z8WdmR0u7uSFKchKHY4>KA0s8n8_hT#{r%0t&)#t$ntCq!BTuNG98!!a03TU@CA|aN zi$a@b$N=Sm-8jUH_~9Dq0t{1%avBr2trS0~HIcUq_t8n z#3K&I+;Xs~w8Gn1xKhrJ($iR}_NQg{w@!?jHbot(r`!&oL~JEx4HX9ZIAw_s5uZE% z930Q6#KrHX7S84FxLlt!@$=d!I}hn6EObq;Xt)mgsZ=A{UBoyCwK()HEO4S;EAv%f z#Oo6bL12DJ)1P97JEvU&WGW-U)O`?c58j4>d%s$K;ip- z3;8faxu8CcKY&u1V{8y{!y65AGQ&_Zd2wdyf=a1hG%A@&x6;T)cK*ET)>=xcSF5k0 zw%L~SKsVo`oeO6<(mfqBM)+hwnwv<9tgnl|(nwf^szK4CmfyNO$fOD*ELGRWj?Mt5 z+Sg2duqX9`5%JUgH=NBRByrK9e=-bMBXqJ;Y!ccn{Na~+6}okaismtjTjCoSz7gBV zNS&me`IyWDIZv-NhYOZNLKqG1T@;}dS@^!k;L48}+PT{Anih4HuyRYcK5_Lc?dmsI=5&+ErpHG#;>++9+W6^gIVT{y{|a*f*|$dtS)q zZkkL{Q@^}lUGstRE42KB?+Z34LW$JuNSqrbuz`4kQ0r@-A4#Kj?#4ds=I?U zk|+l;{RMd*?9pjTFbt$7HX|FG6pLEJ17Fvh1PWs-WftSO=#*Z5qI>3G9q+)xtdSb$8=hXiK z+L`KAb&gydSw;&)dWy-tsG_21KA54A?oCnmw6^+)@&Yv1Yuytaj zoJ!!>vU8YUa1=DJoYiz5VXUPev>FjEqpf>w8?@1aCR8~F(htuji6-zDyEknC7I z_wkQRR4R!wklgOoTPn= z5bAbQgYXGL;63IugU92BIk<@AZ<_F$lDa`f%P~UYEYa{-S+t!_C>U-Lw91x60dV<5 zIP2*x=1g$KYQwCUMra~-cmc)z*5Z7+(1LDWw==Bx%;?zmyBi%WFuE2#V^@t#w>Ew_ zhP$ce>`xDH7TM4}8AyLzOyp|jBJHfY4XEL zR9|XwN~Q8ES)s&#gCTHx5`)D?tj0t5^uvW_b_$iNX^rQ={ssBuw8vlDkfrlIpJ~O2 z*KX+Pm#oL4B8rxgxMUERJ#WQnD22{mb3^UKlEd012cjGu zVU^)xJM;k&Rw%V@whp+gw6aoaQ&U}KmNolF?H$zyNX<2h-wQRWODk;V%9ADTKrx^HY@eMT@+;*!&)rRPAbmu~fagW>vgR_p7!4VvCww zrj}6VMmV*xH-!`4Faj zf~n|>Say7?=TQ|Z`#KGOCW*#P|CpYq?%{*Kw7dBcTC_RWlyz?Ui+_u<2}QpoL^Qhm zjaa;mvsPSUX0)SwW7K|i!u!FD$G+P-t>eQ)pjon0u!>WI9Qv3Zr_gDE7JRC(KEye? zr?tCq&Y3iFeA|YzXA`4v9pOIYs*5w~jp>Qh*kT?7b|@j>5h1;j{s6Qm znFcLI$COi|Ci^?Lf)HG8=?J@~11D+4!hks}8eZ(NcS#1XqJ1e=e(iM6`qi$z^wrHJa6};_XgO>FkX9B_QJqBCv{uwBE z5GK;~TqJa&>9Yw-Ey)ZQe%9z3K|E#|qn6hIZSFH~U=`2235M3t7D*(BZz=9C^Am#Q zRQO)ibaiF!Qu7;9(~aL|Fyht`vPo-${8iJ5eHbq`I_oeXM##olP1cSDMptz=?*m~K zy76UBOvJN`e`axsgvH0H%nCE*vkj1unLs@HR9oNtrps|ZYvq`M7iBwzdxSfs)lM~w z<^LhbnRfAkEA^{zHbY-X(r#UhK)2*B$7SI0NLHr9JxFR@1_oq}sN|DCd4&n3V(B0D z(<7UGrcJd>XJ(jm#?ksresf`b{zd6MfLWctuv_oARZfavLlkBnAj&$LJyq!V5T=sY zH~{-#%}sm~<=v7PP1>H-VwIJ$ZdHO{YguJR?05?bO3(11DQ=uy2@}@Y$)Ayalq!}V zb0`in;aq%R!c|OG)-tM5iz%S(rgr5PCqct4N=S`c076Q=p;WbmjPIQadr$?da^`Ir zBS99g@Xg$)FM4W*Zvt5O9p)T*Om?YZ&l;2%yX#eQ^OCs!0~&5_LMp;sK;ah8Z_)~B zwK9WZ`F{vnVpx1Q$55n+EF#T?z#)GSY(BqE5wk6kFSGimWLmDhX=hU3}2W{U>kO zUvn&!JRfl_KHO*jNmk3y&!MdY8Ja3rP*2&sEq;bc_R~LI<7CB{F3J;0cCy=IWCpQdK62KN}Tbm zAZs-{4+=1q{g5_n2bM>e@vP}O>Yf#|elch^f&B+t$_nC5TGvSSA|h&JnS6XL*v=5z zmueU-8g!naG>R%;ZK!f9kvR+4YDpTSV)eWHmgeIAMQ((@VZ8gl>?lF2>>x~C)L`3N z5JfK~mN9$Pf7zi+f!7l!0I6lGis;E#7Ca~Yru0{a!$eEVqK8|b$1xkj@)C2xt>jz^ z>&&(ixwP0+{E@}Mt8GqowA-?={~S3+iU#QA^v>L*n{Q#((p-UkQIm;SkAm9%LYV}m zzi^s`t0`N_|6*z*BTw#qL?gf6$Yxq^eWYk4_7`9DzF0aUwlhvj*7&zwDp0G9dl1E0 zCR+fnDYMJ>DTF&l^HJ`#iU}s%K|(9!tZqj|S2Oj@r`N)_)VnP5NgZ2+JhA^|&dllx zIuc_VXx)zsrF^Nm{IYvJ3?uju&*}gQgNA->RX11P_ee>DaxBVHs4(w{4(s&8!0jam z>AJP-NpId4-2gQ&JCha2EyZDS>Fq0)&V7LHqAx4el3Y=Af_T+jxM=HjKlzj$rv>lJ z1k8}d`%k$K6OWOj%g?oANt2KaDN@_UI6We`G6D7#^;}aIqTV$eG^1?8=t_+`M<*jJ ze3KF9a$Sl1M%>KaDkBvrc)_5Tfa^7;w}1aRrfh6mv;5pr+}}K*N1G(dh@b1;X1E1G=C05-#5Ot+4UDEU zW+{=@9aOQiDw_%F1dl%VyVkk*ob&ZXhp}$)y zNBdG(dCfyj!9}#E8zJx+Hx%ctV|;l?zm0qa7d1GXQUpmv6oN~TW5z1&Ndu1=!juXCtxJa57m0Nk$fd`uC|O{EI=gikKG>RW%53;>Tp{BdX8FuptuZ&c4qF8tYjJovC@nPwZ7U&P8;qO-$C zFuU1vM#eCl+7ox9LWFO*-W;gACBo^8C~m+8&L-j)JkPnzl1sJporT8=1iIXn+3o|{N%bk7vd22W ze<^VuQ!}l-XKqGsKEsbB1=QOWEua`(g(&gjMhtT4M2WtgdY^7m4SkssLVv;}!e@^^ zh+_&_#=g*Mz~QK9^~0%H0vr>N8RRLLR-w5VoMBSMM`>z*a)H0 zmx_*0l(E*-y{cmSIep|s=`zjuY*!-H3jwMGwO0VlLB8Jrh4!7!m$fhjAea@GMn_(^i_#XAj0i3f&vqYBq|q^_cve5tn$ zI&c|t1JB#=ar6(%-WS`9+}RO2(4543j|S$T-cJ&^O$UFwWFrg0ltney;|HABCjb2L zaek!78I9Li(IqozchybPQgS9Bxeju*Pr`v13#qDG$qfsR^BY9;VUTTFGeQpRAUp^2 zg89I>*XMauNF6UlM*@p0XE%yd;k-C8W$aiRWz%6#>4mI=Vw0!80r{P6y7b3S=Wn4! z>15|0V)_imUa4CQXt57HbBv8S65?7bDBx zU9P6HJpv^QBW5{&oRML)tc@nKVCe1pf|e}M$H<}u;D6zc!V~CsatSec$I3XW6mQ^# zx%6fq3x(oZsv#&L%S&RtjA(tL{bl*mk|e5%r`R2|)ib{nzmmzH@)dQAFk$Y{DfF^{ z8j)Xx$cw}(k5?DKIHAn_Bw~wb!U5|&Ra*a&<|R>=q*RMr8hHtkFi8WSyvr`TJ2xKg8|Y~k-DP95 zDv%@Z*Us8S3H)_srOon##o+ZR#^}3OLK@S6gS6?o`Eo++5Z-ZkGxemN<_frO%Tbn1 zI}NvBbC{``tK09Ktn8g*>gD-qR;Tn!uLBn7CZ}nlYs-rF)mt{Z-PF-$@%Idf3*~f} zf}RD0roFnF(Vub;9I}o9Yahn2O9WyQs9W&h&@T zZg8v4YpT@8nu;mchnh((7F0^77E^Z?7;dE&i}_z>Rf@DOy$9({FsB_7Li9(@?tU@n zFhw5zr{dG{(y`JDuC)Boj4E*50clJROnoO&WkR;jf4|+uvKN=fLmzolm_99CqU$Ah zaTojn3Hs%K)Q~m11q4AxfKcixuZCVGn8u z(ztS1K=u~Dq-w@$^AhL;RQo&q03NXR>0Xqs0VHDJmMeg?W>hPT)JG(t%b!6B8cz~r`Ihs=i7628cEHC=c?dejp8BP#v}o<3|84A zb-3a7UOa(~jHP?37iPM32hCeo6YH`Q3zYR?tZ zt9HIO6!`=@fm^OC;@<;}FXDDiv_{rj3{FOGB6Wsi)Wi=(oGJ1bl zc@B~#pYXNc6e#U~S1o?P^d(8LhOE6{~frchGXw=?q8<=agf95h1Qe zf0BsXhVGSsKAD1s$^zFGl)(QtgHt2+O`;;uM<<+Ihnd3lTD|C4+DY}ekg+k-pqeg< z$NgpMS2bh00D^Hm4+{!c1LxGSB%X zOGgK5q}W{Ek4Blw0YW*6%fr^GiBg=#iDiG3G!3ys*bF;EllYo0vchBL=I^8(9z)a8 z(rH`~g`V6fmRmQ7^F5qfcXgUm(U-Awh)V0R2S;7;f%o9`a)ZakY_cIo?t^F~<9*>R zm_IH`ud}Pn^i+|Tx`iDj84T0)cXs=5)c0MR^1T}K%~x3j#54Q=AE5uhqV8lBJ0TBmq$$^ z?i~y0ioZg{KEoj|o>Q8vJBMsYu`z5=DsvH;i@iXeuIq$j>2aFIh4{dhJLuMP2bK7( zz~Rc|6U(i_1LoF(%uXHQi^aKHZ{QzI!TOKDEp%m}q;yeQ`?~V)J8TBb_$GOgf z&j~p5Qq{JctZj?a zqlcCR`o-WM?mEr3V+hvgB2F^Cu^jE-!#o>HhHpxA=WBx7&!(p!=g)~%KBK%UO>F`m@HP>k(7r#wL!kjhxa3hgo}+(<9B?3pOBTw^9LS{aku_+3O2pC64C( zKe)U)rNky@PW4L&DqS1y*CiwAo>@bw^or-B;suY2Jy1=&^+O}-GR^$`PQn~BEippp zF*FT$GGl5cG=}s#OA%%RpA!+9UNWk`8gojv>AISOZ$tTR>2nvKN9V>zRIVB>Z|VFn z$w=R{A$`}_8eG3`Uz_;)n=j5+{1Vn{QCg}+>t|uPJI8QKhpRR7;q9uuB(;V@K_~9t zv0`zpSM&^0^2<1LQ+uzf2TI$fofvV=r%}%)TuN1)g|+9`zKCs3 zj#wFTH1W~%?nuVR>(2(ps6*{3?*TEXh!WDgk{K{Jv>A~7s`**F&J31&#zsZ~Uma;a z1`7UgM07%f@YfD&UummZj!pp_7h4o7HkP)53jVmX=o$Ob+@Y*0k~fm9zz? zb~8S6K^40sPe1Ao!r3$fDqF zs1t7jcuL&qb{EnkxS{ooxZpe_8HBdaw%mGmpKL87Hoc)yhCsYWlkoM1sk0d9uy}jY zJN4&r$DHzzTz~p4c6nLzl;5T~vmy-eYfT!HQa7o7DtEP>T2y}Q1p!vKS|Q1O(>lb% zZ<+IH(u0;4paQE$27wuEjCb;q8;i#)87Ot0It9-BMduUg> zbS6{U$FeQ&BRVqRxb%&0>taz0_WlpDuev|(=4ZCw;OUiL_K>KAz*b}c9p&Snuh(E7 zQ6*g2jZkTq?~&e-T3t+9=pQHw4$^MN@oU4o;7gCSK~~bEG9I!uMV}~RT%J`*_?)b+ z0yHrm*)QImg4D@~Z#?AJb9vOg4$@3ykQ}mY*7GyFzT)KJ!h9=&w!%2&845e+o568Cli4S|SJa9S)gOHIC7A}&c zCZf5fwNnis$#a7ZM>`mZbr)RG5BvnLUwCcp9lSagb>3dOdh+ZID$e`_Mw9v z0eAt3^``Kl1B9Y03iGIA`lG+nal|GNtJj4$>u>_CGjo$;DgwmkP~Y+OFq088wfZjW zVWbVnZaMLH!B{^cZ${F9f<5$iU%Us1Nv|5|kNp+V57|I7##COzmT@V(+{)N>s_K_hD|wuJZT~hde6v4mv*xvM z%r6;b-6dKx1_U{wt#haOVnLjlS!_l9ZKq30)AWRq;&H;lwk9;>FAv$fAcLta*oB?{ zU^{&#oBsH8jH&R3vuy^==Bp*OESyfz5WP9wY!1_VkH8RnnHGrQ}hSoch|6xZK9{;?K_2E&Tw+cX!kO+bUmN`ljnsy z?bx>&z8&p^%eneF^pMV0bnu1g3c40uJD<^6p831R#ifr+Zlmot_wNT7U1iggxuU1% z4%jBsX37O4)zziUEE_}6>I=bk8qV;jI1&m51qjr`e~y8g?P|9kPnmzIv?`!ZWIRRAWW-yLs?2q{PA zD>WA#{|CQikenzNtxRGe#b_6dGYWkt%uhCbg}rS5(u+X2IX{MO;4{631=$2=OmjH* zbWFE90)~Z>%;>uVdKriE7xU(4)_Wf{N}37{7Q0@7?hUN&*YqnS-XPXAE)0s#5| z2Fc*Y=ZhbsF`u+?;T&^tmj&0c!$U~N%GNX{vH8c_V)-}!kk@74-It%&WMDEoILI}H zGIe9IIO_-~Af=zWz9?e|YAIv5D!X07==^T}re0!yTz&DlqLZ}mzaR1${p~@~&B<-Z zP;cd7@87`IT<*p8B9ep`ewffryAd#>+MN;KqP6A74L*!*m!7nz!K$Zl{e9{V80s3# z)dS|7Rq#@m;2}prhDLF#(ee^@*0J74NUjL@?HyD;jDmYdope4utqg#dl%>>?i9@$? zZD?`(K$8g$Zaj*d zNUO14UbcL*)NZ5HT zlay9yEt9kG+~Y|DVQzdrlT)D4X?Kd0PTiH}PTA_=k@JZ{mOH&x0E;a5+~2J`GTlik zr1304=boHH2NyXq(&C+il(f}yH!?L^M4%U?!6F*gU{<)D;HzZFF^4iX%*6PUNd8ie znf+islbeIo7)~760FhQR%>(_tj=3Hyl9-o>sg-F zFZBODBH5|yKVS3c8wK21ci$H#_3_a$xGz08)g607-JPZY?RBPV^zsE3xu9@LGdOq! zF2Q8mtL>NX<@PK68@lB`_Rqm)Ij9|)r%R+!9;QTNzw$RIce1H#+$+5jmZG!m)&EjH zi^eWOD155z);(knEKxcMXw`~zx6irUh6*x({@@DlUsir-GnXm2-I~cWID2J01~8Y+ zx&Ked|EKZ%pAi2~{L9a$SN)SG=CU*{1S;nb z*th=)8AXc}1FyDgqXtZ?ZtV3 zO@l=PFDU_dXfU#n!shzfScTm(VP%3sBD91WGLlwWWU-<6broC&7|+YFc>sFPDYOl1 z0JUDDIdf!~k1(y4vpF-A)P6Wq)9JM7gKA1b_8g84w3f86;8#DH2#j~{sph(w$h&~< zQKXDW;Sd&GPxJw6ZU;;zcM&xiGch^_vP=0tf~ze>qppDTAnF0>TI~^Z%M3L1&BfDrhiJYF++9YCx)0UdtDY2O|?uZ}f)S0Phlkqx9Ib~x(T<(D- z^y4Q5u@_%*=zgpzen<_PZw*hE8WBmIoCR3PmnCImfMe z>}fd32fswBKo-~ixMIGQiH$YpMJkvL42Tq)Ty+)svfQt;OdFX|kM4Xso;PY)B8GR~ zClMPZ&%bl&^IG^9QCF2PN_{fOVVt8yLr0H%b|)fgEbPzP@XZ5PL%^-2UwUIp@rGHz ze+CJ|?wJ6;|5?2}i9pze+LEShDvA>$}v0*R%;20Oa1PwaS+j|lf&Tdr^@9)`LS zFpdIxnFS?CL4b;tgv!{6WTe`AdhmANrLxm~dbgF|AC6{J?q9^d-cxQMILnZJv(l%m zCgcpq;-q*~CzgWL6E`5aD-9sJF^xI}9bktKe`ECGD@lvCsxkuu)BT!EgrntTXB|qk z;SCEAlv$J=2^kKk3`Go6FX-O@+2wX>EXSdULarnu6{(QZhA-Wk4(SJqm}OXYF+U-k zB9A!^FLoIfR1@9grQ*+G{7?ijwx04`8GR&CcTL20zc|C-OhjW{+sML3e_+!S^b_pX zxpFc|HJV^_I0`QSwhVb%C>$yc&>yqzv`(%3C@+Fi6Z=iRTqn~Y{XDMN!0bx(SXW;Ac`7<)` z4N=LVd^bO zH7V4(M*#}=3N^6EZ&Y=oICL|Kpu~jZNMvxLBy)vKEm=c&Uz6_iTa1`B*t$Zo<@tL) zT&Y6aHl@AQcCQ`x&;xqT9<=wB|CuH8qq~Fa3cI}ak4ufRs~#0- zH7i|?Jyde6`Gbf%0XO6i)9*x5I{dK!*HfC4+_GJmQ;dU0A7#4ldid%hcrM`MEXYht zY;6Jxhk}_}{7WU=WCs&PY&5m7D%CEl(kf|i+|SxZPL8|0qOp@pdN8Y{wR&~WUoV0_ zH3dXN!{b+es-u}qa3b*pIjG6dXb7TcfDsTWmI>{zKZKC3#3nX~dSlq}M9Zuj^VRZ5a!T^rmRpzHMULGyeW6e$e}Y;(>kQ>EJQLQuaa#p%Yf zTH**$J?5VYxh=V*7C2tC;g^-CD(2Z;3pY|L%3HyJ`lE`iHP^$faYl>| z^_uKcZ~x#?x0^o+FhPE=$Av8sh&UaI#@_OYRZ?4x`tNJqxknwG!-lU(#d{0Au818^ z&UwXrIr>D4400RW;A^Q|$w{i#Us;2+_(X?6qWR|bcGa|TYOw!Xq$nfX<>J4I=!e&Y zQ7QxC>TWCCx*h=Rw#&h!vTay*QX*98zGWwmX@VCi-yKMv5#i z_WYQWpq$h2J}ZEaeU@waWw&5J&tUD{0{d|bTP|Tl%d2qkZk+NLpK)dFCe<6OX(ltF zB}5`b)5Wd1sUEJ5X?F^n9&%G7wK{>yh^}7jHZ@C&(f+x(Wtl7wDMq7pdQ-YRwSggJ zQBp`e27K;yXf11Q9C4t@q5fIDVWpMd!KV#`qz)j+v-L-@>-JN`=NO)#K=H?ircdgU z(oit=H7Nz6wI)fHF0zU79`_IHm(6yzr&G|XS?llJzMk$09Mc8+HO}nX_m7Qix7_6L z#!T(Glp^y6tt)``coY4cuR%MH8z8ile#!pd3bub*SB~U zC;9Zk^Hy`U2eFt%CEsD#zwA3sM+|YUJ?RL!uRO7$ps{Z~X9DrR@;95Nre4z+_;vB{ z`aT_=fA0P&d(#vZeW#Vx?cU(&=koUpwaB41cT35l1ggK1Gi|nBdTG2@u$R1h<%y&w z?Nbzp**SLFNq?IbpNrp=#)%tloqr{O>AV2Ose6*Wle$%4v3zMBViy;Mc9rg0A7TgD zliZyn>=kxbba}WJwQD=MOkX4Geyy9Ys?>MpC}ev)ncTSurwuwB4*QQObYMNdo~wXu zv8x|wij|g1byf@QB-0sQCKelKotcDo9K>8^AodV zn^ByKBT8u!$2j?+6!RE7qgnm_hi05~S)V)w$BeF6+WME{FDe`{S(Hach`Z~F;)@s- zu`!bXNM_R|@J-ECwjf$H{5ZOR1fz>Y^Qj44x3%kDq5YB4DU3 zvYs6hD7p;hRJs6Gxdk=DEM`^N4MkMBC8p&3P*xEkN$je5W>=Y!Mi3VfWi-jZbj-*2 zQkGbx0mLA#!Jy5y8rLO)>yvsDLUtnFLLDhDL1>%aJCJ#t_jF8H9=o`C{4KUJYCue~ z6Roi2$TpLTO%Y71u!X-9i!%g)vt++!*8w3>m{Ex#t4^)l)Q936>;3E+_6$H(Z7?-f zXLH%6qweJrR`p6>7*OA|^>Y$qr7Y8Xkz4S7)?@N#*5}Bi634|hQ65F+9A~q@ouVZuK+V>b)%5ZyRcpYVU!O@M2yTJ_C0x)dT?*+`m92zQnM6B4N` z21KbAuXBqku9|ACn%Yc&Z;WD9d7pLCp}6E5PXzP_fS!#vLxo{0t7!?LtD~i)qc5u# z3N9tXLRlr6N@E%}|LJfb@NF{-HbV5YDQ9OygM?)U?_?D>G1h7&)q++P3q!cHN(OdD-E2yVQV3#`9u^s2SpI?eOC(j5)@qoT zD-K}LyGM57;E&pD1|>cm-@r!>RK(OjpNfFein_wpO?9Ui;}5iYRf&%PuM zjh{(|q4Ak!AGasPAkfX3RwvJ}*W>4Ze=)ML>;3d`_#Pcz4%wR!REy6C0{uL7e1iXt z+t?++fTNv7Cj{LJ7nh3&C!?53HzX(t!M#ib6jqUetOT@x#>#Fs#5k>v@2mIM)*S*^ zaCCL&B-LW4_^CRJ)K!3^Ey&tiCnDJh?*);{V@pmHddmjG5q@Ey3nH=m9{$oPKRmTV z(yOY%zIZ5D<>~OO=j-tA+0MpT^qNKZ=J|P3lf~JO+0B2aU+359;pdsJ+atwVJPLL`-FbCyY@!yedbtfd*) z8F}4cPMH{z09#;FdBna|Mc4U`a?=EYWOdQKdZDomHBM<|Ps4bZ+6oeEYf3{)*xQp6 zkVzj3tC<_Nxs8<};+85lub6*7E=-rWc$&WhRv4w2#fk#G`WpZj(O6o3$wBDiLR>u; zJ2AN{=E#g6_wRI6RR5^Ei1iIlG6z-H0!bD!(LloOJ(iIio|DMGqrU=XaT{O?Bs=M^ z%ZRl?uYaBQKjf#0;6jQk`PZ;D$joh~n^axPFW??WxMa)h(n{s3x~MrVt0pR=5DA;L zV=F&xYLq1Oae%Er_aTGcY3xAN*emSp?ZdH#*V_^!j9BozP0OK`QxpBDH*L>P;*tk! zU;9<=)V=qqY=Zgjc!%4{-akB^gUu4y7Z&MKyzTXxk=HvT0?cjpx+&Ab5G@tK*oMjN zH65iACKhp;bXuz;RUELQNJX$t7#J$yn%_?fe5#FyS8Fq5ha=P4V<+r|f5nGO6KP^( z)g-tu9~S_VmN#?#P7bG~AcDfA7=vB|Q(_!6y3(Y_>JhIbt%?HnlRey^;BU%{O+gLP zWpqPW59zz_G=4O(Q)>}-Na|8EL?zRa=Ex0h5jE#-ZCnV z=8ONtA-Dy1OK^7$?v~&(xVw9B_uxKwaCaGk`w*PL-3jinJiq_hv-@IS?3F4}ZtzW*nz(j?xuOj#cFHA*_721JM*g`AxpWYl%wNx+rx1QL>;B2)SsgN$ zzc%*Bnr!wYW-OD+-Z{suN)-wPCt||fQ(!=h&Krn$aNSw_HS9I}kNutQdx%um=2atgmHzbD_B9h zH+ZthO&9-jYd&|zCbNA!^5^;5n6ny`l9>+Gl^PV-LT2BoNopT@!ZVD)k7*WRLSWaZ zP=0_(s=T4lvC@R(i+kIj`iin7)aOaDhNP6nx@bS!VHxHjD%;oIt z{{Y*|%}c6FdAI*hm#Vy65{8SK_&Y$4h(Nnv{m-YD`T4!^XUkD(B5+&6KjpIto#GaxAkI2b>mTUQYVZ(r<5oEa z;EyI1IUxAea6TlznosogVQYJHcQ@1T>3nc-xSLn>?Dghueunet(e-wx6GP^{Hk#+Z z2(w-2*~z6TA|8VU(Cc@<)%)}!Sb~B4|ROIu{v@F}#+EEm>L!dWHc)9(! zPLW(pWFhux6R!&Mb92cy25Facvm^mH1+w0ODX42|@4#BVOD@e3agEii_uzEj zhwBvIr8bf$9}NHQh&RJ$-}3u9=e=8a@~2>o-t@5g$zTi(l%m=Pu$JE;qsYx?@~3Ew zpBZKmJ-huEY&?sLeh=SIb#A%I$)aifCnI|HB>>l33F_CtZS>rpLkYkQko5_S@9(u# zh+%USXXxJ-(X%N5_y=Tt_=m{wpvrLiWP;&eA2Fm*^KpInz7K17zF+ae{_p?$F%17c zw?H$(sRMR_tXFlyL38-tRy`%l_}+&xLN`)mZ*Wp%WBq;pK@mM53BV?h^&c4D%SvYx zsM>TlNcyym?(ZDY(_gAPdlm|b#!B_Qi57~kWe-@f)viu9=v-Cr%jx5KU73sTK`2*!7_%A5A? zg(r=+v;j;2S@*&Ct`BPi<3Mna8*F`kHn#Nc3ca=3gH!DqA1k(CPFfj^+;x?@^Tily4cM zaMJ)8(?8Lejo7xjT1#kl*zy9{Q%H-+ z;aO=d#;7)WhNa|71qx_J*?y{cnm4u-HV6K8rxb|PB>YM|eV7VspGe)V1plVtwqtd) zOHBezE&Ld{z)EBvvjZH2tRIc8+dhWSk@j>f33l`Kc7WrjYS7p9dwQS#-Mz+yJmWhO z(|`EOoNiH(RV`6N(w=Xu8vv2#0-FOwR^@5YvFD3C>%(1Wp**twjo8j86=_xR4mN@k*}{VekyFg zMt|i@{KlC3mS5X5*@4+Da&hZjJMHWL<~wuH4B{>3tNGs*tk&G#^=jEl@oG*ZIgJ0X zcH3y-5qF|trS;{3X5uxIXQEis7DjIPy@zK{yJqG8L*&2F-5!`7*j@OB-Eky(N*9)7 zrY*TJghWKg#w3SWiay-IP8S`^ETzS~#-lMyhqBTVRQ+2Aky}HPS4P3BabaQp>A4nV zX0SuuX!hkdiRyT@&Hq0DcIAn#jBU4-d6Dd)w{S1h$AhXY%#F9z(Y}T^ETN}0J=KMZceaJy@B4)zkVvw=6H`R3Tk!CDn)NqF3GU0yrCU zkMGD@o034(k+{Als=%WT?i2e~m)R@>S>#rYW{S(l@oWrh_*CaFW`0(+5hD40K?tnG zoNXfjM_W!$%uVXJAQG>-DYqDMSa9@_sJLXyud1L_CJvd4vd}9nT)~5aVoa_vHXygv zUZBCz8&F4r26GLWT33C=2D7(RF|VTj#4z{?Pe+6Gsi<}^{O^<=#~+e$ycsi`C8t<4 zQkZOQWVZTHW*8<#Bu#F#1a1`TB``%Oo+|VBs&sCk@8J_88}Qn$Eq%%tQqg0taV^aT zTi}sY3BP;6{bXE4dLBS9Ytn2nS(;|Ah~nRfGnwtq#!NJ~{+lvz5iJ(qVdpAB7|KIXKX_K zs=!mXxdcX4Xt*SRfnk>8{EUMQTY)D|pc@8h)dT5SPPdn5H>Gf=pqB7h^Jg$uCzReZ z?Nc&ZObj$2AE3-hMY{Q)d4-9jgp2(UoWvW?+R*miNz^-`E9{NiX1lCe=KZKMf}X0+ z`IJu(8gMGpf0RJk?o2g&pGT#U$`wM2SVoXH<>ZwM*WT(1F!;gpS~WaEKHSPjQ&kjY z9`!VmW#TAa80-$fDW7EIk}N;GHe0vv{)6{9Z^@niHX=2lIo)R@uLLI&Y!b1{DM)=G@oJ32~%{_Hgxu82dYUzl_ArT9??feiSr zUibq@DMwCnYJJDS;S&B|W8{e%j*3UK5kBPVXFK$$T{qmS*7He(ZiTY}oL3Lvt z$6NN4WXWLgF1Xk^*)m98h6#^m;Pt z_5uH!08gj4Co#W@@TWJ5uJIj9LU7z3ulD9uRc=F9i5FN6>!>EAO{+HRiwGP{qd=<#gP6zK) z^)kGu;=*8RPd)XMv)IK)!eUyiZc=>+SEw;wJ|vj3E4VUt!l(TeOz@2j#wwJE3|Sk> z!E%u?+lbWRsd&@fo=RuFL_IrFqzWfI6YkfH-&(BrHa1C;74FXJG?fAQAXetnrhPa1 zSdxX|FiBy^BIS5oE5t?2KndS!SDCKHSJd9wt)(1f)#LI_FUE#chF*trn0gD1Oc&@V z)nCtsvxT3dVu^0QIfmp?8M{n@s);s9MF2OWr zD=8xH4mcIJK{%!l$EZn{pdJm2Qe!b}RcTAV|!Z5awPY9E4Hx9Uw0 zPU45^+cU+aeiY4F<`hl%i$%tNv?h>=aL}h%xD;I(G`&<*SXqyg7*Uzk)(Djrc57y> zhUiVUAkle@i9WM&>db|;$1`UEAG#WP)On8%{2YGO5bu^zdoS^NNq2er-)0l(?neh?*lerzE9) zG8gKL#~(B~m9}e5)@HAl8qZgQ{QXnE<2w_)Qf*p8B+eBZ#eIuZ3u_l|p=LE{i#7H9 zU50ZQ`SoM5o9rj=>0i1%>q90S+a zyo{LkcF%ymm{%5*k`}OeaiXm#$k;F4!9#e zb8n$N1taxbRF!dPx0URvnVI0+zM!b+8)WeEapMs3n0?cV6Ck+_z~95rX4Fi9hFJR5-a2hYGTF)&^pX|8sN{i z$ohp`v`B6fmD(qHDF>t0uf`2U&PxY8I&X>_^o+-Z5=OpDi z+5ehgB1N_f%4TdkH{DSVms{Vw6va@A6?j%0Xw5?HMp;$yuN7<#S$N7SOt)F^z&U<$d8I1tqqX!qI?ZSK*;tj*M>h0f>;(;k_0S5!tu6%KoC(%NrIBdbJ9{(IXjqKVp*&X^+&1yr z(A=1egPHB~Y{d9Twm-t!oK!O3`r!}~B?H6rUB|nj6;B+@3!>Hg9q`#o)=J$m@f`-5 z`F*@8iHF45w3@6VHKCy##1$Z1QYf@_Sj;J72kM`Y{_=j0k&j3F5%`rmqkzjI7&$dg zvA})|Y>~9#ed@z+Au0+OtvzXeuYZTRFfOB!c2lPcAj@9VC)9-UoOkMX zgh){JY`yJoGBl5Q1~mu`LMWCJMY4T(?eL?>-HHp%xcV26#Np#L8!dR7FaG8tXStUJ zr>)WEUANEt!-L8ds1gOii*=$ql1|?_7D(dV~R+gD&2m zam$*!)HK0N;&1w`s#GV>A$K*Ik5Xlr$arsQV7zcJ6d@QYOc0V% zoU+-J^=@e&cS#Sx*bJ0+efCOL6~X7e-2WTlGPXh+Q`K}Ic9N=nULPPeV`Y^&8xKK8(m1q&4q? zXB+>_AjzvH-Ij=RyJxjtC?;K(Mc8n&o=w!NTW6(Lv{PKqyggHx&pQ1BclATYv%u;{3>+e*Pbh1*C`6xt^ha=cC z4E4rv_P9m!i~I#KJNBL7?3>Pamx~>dx>k{lR9?*E)>?U=1S%4~ZFegMDuyvX#0Df( zv>H}A$0lJ_^u2^*#|8+ zWd~V4k5|Z_?*)4O>n_XjN88}K-xUo&?JS2Z4oMJP78RrgC=32$C4|rbH&ju?km{qNvg@+rJNB%p}hiT;7SiJN|h0)hjSe`68 z&uZw5w^dkofAWAtN8xtKE4O9Tnu&a*>H<&W^=Tvu6Mn;f8O@^9p(7aAW`|aDD>s&y zb(ceM>hjAS^H6R1q8s*uKe=AsOaUH_2)XW^)%Sg6jVGQazW;S4KUn4J^yny4^-q}A zI}hi{lJfRIJt@Ei()b1Xo9cE36+fKyu(06s@;f4woLYlJv6*Lw41XDF;}M!75I#PE)bqG|akAi4>?YD2_Kw^1{VTz=_eOYSqC19F)XS>ZB%9yu)!!Bo zNEv?ZRF5Ahf)yP=t}TO4UbDUxveSL-i2-P~qlZrrrgao0?RtH=+(SHp>kfF`+6FfO zdW5_zd;hRvB+R7$lJPq6|KIn@zSRD!2r77pRJP5(nA6ubexz*Sn2e8 zpx2S_GgTRV987Zd4*kF-?+;`@MY^8M0{$#ij$_oW=Mi0O1hA6>S2sA2$$aH&s#x>m zXCC`TpRcLe^RZRo?44cqmiQ^q%w-yT z)XM>T$AS&F!N-Ef&+y2n&GeOZG+rl@D?W`a>s8gfwkMOir<1y0*;@0es=u6g9*-uU zFIVH$&BL_lf;3TyN`QJxPP`SLs7XDFwb`TOul%ekM|(J0=%x+tqSLV+^jQ#8Jw*K zfaT%FPEVTHT5Ddl1Z>u9#8~OQ;cZ7Mg>-Zw+rcZ_-Lhx9**Ah`;QMNQ**R7XLc_wQ zJ*4gZ{LuojcdF8gZhaNSmbM0sZZS@+HXoKR&UUoqncr_lG}@X2d8coK#x>(S`o#^y z;asz)v>S^SnsHAoxkOIdrBwBmnHKgght7FwTOSV|_4NRsl>($m?O($gJ(Uw5h^|B| za>H|>4rtQ#=%Oo|1~tn-iN3>0%kp1WkP5 z9qm47OXBus^$5E=$$f8u4n)(Y>%+!Afmn0R9deX)#HAwpWlV|z1R>_F%){L zF6`1sd1s5h^3&X~8PikpuB3nem;In65pi83zfu}xDRdqEvoSllz-K!ERtvMt$^NR; zENsQ_UE|$aKjuEEs)-1XI!YkbaUF56w)aj$wNBrEw7S$5^jm2j-77Wn`%NX~d(r4u zTEdeJP#z?t+fd~#*kULt4b*hhLbD3(WUR7dVV_tgg?np1s~g#2Ge=eruPJ6XiO-87 zp*aEv<{}+#wBOWgF@~MKi=2$y!bVlxXsADW_JD$-CTsM^VM8WtBEB?FHXpSw^IGnA zTeqiDgf$KHn>8De5n*Qwt+8cWgcZ5=vsq5V-vlAjg}`~E5`*aA9v7tPwv7cYc(7Vx zpe55n{E=Zy_`$b!(TXT+F$gs%BuLO)<K^)GNQbFN<4&bTeJ`jRczGY1Jrn{1Hh1`UR3nAd;!pS|6;U6WZC z7!>jGJN6)4PJ9HACG?d&xz^Szw}tVwu%}`TR8T}>m{Rs~%?_rS82bgwT_hsYY*8%5 zzVR>zDTZJqVf>M9AaLJDA3tD*xp(`Uzy%)`LLEs0AEtKNSs|2nctYTgaXQgl9c5{$ zqblUqFTw{ejD=0sXa&j6jEb!IIv&T^cTO595X7B$;x$JbXgvGJBan31GA{~kyma6n zro=$RHzS>%9o_8ANW>$*b4kU=Ug89mia!k+M|NCiD)yh+7@#@9vRZ;!EQ(9$4nawL z^3i*Gz)@0(75Tv;q3=`z$l2r&Rs>7@=6Vqw<>QII&}K*yq4Mpk{+; ze{3-j#bAr2PhvZ`5D81x@_3dQ)EVs{TABU#G;oPqi>?~F@g?4W!X>%lPuVRFx3jW( zyB!F=!G`a6y3M(lY8NIx$~wt;sM=d-Cu=Eho3Ik`Js8T3B2ZhVBm}y8%cy|&CC%G} zjqJVz^RkUq1Q=46Z;0U~Js(5=n!FMq?;=nYaJ*LrxMo97u1zWSrV2Qj=`}yy=Rf^+ zWKJ*4;uDbGaKQhZci($bVd*c~aANW@@`xcmjU6N!8DkL_*^|;{$X?#T`WmII0XhoU ztq@E@OGFqZ!wD7q_!}u z*;=tR=?Cy**00QY+sm03Re*;zjcHQ`32kPl9bnrKp;8g+k-6Co7muLZ;j}f92H9@w zhn#{gqvC|g3BEc}Ak}S2@H!D1f86#xK^_Wdk2oH)+UQ1tslG_IdKYSj)y39)2FqM`r>293Y>lRQaMc3^45Svdz)O0HoUf@44pd z`)uWip;wlEP`hF1=Vh4}P{;bAgZRj4j{iXWexciR4mF4Fyqe_q?pQ&TMLES6y?x6rJz_R22MG2(01=@G|kX8UW< z7ugBv7Jouga;##e|EQ`t}-;>lbPx6avHbs{OkA71$PW;Tp| zPIvDL(hc&|@PV@vEGY{=thy0f1Ks(@SeqA|kidQz<94!0dtF;Ps?k$t2TN;o; zBMM@GntnPZ%sC$I{?@FnT>c*H*|DYnr=@LsHFQb9I{*sD@nrXCb9XEDuUX1eO~&qV z&5rU$jfC)Of5#>9T7`s_>*73kTfWp5*upDY+I_R{DIYCMPAgaHrFaPA4=BVcd-uxh zU8jIut<9Ms>*}1^J2ye8_TX*(R9BB9?c{b3D=k)=ys4(FZF)}RUC%kohbQhP^cSxA zqjoD%f$I#q7JlV?gOv=dRgyZtrk(sju*u9%kVwZP5&x5JEAGl#?hqzd?Tsgtp_HT{2^mVgQ>lx|Q;yQA-G|FCC5JsW zGUMoHw=?lhvxT3aTN=c3Mrtt%v>f|8Szu_68A3xSS(S(WS{iA>g05OCN@cvN^-~Kj z$I$QVt*6!fx$JjI2XxCa0?$!TW|LK=NcRbH91pgi3Cej>w`GLClF10CWr zWnUac&U;@?$clcoI$lGe!z` zb_50pZr<*pbL(%j!RX_NZR_DR8l+>v`k-^6O*hzMvPGBAemk#-95Sr z=KcHS{@F=(2w-~q0{@BFGSPs)PbzSx@7vq!OYUeG&mt`a3QW5l10F(rkjHks zq4*#={#DJSQuYDecARtd&jBK;!>dt0$II}wu;9UANXC@NMhcXFLr=+u|J2Md*wI01 zNxYJ)@!|63?rrrqX{;BHU@UPQjPK>CWIeJ5HXclbu^cAa;Gc+5oQqCU`;faDF^AEe zm=}ZRN=4vULIYLd{3rY%UwS5?ZlR2gJe=2?*&IAC$<6RRmqS@N0-BT#3#WLO<^N4( zgXBRZ!C~iq?u=?TRW0-L`OhbNM z1=3VmmcT#(DbWd57v$~5JVdh+Pnra>%$`#d=$3u@W{P{>bIFv%b&V=}zCT0B%wl+Q z!``SQXN$OLT_`sLDm#xWhK|n`Pih9uD(+%f^Ax2-D?}}YE}%(_GS0U*N7esL&eLIa zbxYf0L$5dUL zzWVV&TJ6Jo1lQH|QmR8XBL{kAC2yD}w{O1n zk+1gM46|^yt@eh+9zn2rt6fnDZTVZlFqiccp9dAwv+%B*jQDG?_z;?b){sadvd}a~ zUpjb9;zn15#XoHyi3$@QJWW=;9cawDtPQ}u`(9IGBHewrhEuxbpOxCx#bkuwV{8g* z@tVF6-{ka_#diBY)vi$Xa71tCtc zgN>-;Jo<+SX>rVfbWaAPRgIt!ffgoDflRw!Fpf5F!8DB0$M4pEu6xi(kt25`e9u#+ z5p}riL?o~CxrQ*a?g3>^K4LN_v|w*Fjzec2qEtU!HS8gNVy-L^P)bMN>t_QXT4iPTwk2R4$$4|`PT4r_g>ofgp@nyGy4j$s|jzCVn6 zyxW`|O~=6@_j`Hxr#xSRD|DCA)tF$oz4L3a%(unc#_#3o^6)l$r|8<#cmFcGvLE*4 z-}i=;VD9UZK-emlfCai;b%2ghg&4ZZGtIaJQT>}z+2rc zMHpiOTU^AI?hOYJpFxgSbZ~%=e>P$h(%xucPJHgB1Zw_V89$$EMEkqymQhM+D~sIJ zKrM6ji)B@a0AHN3>k3e;HQeJXNUH%H|LghEK~F)Pg*YHIv|gI!L$6p zm#ncaObH1F;z@5h=b~t5nlCm`6}UooWoy7pe^o2@Z(bpK=>RY|^D>XYue6;p^K#Pl z?M>Cpea3Pxw?m!0g-wzrh^zs%ABCx(8+g)&l)VH(dQ77{lhs)5lF26{p0cs|m*wx) zL?CUvexIo#Ob)~7lo91Oo3b1Px+%9`=HVTznKo0?h(gRbcDB3EamV7ao( zHtt7^w{7DyN=pcvQX~bkXT|d#GgHL`&R_5D09~lC+?~$8n);aoy5CK5{Cqqe@@3yum zd8Pn8YrQXSkLQEW_vE66BtM_7E=}HNNBd$T@{>z&ndW+^ma>2QL+iELxpsgsPy5Jj z+*LcSPPyIKk}q>+j7iiv2$jX5wndztg;dnLH;skBrph;L=!L<9DMwtF=6xr{BR5N}B4z;Zyd*D*06I<+Y0@OOWDw>dNa}uaBTjB}0>gWKJXtdLOX08x$ba)j zE)U0tc|jQo<4#z~1n&T-ulvd~5#b{i{dKWlJ4f0WJ3+_imn?ogifPJyw3=*$@IL_9`}4d+m%c4~mGmzwNn(L0Pg77R+h-lgoNS6fqENt1~y2u){?Qo~3(Do&%G z;Up3pMIsLS9oEQWJK(fkFiUEH_GRdP7h7ip`g<*`Qa~$`l86~0ai~zbZ=sfcg4XJx zD<#~L))D&F%wjfGw2pKa8@A~XLRgM52Bp34(p9Hmpn3em=X!)j{j^! z_DuF&U5tm<`E2jYU{?DeDJfMMOPMAjMlRVo^qOwv9YV>i#49glX9=&q-@qLNtv)+3Lhgk`2d~B8=r0aIUV^NLK`~m<6|h75>u@ERH}-BT zjcG#>bVwrX@@*Rc_0WQ-1^?wXCI$`Upf%z`Ti$dS(@Q%^&)_L*q*BxVsph+`6 z+gJ*7SZ-!rAlsZW))KrBNn^F&7iOZMAx^Ew#29yU*uzD%xSFR?>N1vhR%{h^>LkNv)p99v_7A9jIX7>H zUDGZ$N{(j%Gt%x?xYq_83w<#hNWq`uY7+GhH7t`$v;CHA&1*8M5d*OJvga|l;EW%w z*0K`H4HEDLdkCKPAzNktYM7K;mQ@}bA}!m`R=K!eH`MQe_+Adyp^Kj8_dZ(zLl((J zdwaV4yuB{})j&#ctFn)bzO|Z`N}#n5%|nmdd%BA?0bY*-t-247178A|(LfJMTu_@e z<0P(M1LDHyUI&UG-UU3pvK`f`Dzc1FOZbpTO0O_c>{gg`HO5HFVHsEIsOO+ zrAcrVSJ8748rttYEEbK~7rz&$B3U~2)?fR38;{4$IR8n&ox(r#{hz5ldz26!B)SO~ ztk8@;P~E2?y!x+B!r}%*Uf~Ka8aYt*&K`3*yNP-tKVujDF<=kFty`)UHlTd$a4v4s z8((KV$tP77X3|;n?^y0I(7|t`GHy;U*gw|=mwtNTIMTzPtlLXrx-k){OT6ikO*hmf zN39}a&sFBSAl(JcB1)4t3y}>6p5#s=V>CUt;XuPU`NQlA7qGy61)*ueb0&2vYp~(C z`#iP=+v|L;3O;0-1UeYmS~E91iX|{lqJ8+)$%tRm2l>p`VV42#lQVBI(`6AdZXJM?qYs_-jGT}Fei z4vr@vwWRMk-FLVQU*k7wku$&_jV4!x^LvIJvohy=K=-+B*G|<+t?SD2T}TG4!ra#J zB+jh6g=k6xQb8kM^BGUVAUEX#W*Ip6Y|t9*W@-E8@Vas*J;D({xW9FP?|3@icz+Qu znwK9S)cJC?{ZSStG&}EuvUC=bg_4eAEGDAx=qr1n-nM5NKtYY?umqUjP%K>T?88A< zHmwA8dNfRO)u8Re&6jUwjq-3hHBSqLgF@-_>9MJa97b@|8o zGA7pynl&^RyMy)Sah(EdYk>qjmrUbMN;ZOdmSS*1M%m#Popj+T1r$&S2tnrjbif)! zJBalAExFf*C2zMH!LRt9ySV!hHtUY+c*M9&qud`mQAdV;WwtbW;vJt55C)z?NLwOk9w$<`OnWB)FGNb z(J5``47TTOl$?4`^&GrjbR6qA?#I3H-7pzL7&2>www{vRyG&Hw0Z$US@Ku2NI4*LeX8>O@MvqvpQZXY`YJm>GQ1Fx+g_K(QPVcj&6cZhz6 zJ8#1WpPbBrw6R$0p>iy8aI!xkMk2vdhW-WrB4o8$Mx7J4@b zZihYc8c&!*w)p+9EKtvH&i?wK<jqrM7UzE zYD$>{?^V9$S&B@$!>oDiJajG$;SM@1$hH&rnI20U3VgPSd$mxDju<;qT^8wk6Gh=x%a=in2dLva1ohuN z2~>G-HW)*vX(~R!76F1AM|29C(q@tl0~0q`f$`wMc^QE~C^3K8wsUs86T%pRt%>~P zcv}jcb2O5H(Q?01hp~Fg>>BG%&YYleF`nHchV;(LvPw9Bc}%wezrW`at4{4ofBXsd ztS2nUFH$(d*o=S$8odwC3}lJ9+;gGpw2z>VvLip$o?^C$MNHceZj+<`C4>#-M9HCl z`2vOs5fVPyV%#9(V=zG`>Ta~Uh}5~Ap`ba2{bx-oU_C{&=$IvNmYsMhL^#%MPU5{aNGnUL0g(iDV(g1HLW6$52;WPU9~?e0<`josnwXue zPkGb@gD~#RD!0nlD1!V0#lBJlTBGxPas#rDu3uV> zq4rzzcH&iA^KMEfZ@&PHu)-}`*Dr(f^TU-|`648wz3(?$J6lJo{w4)QuZxzB%6I6s zQ)KIv?J2=iSX4%}WRx)1+^MNMLJkK=Nu4y}#bk!vw0k|7dRL^&@etJv-5~qY>oQ!A z(|7tX(!ty#qC*)h&)_uffn2ByhVu_>>Z~R4;w6xp?4<2x3uW1!3Y;%1xm`iLjDO<HtBYZS6KGQM5@l&< zA<=)eP>_>IS74_-+;8|rcX$Z1#+~PotpE#YgkF&2;7;2Z$i$eF8-)S=4XV#dE?KD| z2J$#94onic_J&A+j(s$@!BuLv{+3Bx)IXjNsXn>m%Ux?U zpo^C@`m}|nlwg;}xhz3FTuT1sfoew+Yw0TEojr~afT{FBl7zTpuzshNYv$1;O3dc# z$|8iW2CW=Egs`#3yeNL%=|AXEVa8!w>=$td4n|svWpnV>8CWb6K*-qoIN*QUpS}ki zu%%$gIX;j$xZgwFCCwhKgv03Le%cfkm`GOBj-`nye*HUB{yx@F9G(1oM$RF8$V|H) z_9grWOf%C7-w1xFV7hmwT6XaU0!ZMTYE_rk3aa{q0K zc8P>L#fhV=e&T5j23D3|jk^I8X(*$cyBSQRrMbCK4N6C$S)5)UOxMY+E;Qua#~$r+ zXEbH-m`S?FemPVCWK?s2xlO#pB|Ob;fPxt#cA63E#q%i`#HDY-u~^T9iR6BFVJz*l zNYi$%{r8IU>6{NOd@C}5vIM=609~KND4N6uHZUo|-iQ(-H07^9P5`D05DDwwAa1!Kl@ z(b~zt0My~(-Dj6OtSV0?CBJskToJ8 zAVBiT``lI&mt?EWLeqkRI(?l4uW!ehUJq&(f>WGDMkTS6B&I)oi^-uh{t3wm%?`_sbByTjtyZofet2u^>!AQG9Qz_g00`pwjD4~r)bRFc90%hAsb zlkhNCM0ZI_{B770uZRK(CSobiT6MS%Qyg!N|4X(-}%^T&Tw#Nc^B6 zbU4th9R?>3+puJiWn0aOJIA4x)H*vCl9+*tg{!9PFo!`~mq_U46K!v)lRZnoS30{m zs6wa9E4&mKSD0IU4m zZoZ#EWQMyeC7bnSyOZhT=~{^U5sQcOpWpnRtTDR%FWE@ELkJDGgf}p$B<*;-M`?f| zU0yhaWG3W98>;^`&`8`Q)qwv5k=G#j@T1OwpV5$EM@Y~ryXn;>YM7%7Y{l>CrAYtI z*n)5OfMKfXxH!-Yv=0bw{X7?`$GVWvf(?mBJB|DUDa;#0we2I&7f)ebJ%sD*3C2rp zXUQQX6_Y_sH-ZLY9uw!c=BF%4rt#;gwg*>*HoUdQ3+t57_Fy-xKQT{Ti(Zen6Y%tD zX|T*?=A~`HI+c)5El0_?y1^b>8VV6ml$JXa9pc7LofuB!AQ8A*TJvp1_>36hVWe=X8AXIN_p%0f+-PN^EGgmT@oEg%DyK09SDMLX4n3hiO zJ(HOeNuDMUvif)K9Kj-yYcmtm+ke!gp`7a#AOtQVloc4OsHKeO^<4^~v)5y@0b5k=Ly0(!pc6c4tYJRd#ET_ftfDkL32TZ(-S`M+$X2U?y z#?uDX1=`jQZEBn}cdWehoCJI4`dc=wc;;4xATPa8;*z;m+t(N1d7-?Wmpd`>6|_K1 z8X_quR?0Dhcm7`fF9n2 z`)b~@d{$-AULnEWClh^weTeDFA!>epuCVmf{{L3{N0@3#w(^BsC87FyR^s|K;^V!+ zF+sW3@GQUE?|SR_wqIpb9hoPQEl8|P@X$)_&j?N0%$$K}eV@EclDT48eRITXtAc%C z&H10_+A9aK86AEDJRMTM4eZm6S@MWLhajcrn$F^6ZP1xtzri<0(;o=|`PkXcA)t^H?tvQ=hA4=-v%^J|wM*pC%+EkGB^X87$>25cKN>43OF*ENit!-2tu zQBFBd4?^;}Zj^0{kGy1aK4k6e%-)gOwVtlf!QCa%o)BYm##(P#DtV@xEf(%Vn^5{s z3j-Qwxb~NXJx>k(HIX+L7whhBzt-OO%hR2*{#h;jT8w`OJJW!5!)~AZ6~BjBqyO!i z%iQh3H^e9O=;!qC1>Elc8}H=Jk8M;*-;cTf$X?x{*5}ig??V{7C(y({=!ME=O+YXf zQXqoX<7Kwg4U6cMo}M$l_hcXE6hW8cOrh^10i4JsZf5@>aaStBE2dlHE?|AC6lBiS7suH@*pRk zcO|J7+jq#mBJ)d2_A5V}NYtSv>=C29^Iq=5a2JQNqeGbP=6~syz#7cSY{TeUoPhBG4Ds7M)SqCKp;As`)19qz*k6%C7V`6&5mMc9`CU6Hec;& z>^IRbFCC7A=y^4m0=3KA9mR3pbgna_JA*8x7ln}lc2r{Pks$=m-=#QXmtSRs@wlFMo2TfFW}5uRSY z?|L`T5){Jdmqur;Yop+lP?;=7s6>m(jiLPUmgYE#%IvkwUFFxaKxop0{=`uUnDZ# z_tMz`OCN$0xuhfOv;4Zl`}`zbUkPulJks|^DX5SB z#SezCSummO1kscficxga>P)z|Mwkg89uivY&p8>j7t(RDzAj%RlN2#~iX8Ct z!A#Pt`4V)FPh&DS-StgoJH0SR#!WL;y>C!B>-PMwVcre!_q8#*yo2v=^0^cyYu@`b zuRL~+e$KOvF&th+t?@Pj_&Z@Sq*Ab_@1h@s@6*{Ovv#-oy2U6JxqIz zRg#G8Gs*G>G9uYZj5H%VwTR_tp#E&WDNdxfzaY8LBNlV?Z{TToUKwtV9LzjylX3UU zF->AwqcU&n&PFr*NlIg^O9+^rDNWTynIhjq_uuz%j$%9rl<9k0^oW@~5KnIq9d+rT z@E&^f9EuahArJIp^7=TJ;OrEcGx6Yb@eq7hj4(!c`oBbCkiMayX}5!p`#rv~&#KqE z09Eex+eYOQw{=ULPRkn6#-Al_+ZLqXLMp4)f4`$1YFnMEkp^qA9ap&>Taa|^AT(WC zktT{?onQ;a5tg}#2;9`Bh@HKa+GI)o^0$WKP(f^AxJox7OtWt#XybaFt;xW?4?c4Y zmz}4UQ!ZCrPzafzjb+szM=3_c>faj=UcZBr08?Jyd1Rq`iUg^|)1UWBSQxd(WSV$J!@Y^VQ7(tse8ooCpiK6Zs>q zEsz(@c4Ui4uoahINcL+>`LSWnzkifG{%$h)FYKyp=@wTHF4Lid`{i7|X2>jA!d1Fo zD?oBj6l8|W_L&?v&rfbQc`$`#bex=Y*priP0u3ZW%Y;fE7 z$;4kUj>Fd|$`xdN^=0&c=1#3x5yo`P=B3z}WzVGgtNh2cS1sF149QK9eeK^hisU){ zZwD9TFy~T_dw};Efry`wFCNL-$aFx8n0Pu0a41Od>Jqa2Rg$)jnzMRC3aeYdI*bZY zhk%MrP4x#ac-9D-jM;_I7y?3UgIl-jRd>0NG&MFk(v3r(BtAI3225|$?RtrL1Car- zzk6g1DawT17Tb98oo~#0&%!G+vQ|vUP$1kWGyGcV44ODNC<@N3^>p2QN9-gMve-#z z4Cb#eK)2P852ll!b^N5)uKpQ*22s~#KX2il3^Dg>TOQ+g9Q;27e5Te??Cd+fF=ALa2Hu9KCm_uT!wRc<*N z-3ko)WVN2hGXY-$V_zS~c|=1@0-)+V%Jm2theT{j$$vM=*B{q)y%*b{Wn7Q%9-@0; zY-3l%tpx?GpiYn+Mm`GrFbM7OG|`kVLx3Ub{e7=~iwIBB=9!Em8A<#L5=CXyUZqBT4~xwT|Ji!8J721t|b z*ylJjNiFDMG|ob(kSxkbx==(&mhYN`r(O%YModB5STctl7i7>HGo)1T5}Cn0Pk^1# z<{tADAj2YB@aQJapP21W6(XoZ1BOP@-dhzZ?Fq{}bg$Kdi!a0EE`Y zCkPjmZ{1m!SI+q5=w5uAI>!oIC6&Sp3nNJ#A|U{10o`TEhhxRD;4TPaQ?&`mjPK=e z3gajJ*w~!oj5-(FYhSn{TNsDNj}yZ_)}h6}veX%#4~_6j-n_I9A)E3xnomWcO06r@ z7^*&$upP}sq#t`U@Rd%qy7b1xShzzCtCK;TDV!`#C-Mv=-+^BJvC58Snx9Z~2ot&5 zd*}(xE|h^EAMtk_vs4n($_hQ~!TwiDK;D>$drQd<<=71S@KB&TWov@bus#;${l@g0 zU1mcNSgy#m$v*}~uQ(Sd+o`DDAfZ{+H)_ta*C#t$iW9!p!*)pTaB-#qxIZ{bE6=_o zF1nVYD=nn3fey;JnaE}7HafAd`BNH2MN4WG+U)2+hmEYdog;v2oY#<7-8#z%7u!Uo z#e*SN5AqYOiEv|N7!iu-$?tLtHkcRazpF5_707plql}2Y3+C}5LIY5t;MVJmtQsd> zOBch8#{-mO8`JhsJOS=DlMK`LOa6Ryul@ayk%jg)+q3>J40fAU+t{0NWJSTfRt_&m2?7{$cn0phd1352KAhlga3-3&V9%+KFcF z7WAkrE{zuMGwE57js$5W+AU$oYPv;N9U$sFdl9Plui!%KB$%=38nh$$2A2YacdQOK zEO;ob*{XIeNW)gXm@`&;qe?^RzQPM&q~{cl)oSKhe!O&2WUY_1lfB9nd5m@hp3@Ny z1A+MxNmih}2#Xpx_@GOGTOOAbMCX(V!?f*EdA;UpwQ_l2U;Dc?y_@R*d`)1u7x++1 zrtz1@YZ_08*W3Wi&isWME)m7A)a$(cpipLFr+1t@0yW zQP(EjD$mu5kJF^Gg6MI_k%#zEEeGLd+9w=VMRa&G!8cv$kazWkk>o~ksoaxRYu?~7 zmLq$DlbN<9uZ*z!O3b+$6qaJ)AI1UKFOHfB(t~T$@vKXYl+jum`(|vn226`Mszx+(sQ%ycmM zo;)G)_zgZ!ekR{`1_fo3)E@8H5)}he6cv$4ray#P-<8cT8!@5?!R@85_W;bVd5wdy z$TSR)+5)GQc@^NWUO{KM!cg=5xbG;InVdLgy-*$OJif}LZ7L`ilOn+^ILU8#Aof)! z`$g9dL|YnqZSD920_&8NLU_S5KPeaK%5)(^rkrST@W#Rzv8Z0E*z-JhE;cFGDuABq zJC!8L?@}1a?F2<}Ws>`b479Dpbp6M^u`uRemy@ zZS{wk+B7cZ3)vYxej-NlH@Yd4Jv?8yQD{T?KFd211 z%$SDBn8@p^ZjvssXBs1;wmm0#1Bm8Jjw!ghNzt*ymGv?;?jXK1A=nh67fj2SiOfR- z)4*!)x-_bfM_giRb&{j)ZhAq=qWXc<<4PW!Mp6{cOOVb?gT|&cFzdf{QnQ(7uHqiW z#v4txyd?MZmv#Lln%v|_Gu7y^fH$&?iUk7?={4$DDwoBIbpBh&1yhLhYxq{Y>r55y z`2Lq}Y~^)Tx-zMQ_X7*CMXjfqy1F}7_<%GHuVMD_J>8pT%ahoR9+MKvuHUO_aoz?p ztVNU&sc5n(@5sV~_@)TH7wGvggMk*4$M{Ejk3IV?u0;=6Y z(0_-hHVdL%koiZJ<@EFI8&*5&BFjOQE!ve=jbYU8lsO8+H*2i|ll?xEX_*dGE4X*|* zh>IRwNo0}t#bW3>66JI>{tHMD%Bk4f`kdPMNw#eBq3QBIDKv2`wv7SJpsI{yif-^~ z^}Beu$(dw@9DN3X@3RRyE2^FvEL3+l?Ab%gMW5}?4coynwHeQ8HFBGfy7eaW-W~tY$W9ZJ2(2hIBmqDqfANb zL`nDz77BjKk&M_A#nh84-CeSHp5>vLn5~WGqNJP>MJRA#S5>K%w|N;a9?@WKHtpFU zsmNal{gIFEm<=tBeytu(x3>=;hMEMMr+3r3$*+fw+exg;TD}?`gb`PM#tmKg@_E!7i#Y~MWkEoAqW0?;d<)?=DniuXJZ*6F=I z;IsQ)ZKFO%n&>A6qUSxkoYdoX_VW3oyOuA-uN$?@NGb*Em%~{2T@ur=O6>iQtl{1i zW%{Fwswd^?)O0#{V2UJeY{@|ud$hXATwj0HX1H>xmps>elnA_u=!hBqQi_+?%hiSF z_1(>RM9+TpfZpX;tP#DmQ~G3y-ux#`!-yQYe-b7UW!o*&n6KUSg)~?Ull~BCJwk#R z+XUWqn9MeSHscx2%Rrrb&Mz4wuhdFirF2_My+=n~n>36=NWoVqHiVL(s?|7^1k%cx z4A_vLOHAl5wC3Z{{yRHVbd(&F3$?U;NMk`say9NZ8-r00rMyBk+?@=}|*^bne@<0SedUoUZp`s_A5h$zUIO;K#vgj<=FP|CoT3I~F69J9;&T6!UxS(C;wnX|$^BBN3+bCObao~RaL;e=O#pJ3CFIamC& zh)e&cA2YP%hmN9^j;Tw6!Hy#E&Wz1D*<#dR22Q^!j00o%C~DT?OW4@1<~*oLBRg(G z;XD<}H!fviVtX>JxpR%8Zx?ao*qo0eS<`6u72m|9UdSD3}p%polp z6H|@3C0Wz2$XUYlW6y0Z|5h+$Qen1IrfD(!)Omv&u3;otlgpY?!{-LZ*N`EDO3X8f~(mSj)Iqb;1{?7`Dcy$Ld?-=|&!dzOG}TzR_O+I;5PI=&I>Q-3EV8 z%fwKJA#TkWLuJI{9eZq71AxmXfrxCTa|6d~mWK6s{_T+P1+ks&_49bf(#E zKZhUUTNs0Gi!byTy6V$vIm|5dUk&JxfYy(DEekHNg4%^DFJun3KZ1K zF%ow%){hhJ?~T|>Lpv3>Udad7V#4HnM6D&>l+!m2B0<{~!c+Y@ti~bbQ8{dT1;cZB zC(qxPNva3y5hk?albT=w%wcxrF>x+%HVB$1%5LZqRR;D3>Nxc*uK#EeaeGS8a(Eg$ zMHdK^`L|_!E5e*IuQh8s)UvtyxkOUO6e+tF`g7wv0Roh+ylb6}ZV?CJRz;{dZ4K^I zr5ZGd3v`5g3}s9&j23IOu}i4QlNQ^K{= zG!tD8E1?PWgv}W6(>Ho>X)7kInt4fUZ-RnfyGSv3$DKQiN?*e+$%m4_iejHFkeTx2 zwkjfR6+g4G)hS}9WX_rvXKiuOF1!$7gm5ujvw&tKtGQu^6=5Ct-DxGm* z=-Qv^KB0r%v`kIL)?1wam2UzunwA-qiJ;2vC?=JTY_@?}sSLOBNmXyS)JZc8v1XYy z{E_B+`6GPUrM_)yu$0v3M1Lax>9J-H3U4ow()KB6V~?v^oZSl&Hk6K@vrOLI2Zkyq zHB1-{x07o5ay+%XQ(g?7KXT_xT|BO!^j~s4F?F>WJ&##!u=dSJeU-3%gz;nOH2HX? zPnx@LNpu=%usAv3^&pk-(AW*w3L`vHXZmJmDZjp|7Ac4860o7WC}ci`+DH&2UGG-n z!T~2mOl}CXe`d;nYcwVmsxYWbsc!vc&FBiA*;2meiHCA`PaT$}Hf~Mr#bjjm1N6wXqc4mi?*sMQdL*Ya9y-e8<`!F~o_rRKLwD@BR@MI(9`xAkJIMyMvfC%kSDfY05qUx4Elezq@9v6;0 zfoW)CVPtXFuVVdqW*?z04}JNK1f-1$bk$lh+U`63RJ3#Lr&IJn9}a0+JNmu%@m-eD zROc?EemK?Sh!R$E?ZbJH_Md|ptn4zi>v33D+--r0E0_S;NW5R`xKBhKb;hK34{*PN zC+P{_X}qLD8~8b2IGhM&R(uqFdbU`Qb{WO-_Cj&1LUGV-{)pYz>}IC^O{R>$8a9xl zP1fTuSnZ;MgLiu!5dzYvFsD{D!+xLL#SHT7tWU*++0atp966MhE0pj?RcJ)9mgp%W zR6AssqzC{0_V>|wLu!d}OqIF-jKJLrp(kZFUSwEgzuZf{9yg6|d$~Tz3&{Aor<;21 zlh*gC+oxr%S-UuQ9hrNiLGVr_6R@4|$w(g+o}AbP7!tW4%rSZ6bDrO+NXs zOVw_O8E1bKBU_?p*aJtB-ifn#Y&%rr>oV)ji_HIfGcqj2SBEq?C^(k=7gH~*E=<+d zAQdXaI^7iIXZPP-LoVWeu32ze-E_iXn+h;~06lJwA=rcJsfujLeyTwt^;FUMTUAMp zUQ>t!@L6LW5wX{zWh8DtP-{MK;6Cy+7@PI--^-a4HXuGmp$@xQSKVcDGlsGr@lo`q zL&o__oI6xqh}B5}Y8>&Ja5xS!e%D98xU{%V4gA8VGFcx{1KbY`ex}@E(wZ!#q0b9) z9nh;+3=P5!=5Vywr&c1v!cDTv(?j!aSz(oRJugdjqF3y+Ik=rg{Lb>oWKdOg+UhGMzPUP1`pSu34&{+h*EG;-DY z#JYXeG#*L8ni0QK=$Uc`-8AC4;r&E9sqk#3k0)*f?zf{H4kqqDi1U)$Qhth7bEn0Q zar6h@biPit45$b4Ql+X_rIe0hIJK)5$1>r4rSqBTQaFiE;U80QIl+_toKJ=GQQW}^ z$k0o82QEYmC!S3-_HlF|8oBc1uSCJxDx7;7d_*;=QUCs87mY7uqjOd$&rfB0RbCQ^ z@$1<+tiqL_v7=LVRY)6ufJLz~0TTG!p|G8oQ2$m(TOd(wsgF+{D=ArbWk;~kjDa!w z@Kan6+~Y4|Kh>};r0H`pF&Z$JGLuNhpkGMQKywAOxP;~Mq-dFHBWiM6lGk9QoJrh>8C#Iaw?I(hO~{L<{6XdYE7Np7QGM99Hc||`IH*2Ay-bk1_?0L zWj@UA>YB+TCux8t&?y%9X4-W?U_w|d^>y+^6JtT-r+g!5A$q}_?Y6ly3toS>BXbuj z`bIsAS$)e6m1b6}CX$UcO^-63PqODf3X(GHh>N8mgeeOZHv>Smy^@bXlZMcwdW|N* zsW=+X(z`tTdCel$!>X$sb}(XRD@hJDEmL{w*aJCdtG_G zg)GRt_S!0@u00Mo0Xfw~*faBNfOD}rRAKpnQ=Sd;j>G_*8-;YT-W0_ex#I7f2@Tx= z_84nL@cGPq{y`1u>8%nsa&smKyY4nt*B*9pP9OA;{1F@ib@s!uZW(jF_df=WA0)E? zT@-#G&+?+@ah2yYP8AwsJC5c*tlUhgi;ID;rn{9Di<#z!aN&hj+No>g{tIodWg&v= zR*Sn_^v(oB6fANFNc8!fa!D$Z@|vrj@;mz`Tsf07k#J?o7Gf**ArCjv;F{)kpE$2~xl!Um5t9j9RRgS&hQ5aW$NMd2YZtsDkv^2Hkfm;-VTHblzrRw!n_0 z+x(#o>JSw2YNDwhrSXV*`^YPlcB73_&A@N2(8)?()#{k1!+}<4-Un-dwCJ5Im`mZM zCn8YqzZ44kH{VqB_WNSBeKaK&F|*acAOaWR3=VQWX&|dx?^OZxB!7Qx%nn~QJGvNV z%a%n}Z$4S@gSrLfb7CUKVTRh7+ZvNGXIF%F#Eqn2b>S|^B2F@wE;ZyPdfR8yriB8e%quxARMqV~&-KN=Asx`#vF8ZcBdS1Fvsn~GP)qun#9 z*g-^886jxBi<{`)lUKJ*_8>g3rASvf z4x^chNM>y5Xr!bHVK4gTkX?-lKwl@DkEO`|JW{QBx4$r!mrc_@8$0v{q zSua0Cp8=??o@oRbL^Y?m=H2@j*%-q`Ayd@F>tyu^4_ASLL`i35jljLEPulA%4E_YRcwy`u4t0JA@3~I)F>h{ z>93u;O(T8dL8G3(9;g~&Ao<$7c+Ieb_noYCKOpAKQc(H+1{kiuo4ZrScf14~`&_#w z%-S?4K2Aj&0Etw|Ynx^k(KRE7WD&IVM|{UQWc*n?(#||p7Do#gC0`g+4SExM0+cwO z6c93fIpqmb+YTmPJ*lZMshr&0#ad?l>D`X3LTIp#0(RzmH@6w-b;_a_&k&` z$v>_~33w>a5pI|~1lc`ki$reC<1;{BIT3Erj@#sUyxrY|};m?R8 zc+0L;ZS|IND{#-o+P&(j0XawSG=NY%!A=3o_~T+Ps9x}%Zn?5&iA=P+p+$N;@jYC^IUml|VwK>lRQ)S+whpUG;iFTZqkx|}|;WBP;{ zctqWf@MSYYuDz)yr!bF+$v!-ejJEJ$LBW*;MuM{vpzA7ltBogiz(`&1uqVm%t_SI+ z+Bj8(#-4Z-yP2A|*Yb^|TBGDE;i7>t7=}~oxBo?wb;U9$+I| zL_P4&5`B$&OKox4#ET92xT}ajT1ju=wx<)rHgg&5Ypw+ZMLn$fr9WUs9P{ zd5@tIA+f;FYwFUg-C?W_0qEqVaC9!fXseWd&gJRztZDDv*<%8kJ8TINKbA+EVNFE3 z;XZ>UjLquOHiD|6$pmTG%zB8p2Ijr=)n)e0${6sP(j}|2(@S2|{8wGUMY3+dMUu7| zW@u0E{P!0W_g-rxl;nx_`1EP!*p|D+TAkK6YipmMi zzKh5{X6ia)u9tWl%EYw~52S3hzaz_s$r@y}X9_e8^(nk4k7p?c?!awx)GQh+bgGc9 z7&Y6mPcFLJD~)l6v@?CPrJ!juls8ZI&|=nlAN}tf>7;9%l?!*x_ZimdwLr6gvr-3{Ee&q_6yhjVotfY`7pU`Ru7%iQWDv&a( zPN+&{-ICo~#n0WxXCvpu*P@?JL+`S-Uqko2+IiboF{olo(T~8>ttsF6t3 ze*Y3LzM*8zFwmS$x|p^jjmn|GItdkLhI0?pv(q74N~0T-m3T_or5YwNVO=raJz6X< zHDP+j2j`q_C6aLba-7fTM5!T>*Tu=?&IJL+N}m@)@d_JpPoMf|v`EjL-Cq?>?TM2v z@2I`3h*J>+M5-qLqq~0*ZbpgzTO3E~kLCEe#J|q36qfy0v+03;U534PGp=4Lp%pxR zl4-^9E1z}cUa=LOSJJ@lQ}kicyP5}BO3AuU4;9n?(PL|l>!-u3OFaQynhs%kDQAy| z6!L|U7Uyc5w}&&M0cZXTR9it=Ep{{S%k@kDipFW_A!|G>bk)m9akJ zyiHuU;`JJb+NzE2G&M|dt5l0>b4Q@{b}nD8uBRQoHGc+qG=2;D`9vZxUROO!{7^*W ztBG^j^MpgTQEIcNK~qi#663079v!1ZrJeycODEjjv@xl)o%7kAIu})aZHFXlC(2hs z!Dn4w+Vpm6Rni&61aYaavD;qL$^zF{@S>e9nLN`pQOGF>&Erws5I^LoFG?K?(&kSmrhwcC3Gxv0&rXr5I#!juX+pFKqM3|+a-6)y+VCzfdtIpHytMK#rfx{)Un2MdBxkReO8LT*50CD{s(h9$khv_Y zMCLAnvVKLK7G>{)q|r0^pxd`Yo1hPcd_hV*no4E?Xjr|Dy(B45=B~nCW1xn>kc&GKT)NI?1P}zM^V0^lO<3ou^$e zDYMgj@|p@w^Pg(pp`cf52kJ_fcr0yjB1Nbd+nnMs@|3=qK3S?!>6a}uU03<$Qq=tG zt@4(xPyZ|bj{Ro9q1db5=owrZa~BmVdz#Z3x`G+8-;cE~cyr z?0r)xt{xqQoE;Ebt!B9z{GW#JENzEl0?J;ewf$JH48iMEG+*-ty4L$|B4l{0P&fxH_3b0Jsoer7L)21y8?&zGT3oeKP9jcWJ$b|EXIWFuX`e_3 z-Ni40T_UVlC;l2{7(ZqjGx4U;agZnK=O=FkMzu(J<&3GUvWX02iOZ0U2Ri|E(BMxt zuS^8-=;MH0K1qJkx|tZ5%8+UO^e0?NupY%>wjc1Nb&GEr++N+PwA5pd}ets1PvY(iTSUsWR@oyNXj9SIYi%~A)?s}B{$?(OZ;bW*b z)z2d_NCiM}D?&Cv!mvQzV}BdU?Rgv`2bU3PaDSGhD076b3Z;VU{pvse$o{tkt-O$*7o<^#cP7G{e240W*A~=}&*f;4HNI z5gKUq1&P|4^q2xo?E4_{`JhTR2`cz+-A@7K%H!_30CWNJ`jrpiMh0b-p4tFlq1Va| zYXJVoM%b5;Lk+x2GY(@n0M>9)UVNTyuH5cdrQpjr9M60PeA*lrfNEUA^DCiyjAZjI z-}(m87<-W*YM(`|kmA}re9Bho2!Q1vkdf>`-oMS`rTuI!4J@I0Vn@H?M{2UP+fM$Q zzOR;&^EYIff%(j}CH%!lhr|(QaF4oy)$OIDi-J6~i745(syj;1>&z`FrB~UK1_r-E z)|nbR)#jPvl5Kx?=jvIX>UoO_$FP#Ef@F&$ja zWm(XoWNqF8sujYT>PUyB&X>#&DVr+~f=`FdcA%XRXSHAW87K$II3u>6d$cCs_M&}c z&Hpg(`dAW87fbX__Bj^$+zDmCA;kZ8M zw>syj+BfOCT+E7B*AtVe{HnP$QV=^866m0Jz}qY-K)RXlr1y8_Ekg?cElWImJaF!U zSmO!qy*HXdK+nS=`O~2Hg|U+;kjVHq)OqGG=H4zHUf;lMZ8A_XEdcm@6iNRfAy5Vk zm_#-;(`m<}?C+5toQZD~H~Qh&7=SxM|9RBdM^LU(`$rPkr534K!G*4WRdsuh~Sid#5iiz*gos2?Qm}2fe}Z;*Ed@*On^+xo{cn40Rsuq(MRaG;7zJS_}V2Gf>FmRRiece$vLzS0Cv%|A%B4 z{o|KG*E4Rh2?i3z{>re5eXuQ*-gmBtx;?F?OnP{_j4wL6@Ww(UXo9u<9S%(31?0%d zH52d_a=P=qUWS`cKp7LeMo?gItx=Gq2qIBnAZYTR_5!_g)^{ZYQNvB($EYPk=_gHM zbkB8YzXS7;B5R8BnffUqBj8ka(tgI%8_e^@Cl8@$j|ww{a7QR3BA-fSL0q#BfdwP= z@Y7T;2>vt0pd&cBnb;d;$l(RXawI;k(VJB;lL*sVa%shPMDwyvp}Qi^*1HJ_$-C^} zocjg^_9^Z_OR?n+Nh1d>|5qhhszjf5S-fE0e8p*_!R+euG}HPVQgK`Tc(oYXW7%1~_$-QCQENHiXdoMcmY&L-8G^CS5aAq) z{h3Nr`|w{=NeTaXU;L}$Mu3ILeqXL|PfvL`sF8p6_tApP=*j!>4qkj39cu)tri?Eq zOs{--ng7A(e7usPL7+G(WCIIN9t#igjpHOgR`K&slH>99H8(~Ro2Ge6yB6d<#aP6S z3igmg+;wbmqNA>aK&ALTxqZ~b{P}pd)yc3x=ZmJ_UgK*CEpl#RnV-HVfeZBA)8G0E z4+kDo!bNL{V%kPMrO*uTWqYDpv?Z>o;S(t!&;6k)Hya+^HsRbp#yCOKT@Wh0B$!sR zf+g^n>u=9@R;Un_x181olHEjfK5lQDuD+hnUN+Oi^0!v! zP15#6E%?fh4{g1{?9qS^`dM}SUw_?E=o~XZBc|+ZmjMf7DId?YC@mmAy@p#opepl# zDRWWx^AKI%WH3OSt|QLJ7tRbbpT;9+FAT`SE=tltmWcPsS<1O@=#{n7Cs58~#N#)` z>WLz5Adpk6#L~pstt=1MlBYh-AL}kK-h>b7QHLnNNcnnx z2Rwk3iDf|!N{Q5DNvoJNhUAxUqRfg$qb|2b6w>)A2MqR&*=&K^H!Xv*(MQNOf!^9d z;TQK4U>Nk(j!DeJx#RqIA0v%ba)=XJ0WFzH%rVj)`BBHza+Z^Zda13&ZDYyio>^!} zI*2)y>%OxRapsj-8RNeTse#qDHk>x;>Sd(gMwoeAT-Ia~4#ExK0pPT1- z!#qJ(f%=ci6{6D9!K8XLtF!`bL}#ne*2uH8GARkbCBCI6NGDqojq(5&9b`uT>veDCkUx-OX znz&n9Y42`+c>S+ICY5VqfHRG9c3zMJPrXRny~StZO*`8JSD*nHebcF(^;ztj35?=IVEp_#>5EPduc;Ph%+jQ^l*RPUEIr5-eo9#_`Za>rC=dl_S&c z;v9U`ezQ+~T%7#pf3h&VUf+D6y>93IG$5rxQCJ?-HrxvO?GPezxe)q=QME6OXt?s3 zaQojP$fxHE<1-+&Lj3~;cLYA*r9s~8zA(N}ezYYs@|2&GaR7*w=^tSuKai?4Lp_8) zDL*QhdE|y)vYoU~E2-;&=jO@H<&5jrGP}OrBvxC^YL$<7m-R&^ziAIa10zj&_pY$L zqKqyzwr7RC!Ie_Mwije*i0zkCab9D7fFhxU>$cr2jIPbG_jCQi@jKbQC4{^KqSBtE zL#-ldiHRN8@p{GvlR}FWq|)8mzO)XbxucWb5PSX~-Pp(N!yxrXfz|Q5+;_PSaQMeD z6W}v2_VB;udf-(AoF_dtGB>JAyXDV@R%S!#8sd$Ectuv*M-Jjwr<6MM@TJN(FaXko zh0oh<<7->N&#DzfclxRO)fb{%PYz0m0K9{g^P@k1QOd0^Y*8SMxgq~Y4(p=|GC+IP zYXFPV3=hcD0wRO>zqA`RVR_#N-%;I&=7eQQjB3}8g!_v*6#POTxBSXqNS%WpkFv9) z#?S18L{Kni08Y$$mN9NC#WnX&-Dq;o8BG>bI-Gez9*o1$O%;Q?9IxK=m73W#E{~Xx zYMKBO=>P#uz*-0mV8$;W`-6misk#UEkK9*5_OVEaXuypt=v|pu@=NpaeAzqjs#~dL z^OVXrpRG&ZVOAbe<5Se}_}kc^MgPStpZq?u-hzt}D@D&uP+eOwH*^l8@e}_NG_PsQ zLS#7dMS=w5w*YeB#22~*jd(sqf*c1j2E=~_&g(jRCRq^B0q<+6`VJ;XX^h=%q(lge z<{+eL^InLu5=rQTC5U!lN+tUiNKthzg5M>AJyW_R*xq83NEd4tNiherxjh!hNhO+2 zkh{pGUhpQJB$@^tSC>6e8dF`M&x8Cu2Y({wiW;>3yL!AOpx>CrGXINy^0(tMpPVJN zsg*7v*CEVTWu9@s!V<$!U9N3OU6Yuuz|p)v&j!)YAER=wxGcRkkR2>#Fz3qZp9~_|H@fRX{dA%)ej`|MnLqd$`ib+q z9iceX070@0Ya8vW;7E0g=)KPwFtP`A(EEeZ)^D@^KkalhZ^LpOCKp&|3}M89NGbzi zoPuvAFp8ioZ@tkNg6ZD*#C)vJ)V-^ucB%WVWKh)_PnnR`sTCGq0{6NyOcnSaW35Yn zC}!TP3ng(mbHTjHhqZ*H?ksAuEO)tBAOV@;3w2_F?2HXgn;bVkmz6=H<*ppDbwWp4{ zom-yPh8+*VUa{lCnj;kIt09s@Ge*1(tIYtCx_OBBi9eJ+dF&ll(dmOd;lyWIUdk6p z8|dt%JDxsAjp|NF6&t@UkAdJY0w&WG&ZC|3u$A}}v{%``-#N5#ytBs6^ao!cTD;=5 zInTm3LcXLh%`cs)-J`Tdu~$di;K0)p5(VIXH0qSN?84KWR|^AN%%*Ez7ll?t%Px-s-Q*>Rgi}3c{x%^IjaqMC zGZJl8<~8Sp(`JYWp(duP!;Y6JzSQK0HqJ z2|i-ncd7f@`ArB)xg;KOjWUz#0-Y2l{E!eh@wk}$DEz`FsOTQ~-DyeH+Er(#7BD?N zi?!TKZtV1bn!^~(tXh0siBA#b&~wkL$vL=Gx^JZ0PspFGr-0fz(f@p3;NDd^K--l( z{^Oum+Jpm;1AFR+ryE=_VUiif-}W8zbTQ`u?7Ld1=X%^Q{)9g%&polEM5JfaU;=06 z0qs6;E&P4LxM}C`v9T9B+Wd$q^^R7g{|LxQ-trh@BE zLHo+YGN2B=ch+AnsU?(=$xvDn?U?rQh*YQ&aEfUVnC9FLPMs!g?IO?-mQ3etQkHNB zYhpU4tfd2E#Hg-AQ-LdkL6Ro=*)HH27kvP6S9s`sI3sY}T3(0qK!N78J9-WWb8fV! zG2rtrpX`MIH2eCp+j^OgV`a%Nl85{c5XoWEgF(1`cl|8@+POLVYfv+17vQ^L^t2Ge z#rAf}<(gt(lS2abV{(Tvnt~86f(|#lUk(VtY_QoYpwxN{U0lwc4+h!qip9;^4BKZiHKyZ5_GXCF%{a@mDF2M9B0ApTEy3cJ$E-^ zW60NY`9AQ|;_m+pM+PVZf9#npuW!7t*M6m5w$iX`KjWg`;`Xhvp=0LaUOir+c0`lG zsQdK`C#kUNV`RTpIQD}FKkKT^!@yAUNSdB7*)(3|!YZwTFT%UPR#3BeL1o*WbFb;a)1*Cm#Yl1YjMb$wWsjJ1H z7zcrefF3Q3PlI|Vz-M2WO8rfTNU;h_#-KRe#f2*E7|-iv2I3j05wGM6|8-!#w(l? z1gJ21Y(Fx@aGtqjQC80@BTJoIzIHyEi7c=?fqn-xlH|;|EzRsa6nyq?Z>^sTKlG*D z10dc(j)rFe15VecUn3=gEngzGx5A1032qB+C%XhZH=6@>&y*}zubkVU9LCe$vR6hD z-Y=6r9@c%4hl>5Jg|C3v5h~E_K}7=H+Z<$N^x_J2!x>E0$GjXz>K|R8PlYj)C|Fk@ zIe`z(p=Cq(YY%%L@Fyb@F=sL_w>G&c5(4$b0*~?}g&s(IY7>xf+gt+jHF4c;4153i z77)PCe%N<Uf)0lJiPzt+RJC9EA8Foi^>c{K&}Qo9f6U~mscQwt zb5{dUGFg}O0rbple#mhJZJ&|weHV5%etqp0h9q+<-&n&}!Q1TZl_r|cfYBF}fz!d# zZ_vYy4Cwo~>cF>RK-c zW}&jt#~c!SgPuzps<(xp?SdDfzLiT9L7!q9?#y_}+kC!#y~diyp^cd8Dd~||uJ>IC ztTs=~jUYQ+LRIF9L19vEL~64~i#>svY6DwpMyfbQBcZ76IUb%1956!q9|K?a6LA(y z#~~C=2`KC@7!x~y*tzR#j<+lI?4zC8@O;v)bMQmgE|R5;2}9*>x%s7&KtK{_L zXb=>dox~LN7jmgBp`B82^d3FHqM7VcQZ*xDI$lFKM|>#%Zd-g9bfWNP{?(@pqWiku z7c3zAil`EB7uIy2wV>~?I$QgkJY4(SUpm}qBC+oiFhg5HYMl=~;HGFJ`D@EACUf)d z=wjUlDl6+ugK|9nDp0!y3BQ5_r}rB{pOofrqKtvLri%+mhq#0Gn+#5!6@Gy13;L@h zXzJ|R>k|&GmsDY%-i61)`@ZKd2csYBW}qy@k>M|r=Lo=UAMs(*N8dl)=N2$+4}cX! za)F%&>8n!&(J1Z8AiAlVl?ehqARfsE)yKubN2x0HUw0>emvEP#ORYBI*Mbi_p1Oim zfOO8>HnV-FrZf@dY5%ge{*$f&tdt_so*7_eHW0{lSC#od3}G%gg${PmJQ7AvO%->zUPO_Fp~uSSXrsV9LK& z{&-3M#7*v#c(00GpUkLrD%vtNs*##{17q4lx_q?lw&M<^`h)82&$B$(o;Gv(I%naxHVA{)2P9@co@!!_3p=3a{fDohC*{F4#;Iehn&YbUdFH$_1m z*mIza>zbjO4r%>FBX7*#A~26qJT^VVQaq5QI7srUs1Z4Y0{vO>5|D7$ zTn@q!bXq(v{9+%P6`%D-uAw^Ayf@y=xyq4g^@mY2AWEa3((L0de1Q+1X%y7?>+3V% z;+NM8hA;$8uM((^SjR33Rc)WCU2xmp%wyJSzM`8=VY;J=NB8M76{)RMiJV)e6oNge zUEfU2o|#m{xjUCioR0A2{r&UoRUDb6FQR=HVHM2VwRFl#?VllUOsx-~#c!;}wHUl_ zlys-2|3*&{x@?s6Hv#c=13BuIf4dE=*Yrsi% zO)3{meQ=&fTYizCC@z*LvGOTisiP}{g5?n~wt;6y3 zpIl3LF@WGS#B?`aGE-SpoIFDM#BrYh4|pZXo?A!cIl;~pKW5DolCn)fJ(KKZgyRjy zICNdl==0x2zDf(SJ>neRs1!9Ig&gIhES{2S-^0{m{S=#`&M3ssGpm?`tjEbo-|D#d z9FWx_U{_X4o++MT_l%1zfZ-_KZ^O(?Bay(>(PYr@9O8M z$qANa-AedwzF+qToTi*Zj^2+wnziWIUsIK7?ARC=tvDeG;VM2ivs1K~g(zYirPyvor$dhapd zsS9XI=W0~|lJ#naa#p=ej#%l3CfOJm zUG8qbC>PewrpzI8ZNYX{v_J0C#{QRWg7(25n&kiOneo5+!{Jl>_eXhJ+yAb_Auwif zU(RC~tv-u2Fxx2Upe&|3HT;1RHlp5E=dje7uz=H6rym4sXTs02GL3yRQ{}^$_BfOz z#o!SAYA@+^JR?EAK(=bk5?^YYGzX#VjWlqixh5PKt=fx~(1`NI^d{?)GtZgqN|k6% z9j7#xZRZHXC~0}BqjZti7s|>K#Vfy9cE!1WC!-E#-YK|4D6<9HzP~zBCq?cV>wKs7 z*jhn?L4be8n;1DnyszNioa@#KAbOvJ&JX7rz%93HuHszu$ ze`}~J#ccP)9?Vmu4gVK{^2470^``x)$^W0u{~qgU&Hu%L%IDzte1X++eN{cY563sv z%vRj~KvhP6E0(XdU*+QJS0^M>f+;ou)ixEYI1OT@5KU!v_~DUuO2unE%;^;SLl&+^d_3ZO zl;zBp1*_8$h)=A%{HgI(qtJ&B>UD5o?9)(t^&X=CDWh=TPhw5BDssiQZnX&cQciOF$KJvwpkA^QR6pYUwu zkMQha|9Q)lw&qr#UH5;6760$yXz+CZ`%xZh|G7qZohLlm230vJDPT4q9>ZI=`!u%Y zm>RxfzTgDtic+Z47tE?!ez(&#U!!ZCI>KgnUCX!(dc%x-xjnHRk-vN3Fh+?E>qsSg z^z!qeFv?t}jBHa&nLv;XuP{UX-TSimyZ665>5f1+joV>0M+G6t%*k=rnCTrh#!Ppb zCN(@USw~X*Vr#+}P>#b3K7?%skO)ztzGi@vFz?W|FcAL;=22c?x9_w9@Ih?je}<3ia9}wEP)S6W>OeSN4&2ZZsMy z{pRX0sX}eHN_mKv^nJH{#~U_4$>Vz32hAQq-kAEq2i2c+k(*wiViAznw^^)e3PeYs zJ$wNUOD{!I=$X^ol9so_Fus|prBPZRQimg$K)&MpSPtn6aLBk1D|E!X{+uxDR8%#F z2xXo2TQS;X*gS%(^{ZE5?3Ir!3fVJ$a=^ClGEMIY#5hgw)*0|NeGho@60fJW>y6Df6YJhGmBtEZfFmID^GM5|u}bN53Tvx5x5}cB z6w^}OzF4fyQA($RZ|gj++;BMUcE8-5ez{@(cmf61C~y@l*cCjqa16&dxf`) zyx7v%*+sHuJsb+k@pow)YLPA#KOR?M-9N^be1^NiSnmpXS|L{>hS#jPJ>)E2-X%J+ zo&q;RPseS)Ry98*on@7#FVjVeYdR%p8R_^)_cUrZx*kQ4b)xJ|<@(i;)vt=Xzf^QK zvMk{SMlri#PLv0pMYl|8Couba@@4V&!~_M zZ-DNbgX2Q7ARHHdz`2QiAn4h2@Hez&1Mv~y^akfqvMA$AYfOefyhGbMhVU|Mj2p|2@(p&VTX5^*>pRWv?B8D98+&5}3=Xtu4(WI$ZSKG54J$lAbqKjjH#7iZo zer#lOTKlGteZ#t{i*yBJxhut*qt$(NB&#%y7vh_U?7bS|_9Ptso}Z@jANkgOs~FZE z&i|)38JO{Zhr|9;{{KgLXpWV0c27&a;K3qz0~q9~6712L_(540@6!A(PGRU58R8eX z8<}5?Q=I6%blpra%I7dZ#W|NiX-hP!6{&c4T=<*5A0&|{jWv4YD@rj`u`1jmHj_`%K!E#56iI>$LTxpxAhEh8yU~| zk}^AJh!Wqq^{oNW?n+Rqdz$bh_RrNyO1r*jU+h!`ka2I(5PX5+!w9o1PqREC!b@rQ zqwaQQ^x9UvQp38HonqHxJx+3>WZ@Hn6s6rw-_z~e1zK%Tex9x}8h`J<`hNe!vsmMH zj;ODPa^M)u5QbWlR#lS`{3QzR#yyrcRNCd=s)@YJ<6lXfBe33JJC;^agfa?;-ApfQj@}ye&?Yv zoyR7Yn?Nd=@y`hm|18S{eW#~9nQ`NJqr~p4R&j;asKQyn1TIk6nen7z;wNB~?j%ntVNqNKSp1_))r-QsrJ}fc{Aff?(tJ8B zpk9DOdAHf}S*Q){ljh5D{Ju{wJ&)J@acEVh8%+=Zwm}cHr{AuOf^GkA?Xkgq1FqM9BC1&6b%764JO(R*)&6WyafRyi$W|C!86kY=V=_HoCbi|wLoO) z+ihksq$v65cscGjAEGQyw<~!RYnXywRz82w!w9(nL$peh0y*H)uQ#YQ*aAb0=IfXO zwn4t(1#GZ8HP>n}fM5gTCMDU zvh&K-2{Kp|@6tRh=>2hoLKN1)4pD}Z5G6rGZ>R_`ew6%^T2ty;%~2Q?_iB(rXw=pU z<`E2M_iBy9FxzWnxM{clMM%hpwEqqU(|#rY?_m5C|Km{}D&5>`d)xWmrV@iy5fV8l zO_Sje%LFwccfG5vwJuO@sdAXEB3x>GtfmV^+>3#)hL6D{4S?NshIw~*=$fdt$LtkE(RKLB90xUzSl%@2n z_m*Z9fTf$G1vC?!*(58K${U#iCzvED9b4Kld&|}qY?#RT)XQr_&D%V3j4LyuYeULj zRYsG&ZZwdJY#EpEU1O;LZaj=JoK;7$(yR%-W(<|ez!OI}`Y^_DW*x<{rgf28KkK7w zEz)+RVUwlnZmHSOm-X!n*^W57j(v5k@OVq7&Li)dHx+eu$$2 zQ}fcHNP?zZwx@lq?R{eBeRaS_aL!KBkjqn*eC{R)n0%0seLeVT7~x@q?CiTkkM*`?MP?| zxjFfKMaPj|I*nqqKp~((%_6)dngV){!Mi0&RCzYyN5=|f)ecKp?Q>S!R{&Q|*DP|b zo8Fj^X-roR+OxS)^Yux4S-=ef#X8Gkv_c7n@wa)p&I*82K+l_&EEE zG`uk;$TBMSj=k6yim~F(vW&c;$?Zs|7IG>qK-w+7vY>7B#ngd84-Bet_xHz--g5r- z>W5uhLlm=3KSypf0{!09iCd7aW>LaiIhZ*Y#<62z3qGwbm;DL~aUo#Uc~0Ypz|=booFOJcy=8IWQeSczt} zrNO>SV$fhs40bJw!F^Z7z_k)IDaAuFr4m}kFuT(*@)h3f{vp>8T;p^F zaTLHf-qKdi&#vBHzPf$;^~L4Ow>Ph@f4n$!lX*Ve;}#`RjXXY^HH1hp+%yD0Z(9&JR7a2627pmin%HAx{)r=Y|IspjxvkyB;P z%rY6*5jX^QQ4(HIBS0CxMK7a*I;>n2eF6Ht!H7^xNh7ULv>>gb*Dsj7@1P=FyU@|k zY7ysO_s2Qg8{3`Ku;dsLqKhbTqTrb%vKpATUZ7O>noE={>7XV@^4A(=F|gEN2x?{m zq3?CtVA4R1Raai_R3J5q0z9(cyb_LsU-72&ZnSI(hM^~+RCQL{Hm=y01?9nJMojc8 z5dNvrDvQz8kLR8hRp4RjpX+6tpt?Ss@V>j+0dAQV_zL2s9+KNH5WYhBDxwJ&iyI2d z0Z1?E?W$X$#sY)dMoKiD<@egB`n+w*t9`Rp+#urZ<)KCuHgHdZ?jvqVB~gyDz# zUC(Ul|0hqvyKjl4nUzb--@;YBJKzrg-{Ej-#(y4p_hx}m|D+kvW6*+H2U&V0<%#|i*}M&wXMwyYAY!# z34--K!CKEVRu%DR*IZ|n9aG+8#ih#2f9eFd_PW*~d!wno97^TVlcGHuUE&HX!`*$Y z;nSys4i9f^4DkT~(F!j3{cqlL7-vy}F35X7M_F1#IL)`<)2CBMAq-_!VQory1pak$ zR{T(){1o))i_#!{%A|7o7RGV$eQc`uRDv9Zn5;l?@l29M8Prze>v0C^B~Q06ksyr zDkb&(zx?Ni57k5rFbv7(O(v2veG|nvZ8ELUkrzAygco&F7c{0LZ|SeZGDL^8WgmhdRC&*`nxZMr5C zpOAiDesi-KfwS}1#s8+AWJAe9Vv!yA_BnXA%&0}nT;K|}Wbtu2@aYrF!;r0fMv+)z zg+fGhF#6!ex(emfr+WN%G%R~Z)&P@gSWiw>o7QKaV!i;`mfvIvgUdIG#QapBU6<)h zr<2Z!(%LkW!)mSCM*Tob$3#CD>zV$MzbFAzN?5Re7+LAx@!3QEtK`sIl1D>Q3#^MyxFQ;OmfR{1l+lR#-uofFzn7B zLbq=zmz0+#PwCZZ;q_n&D2GNk2PN8%UI)X)ksbhuzQ0<>@l_f}!B!K8Se;CMEM)>s zrr>gcMM&U8O<2?lD(}gD5~4|3(}izKgp4|tDOI~+q zE6yNP1r;S5CEcbfdGWB^=3wD07GR!PhNWfO^sjI7bkz(4QnFOjKB&RTdB&-~q3t!A zm(}R*m+#BEN~WH&M;Z*KLYsZ$k4S~%s!LF}R#gv8c*Q`ZvNI4@-|s?PE!!4xt?q8b zjdy%nKMImp61?L|b(?RTwop*Ap`HQyB2l~sHS-Do#QQ6LsSbnMa?*-hR<;4b7=tR$ z;=v@mD;Djj$WRc?x3s}713|Pylx(6rO;%(?gu|FEQ>6T1r`;&oSk$RIvaMLA0Zo08 zE)&o0j1O`XKHF3jCjGQdA12)Zm7`zRQI103*}7M-fKK#yES-ZD%nDHhKqa)4I1;q@ zWhnZWGKFkHo>hx0$ggO6S=P;tfxekOfv0Hp^ev)|)C+;59irIEHn4K<*o{ zT_(GB8+)symSzpOH((W_nY6g_g6Gyhw2bDF3C$w!J<~RyWiU1FQHNc*E%~GykljkU z@dG6r!8NKUG5n)$ngyJcE9AHX@fB>ds415oAa~RuYic>5d!Mkn#@zyNm8)0 zJI;S6y=wfY$>1se>!Uo({&#S@q~S4`IWNLdn$+0;{DVdYz$^{b_%E6`EKO}J1uLa6 z=DS*JOx0Dl8ltd<+1cV5`VO;;#ZjL&*W4)O@+;Px$)l74jA2oT;MsR4HKSN$WK|qHOm*eB2m6Ux$SF#U>+`AQYWD#UzuGsV{K*bgZ^YG>gr|urbqe!y19R*mhXJ}m zc|>VNnuN5HQsUc60mu3$NP(p}XLKsvAz( z7!M9w1zOS1&4GCVAiF_leo&y>RAj#Lvltu-dxQ?)h$@zD1{745Sj`GEj`AEULqB8+ zLn=nV*s(&a1>Ea|J055g>_7Yr)>^XaFfS+4`nmmd+Q96Z)K=QHsaW&3C7&qUY0Tr# z;s_RuSSvs8FB>Ikh-5OAPoECd-}i?O=TzvWdsqB@f2cUk(l}jgZ?YW0@H|ZloWqE_ z$v8hgM7uG{%YX>V&z7*Cl=wfvvzPv#<5n?Xcj*89>8O(banO6x{~zU{hRrK_olPqI zBF}-Q@HbHRspVHm(IGF!#`-q;@waqBe7&7YA#~4et-))|%{x(plPzXY$UWIY7E&m2w#O zp*(9V0>6d*xBrj_Ugx z+lSk8TArPZ@VBSn_WY`Hf>VAah*uG+-o|tT)!6a_WnABf{?pTvhs*yxoJ>vs&*5hNj9!CG^i~^QvFiH~;r;8|PM)mp8nY?e4<)|G`uc#;dgU_qW9JeY= zaf#b2o8vcq)fQC-q}1c~0KG8h8&zc~hDA}L%Zin_9kK&D{*_se8}-N&VbKjdj*hIG z_!%AD+ik}3T2ZPa(=u@8K#N>*c1Zr#t}n5PRmmSKRN<~hb82hiv*#)5LJw3bayv6! zOqy3IZ<5{HH&Z~dZ$*Xzn+wE1?RHF>U&W;q}rS- z;)$g-IR;dm;T^D6-r1Y>(6ileZA(c&rDuaMeu-kZm1b;Z8p$^HErme+unO=*vPby2ehF_3sUVX1X=sgsFYDLu{x=*#CSO{=bL(r~2PCk^*ObPkET!Z-(x&fMg5VPerqfM&O9$pr!7<6ZypX>wdJ!|Zz%<;NgU<1!P6I| zmfEG8khXMW8Whm4Y9I@FO^8K=U=696;VdnQ0AK=&BPpd~lV#;g2sNPn3N#&kD(7g? z+zu0@g77-t5wistw=9htmZd{A3&y9Rq+qSxt5k1Y`a2Ft6d2+X1>kOG>{nYTtOI$P z!38yBvx4T^9Z+4w)nx1+b|+udk{P;>G&h0f2=5MW!dJs4z|!qon;IcwYyw<~aHrL> z6{xNxy0K`{a$i*z4f*a|IHFBc7N@nG>!$j3*EH2k)YIw2!#sQQ{}u+I9sGYZo|^uD z!||y9#Qz`Tq4uBM{J)VcNS-Sj_G>{9RZi~~0Hj7$zIK?pRVrDMZIiRBa2SJEfy!QGugmK?%K1=DJ^jv-lm{79h*f9OVEeKrbH6WgwjbVHy41 zMDs;mlRI*5cfSH}@Dk2q?qbyWT}f~tTkQ&aJI~Eiz#oOfr?62+i7_K$bPf+ zS(1MRvein=hKAK*e_!sZt4p5Mb;Ehf_h~5WDX&heQ4)3mB%>_V0Q%!pS&kMzorzmC zuHBeMs7djYwU!APy}TGIm0Z3)3{EOP*Y-}7x|P8Z0ZofvGf=yG!p;#i0wbK})WS>} zxnTzjHZLdJWngP&`3edwwY){LXlA*4a3kJ5o`&+j>MGoQ%M(st@O;y|G=UxR|9IRt z<^S=h_Z0uCK z9wO)zZ2AXxQ4*d4b_wZVg)j^uhJ;SCEJDiBrXd1~EJK!?2#jg*_JbUS1?yEf%W|}d z(lzswO4GY_2E0w*10F-b=wFe+pzI_C*4gQKEL`sL>Te7WiHR!)b*-h`Um%?-x?{h>fPyX4N1*7vHT)=P-t3>FB8`LFbHoySR9 z6z#D5-$fCx(h$AiVGnw&*lBGE&gv>yl(lUyvo1oRgb-`>8?w{c-Fd)%a#ji2D z;zh^UvIZVzlt^2h)t1bq1qt@y5fI?OZ7A?hpAiWrBEQMtuWNMh!5TH6Lz44(B?;1@ zLLwMMNuqXxx#mPdf>NkPQ(*o&kAX*5B>~ZDLGIB8S^1CA4%xYub{cHjJsWd$?7I0l*IqjC(v24;{!IKpFaI32vbnR2xVXZ$d3ehwwSvY^UD-p<)}aj{~cX&)g;6vB|o0i|9i}@6x)o?<<1N72@ZQ@nD96lN#MS?L%izv_idOe950tn-)a#Dcx_cW9o8s;^AN~e?*=b6wrHKz?NNfVpWlJ;$-M&;FZonGY(-aj) z>DiuEH5;%@1tqsy3s5c1YUcFp*HTmC+QYQwGO>|0@fn+R8QMNivvzaa?~a7F?w7+3 z_gT04zoSL&ai6{PzZ`{8Q{}J0{r}#u;{Va_J?Vds^8CK^Kf18)qxw+*R;`bL{;d=~ z+WP%e9_4Zo>Od!II1NwW8CsFnO`Z|q5W`jb8l z<-awK;-dSON5_m>g@4)^|9>*5#Q*C*#eaI7hu;6+M5|MF2PBFSA^I;?WLSbFI%Su^ zXe7IXYlPQ%0w5^TIR;4@qB9XWwagoEV2Qb}EE`g*@Cg7JM(GZ1J>Y%w=8adzM>?c2 z^1QFlu08Vq|M7T)B$pKFXrV(x=%YExa}>T@=TWk_VNvj-WO1=bQu+GTdlancHSz-h zI{bnjN&+NKW>*jg%UAES9I-Il>WQsL%I0eUpvjYFM3heRQ*e1#yl=z9^Pvn34qT#kE{h!MO;m3K8G`VAuRvT}qiw1e!kSSHUje9G6cX2*=z3`bmDSLo zTH+|$C}5U`V*I=0?*vEf=Oar)gB}LyDoYcTU^y4)JfDX+9Cfm(#m1v5xE>Q+l5N%` zyPR3MxXW~Rf29pCAH^d@pYQiT<;JqS?YzqHRvEM-v#6BJVV3!K>lw-ugi+x~X;)S{ zWw$NM0j@M>jm>4x(OR7p6C<9jfQRO=rOb3RoCte_MmGsP@9}nHdj{LF@4AQEbCnddjW*oLzQs z#hPrenl1HUyXkR64c5{FNE!++d^kZv+0wh@jK|jh+Uft)TeFq!|NmM&%3hbPh{&V-Y!BIJDq7eJtWC}H`9&iK^;Vlr8Ipm5sEKfR%nqjJp?Sl`N zDjMz{APYVZ!aCZ~e=fH@EdB3|hi3f$!C?Fp|Lswp7WDsbQiucvhDk`2F18??is=a?tLy-kUF;EReRtkflmQxyS$wV2?_y>w4%NC_Zf>S?Ai7;K`Y^^36kq$ML@>1bEM85*B z|8W*?c$U!?62LC`f6}YOf9?&R7)UR-{A3a-mufe>L7U=)JG48e|1_3tjzcO9H|*OX>sn1mhPN{6)4QA(=5zrPQn z^z=O1yoX76@C8T^&*5~K z5&<;8)& zh;WzwpP_%?&;FHn>Ho!x<)TaeCw>;2q+0@-!QgJ4QQlV^eB~GKvV*Vu8N56A%Ev46 zcbZ3wgRlPIgD=33FsE0kE?&MW4*V=n|A_*8;71{XT~<6#|9RkViXaV9_m4n8o%{d% zyR*x0U%h_wt-lKI*+%{TANPlYk-7hSPx*fy=lKGhFJZDkak}`gS^n39gM6dw>0}F8u4k7hik}n_R0ea@RcrQq z-`5}=fx|&>(C_pIo&NCXfV4%hBRlrsD}J>UgzU_h-BFD}k|v!M{AZej!=JzCkB80B ziHc&4iY_UCbadeAbI;Z1-oAbApBR1aseK;o*XRCmyFT}i-F@z#IQrZ_*}KojdY}6z z);@m|y(c~9tOXS53V|@1(@Pkb#t{MQJpM~T)0Bv)wc?_%vpdJG?lc=SqdOQCxHI&J z{?zEwvD&4+YZ}XW;}c4!uQzQseZ6VT^i5s;ZPtiw`X)wSr%GRY$Hw&Ge9KiD2ns~+ zOCXS=B;C-9<#|f@EE#|@iX_fqlsG#yadl|2cZbGChbGnzxhIdz+UU65rW+mCZMw0m zljFTRIWjsqRy#Ru*vV%n{J#@y)?kAczr6))@=p z5YdfG{uF^tK?WBHKroB&!B=3mUS+($2Va34;XGO_P|jZwtpLFSIj3OKY(vXVO(wKc zc3`8H3wLx<2W;39*suoJpdGaz4W@O#T4FZPFynKj(Qmp6LzER%DI&{mu?%uL^GW*7 zcdmJtc-Y@dJd~SzU~FzxM6~Ro2V7YXGAb?svcH!ADMzJmjEX8m_J&TvTx2?vPXc8#?f9w)|~2 z3mxB~im%gRp|8#1akJ496EZv=)tD$;7K**~2E#sK?I52JPS8zP9Izm(kR86G5CmzS zqX5TS-urfv_VBn)(sr@eeS2?Mr21;_oyHk+dYkd~vV%Q$2VL^Rp7y6>b9#H$4t|3m zCjGluWieWzgd1auXqCm$JPN4!z5w$)U4gIJ*(2-vv>g*3PMtdOv14wJ_nq5geQuBS zx$Re|ZjlnfBYnqo9_9%VB?}NGpg{R13WydI*Vvwp9g}yw@8nJO$vf63uWwFXi9O4f zD$(U0`-DyKo)kWxzLtb(>Lg54$MjA2oxZ6)ebf5s<0OYI+f`Ixct>;Fmx+YI5+-5H zCzP`kItG(=qTg`h6#b@-1u)%r0Zja{J_hy$Ajy-ej~i2SF zT<~FOxw9wEojq~LQ}w6TpCfrrKT)TXNaY)p(B8!6-w7E3HCb#?@$hk zZGq9MaP`A33{CbGh91ndB^fb{a^hA@M`VFlW!(lsX#c()rchF9SC;L+2iB5$l8Wk=(s8iv1 zOC8I2019?|!!mORF^pEy%aHEEY!m#2lbm5oZZvdqqltqOPxht6V_gZKXp~qP2Zh`U zeMKB^#c=CVTgDERdc3bnJ=Rs~v8Gb@N0oI+t-fHL0eU;Y-@;YQrlh4RIi#wjYn``L z(T7Y$mzd%Ti?ffV{rqU`?|FPQ)|v3wpQvM55uwS{vjC}QS;qR^Ybjy$oD#;^!Ai&b zveL26O2-;2?KiZ&40|nCNv~#=3{Kin!@)_#b~}&Wi?aux8c$eR=He731%}iq(lx|( zEesZ&xJI~e(RUq(LG8TnXaF#^E%^3_3vs#~r(2>rKi6bxE^4b; z0oh<2w<8LJ;~Ju1XZquPnf_R3`eTjhTLy!WJQ#*FIuMKjj3ZbSi1B@DLO@`d7MS`5 zs$;{(p&e5g96Rl{V+Ye8@5}T@<~a1M;~;i!lwj(?&Fv=W>c?|7{p8p7yDNQQ)Pca; z3>ADhT2jAbrz|*f4995S;TRgeOrss+aTbPR`nlPGMp1$VfZ%ls!>?fslK|!5jEoEK zemfCx;I@+-_ zjV(27xt@k~>&Y(V4)5!m)iXLeQajo+wiOF+#VogkTWXiwskF`<3l-^?au3CoFiilv zs7^Y?1o*GCiGAOLyYF@I4%%&&W2s! zCm;5njlMA(19djcv*`0Q+X6j&f?qiY#VH7uQ5>@TM-Dsk(B(Td+|zf8)-*R>-`*K6 zn-PX41CEGI#rRvLQ$$*2vqraMlHw&jMk&A|+Mt9TCG}e#qx9X!C_|SQ)o@QQDpK>r z7@nRwJX2$?|F3m{L6)bRC`5qYJY}5^ma8-ba~QGXG`PlThVoU!V#>3T7`M}C`eUa? zGjup`4fl268v2F+d!i0Q)m}|ByA8|SOnf7qZE5lEyDk1hhh=oQuVr-T8#0?Jvbpc=7<{v({k-pX z#Tq*7lEZ!Nl0)4tIrLRgt#{%?!zC8&EfpC;(XbgBE_q;oaX?37&FMn)a`$wRyQhfU^_bX2-rjy9FSkqdb;+ey%Dn`a zV<#?l!L_%q;M&s#*Ip^O5;P`GH0*+FZ(qT+rwgvVQgE$D!!Azt_7x|4=A=xTp<$PU zdi%;jJzWm!m2wb4!=+919CA=^KRHOQ(~*wLuo*5cIoS&!#T6JKdY@P7Ss@HQBDk%gLsqowPfDK5-pCPhISM zx;HzY8ti;(vh%*YRyZiU!)g|{AELc>vcL;=O@)t}G3=X#lAAxj@K|1H*e4JgfQG)5-Ld{ecYNn=8 zQ|S?@A0v!tBshAtah*DZoP%Ix;>sYBkG?kn$1b$MrM$UBxvV+R$REHOQIT=?1qqv^ha z(Nq_VriNfd@wKC2vw+d}`=T+@(HPea8>c-mNm5L&3%!mC%vLzPe!_mTZA_?9mZt$K z$Wo{7Q&B~k`81ooLaWX9>fGUHU28K;KK*w8q5(#}2Lgn0*OCgm(j zYA;K(lXy0m?ffxLm^%h-?P8VX>4thZ(Z3J~6E?AAi}1+1)MdEXCK$et`0Tav_B(Mo z`%N99_HR+nc^#>eJq zDJQMrI*X%#EFD3KL}+1p70;09T*K!QOZJya^x@NFlAgIpzb74`_p(?OW9ZU#PDD@T zEw6u#=8#>s`-&fJ^W0-G+!F4OQ^7E0upze13L+R3QHTQ42{s?C+(S;r4)2huL&ur! ztK&>{9cOCjIMu;i!VRK~lt@C5x>a65yp(ZT7=N8dF%o&f=w)%qo#|k-qXgrjH8w`R zPR@$UG@*feajMWD)7=$|iADm#kKdDakw;Ekfk!xk&R*|7;U{LN9TToc2v}$QCOM3$c|r5%3K6}8Ok=>n0Iy*j zZ^i)rB8^r$~4~+bO{qeXrc#8k}7|$2r zf?rjj`J4~FStraFFOFt8%(qmUxXst-oO`kDDsU6gt1ci;sZoXqBIQ?bmSs#`;J@c7 zl?EUvqE!^bT!emp4)8K6WE<~bLE}+V_Lw7jv0??I1fv9!=7O}qV21EJgjj}9ww9U2 zh=@m=@#1_7V6cqPhM>4eVN7tGAwq~=UjMgG=oh$VdC&>LDh`yaho|6|zrN`E{fXb} z^nRg5Un&&*;NT;;F4F^iq!~!TNAM%ci9`-Q9(?R5&qwVa@)w18A+My-e$Zh$IG|y- zqXIzi9g0`rH6IpsL$l0VaQofG4LJYq?D`g5+-RaMvMQ1cSvo3Q>4ZV;l~{Q0NoE^5u|xomJZnqf3fJ|AB(Ho?|!<)IjKaN1Q7g8nL`^klAw3pV40=`Iy&fd zItOQQ46dWa5*I|QL-_`UpaX98rOh35|6tt5N&lB9UUj%ae@`Y*PyeTc@*DJj+Ut#; z=>KCpgoZI+UqV?rEG5gqfwHcn0%Uo#f_W5gSyBK(gsD)srR)Fl?1uXUlkM#ve3!mM z8?-0Mi%F4nx=Ja1lAWK_iE&1RgVPro{gEfsjL?A>fsuPJWKD8KIU5xVYDiI@CpV?yUtlG({&s&OG1PTYJ9mvTc5F+GB`s36EI_^5kBBp6D>}` zlaTTmBFy|FrHsPBLua7O7(rGBj7j}YniM`MN;nRK&ukOx9EE`9tzoNyB2+f&2WiNN zaBjA*+8;G6gd8F9AfrK}R1;tw4vis2Z4^O(ih`wt@WBOcfZ#W2&g_CwGEbjN9*V)w zWT}N|z&WQ#+oR~dloh4xyhCZOMus~a^9~=d?iUKeNA^+inJFv;AHgh5$w>S%hjD?( zGJ3_WWa}iU_P<;g5zn)phR!B7wna*>s&CblMPLK-h_uPhebnaYf^~v_9Tfy}%>Mc1 z=YNm}2qP{57IaTUC}g1CMR80fi7Agb821r1aV=RNx0Oi)MU0sf61Ocrfq_1ItCL;?x_Mw9kQZqC```{;UxO;FIq}%_t31&7uGoEN2_NL&R1E%raJ4 z@Or+VSLr&z8C;58N>vGk60o!K?@1}OHwnVUGEFO+au1FnL6z(R=joa(Z2CGum<)pq zG!o$@-M&|8*pQW2@NPxZC5F2Qx&nPaaxPmkX}Jpdfhf6bt0f(m^%_#~EKgS$M)3nI z6$wgNDpI(J(*+YUi)BP(>{B^6PVb`j%S1HPYMDsvb}bVH`hLqqwq!0774icu6WLbF zWg_dfTqZu9M-y+dJTi!v1)I|ay&*`NVf4uX=q|EwF#_s`>(>O(Yg(eLy2+BptJDz0 zQa*b-<6;%J=Z#$EIBf|?K1?wiDIO$NRRIT@02jW=bktf^-jI+CQG`au2+5{ znw)p)5m?@HFG&GW7p~|j^APnh`zXQC6@SGQM#!V9M*l+00YVHLTUqqzl?f3-|0GM` z$E!=<-5p<^1Lc&>I$2yEw0Qe?a|Rt*gIP+T6q|T zL~3OVV20*oP2ilC#3^f??JS6wK3$xpE!EhAWVi9C85MNxM5jGrpgvsfXadZO2 zw!0(AQG#m7X12{V#!Rcf+ zJvj*jcyclhPI}=8&BoKoc-|ilCeu;xcs@NDk4OC(3MSLud_EWi0U91RKuatnBCHXe zrFJdxLWjlCjulnD_Fz*Pkh0iOv@)7D*9>-U>E^7+TVWO*`yD!Q-PhaEk~c^bzk-!YUmrLE!?)kl>OlnQVzD3<{`yCU9D zfp9m3Xq6@f!e)zZ>l*hu<-HT-&HBz^vKMU9t1^wlJ{`&t^(7`K5mDhI_@z(UxLnf! zv*{d!sECO2m!)A*t-OhfC{4bL3PJ#1M=NUV=75IO$jsp1(2F0eG+46YAZFzam?`yn z_<=gf`5DY{#7MkC_L3+T1EF*hT&q=qQnjvyVx2FL3wk-42JjVp4|vTw;Ohi#U=-7p zu}>3PeZ3(f++noXy5Q;y5v;RC4nqWFHKM$~lx-K!iAWrULPsD1>9t5Kb;xP<5j9e2 zSTZBP4WEP?WCipld5L0#QMGyr+6OP`5+xu+@_D?BipmbMNZYa(o}=?lky{DRTkeoF z*H#s6pDOp~FoUxwj&OvGE$qQC^iF^N$8#^t(~SH@H}!dWSV~XI$$Hgw2|rL_rfW=e zJ)y{b`@;p<*80ghL5F!t>crvae`s7%2_#F)*;wTd94|i2Fj2`0X&mviKamKhM^i2n zb)Jm<4>w;+pG}49(xYZK!)2cpKC6bjrJYL()(vBbi8{$7k%A31pGoiZXZF!M^=K4M z@3}`8pLgo@y-)vm?iC2;!4eg6Uc|v0czJn4W`%U8crIm1;c~@dda`D~3T{D;iZtFJ zkQ8y6-mNoX*-sO8l|iv;6bP>~zIwx?un3}juf7ys1~>)YdAu$#%D;*70(&5uQ!~q@ zJVpSNOVe$n75yo~%kNl8TP?z(7$%HKasB#rl-w0=5unT2Kf4Uf!clQ6gWJAaW)f

m%Mro0aH$7$tVReQ;Y5nr`To zB|$4r!PybG{hw3t!|gfv`UqT|-Q4{2@)Z2#!w2AB^N{k?$M4gpzku_y0DVxh`6f?S z{1*VeFXn>2udsLV@ivQHaso;=)Cq;xx0YGN=?upHd>zMRb4anghFzcpM>(P%}n;y0{{xb5!uE3_HB}4o<1%1mU1VG3dOD@RI)7 zfei2Nk?g71yq0nPsdSiEOO_YH7p0moNS^~oo$cYG7QN8$HT7{=%w%u!)cLnP5og%kyotyH>Kq%N;&Z=#h>C`Z$T zHLoHnx2zW|VU%=cu!sVW?q4dPq;rNHufWeAaSqWux>LX09T${D6&VbW*z0hO(-p)~ zK)q?ssX$XuiAL&t%#chy2NY=Z5>}R>BxI18Z#ZqVY^9Js2eKyn2(F|**2Oh} zU%6Ng3zQLFijFiy2zKe3dYz;Nmq1pcU6h2Kb-`^V+DKDc@^kMW^bcJwri-b zB*lP`XyIr7*B7Ag_eY&xlZJ%`<)S8-HL*Q0ek6AxJZn zGB&!N6Y*!quvZ#lKG|CfGx(ke1++Gku2?xiwb}7nl&}lcm_iN{&=&xnD?$gwIZfhi`I**&`5g)Y6prIt3;H;&E{T#4-@d+)+*c04*C}3d zSH4S;2Ahd>guw6^65@)CAU;~twYsxfW*6sgsqE?;Gs2BMy^X>4dx6VU(|;ge}lC4^h6`8$6EYDA)$3FUF@|D#BG+QVcO!4aTv6$d>02*TiQf@_+SQ zh!^tLxlNx6bQ29-(J%oB7F+I~Ma3zyHNZRSXYs@J>l;#ZT_DAWi*(@S*K81kpIPmp zR_Vm%KGM=vh3qT;RwtBq7nujnGe;_zzR8;8Tuu!q8F z&<{t$ISTv7;VkU;r_)PoQ9L**=R7Hodl!f*|66PE3qXs8|4g*5AEke(t`oEv%Xf1=`z<~qo|Ww|n-iweGGME|AxUj((c>HIBT zqPMK#Uw?TntyDM#f9d>%pL!H3^w}Eg^Qqh+a1PxA%lWKHXKOivA$5eatV*%nqq*9t ziW?{(Fgiq7ceYYQ|1ws>$;rvLk@P}_Y+};6OaLM}lcQhPsKByE%AUZx`lcm%vMH&& zEmlAeZX{t}%&GO0EQHQ4&q26N;3^8(&CVi96P~0-xGHHCWbT_^o@>4;vNFmoCLTV8 zDx~87WADnE+s2XqyFUese)x~8bkVvf)ql1s*JP$Do>AG(?$gu?Bp@4WiewR#vYJf3 z`xY7p!2{G`$K%aL4~Zp$-HjXF=>B!GCL$jWi5L;YAf%<7%*uRo6NAZ}VCM&e^##l% zK{Vb(5m(acxp??i%85ZF6@;s+E3AeZ*qeV7*e2vhsVRm@{4a(207~?-w301*at!h_ z19I3V=z>Xt#!O8BZMDF~l-7t;TsZ+aD2s&kyWeyhs!QMc3Jk?-x4!ct5obsK`SYUV zq}#CLkae2x-qNfiwaZT7snRK6wfH_F?iQNmT%%N(-E8~QJNY5jrBsscU+y?i~HW<(-+CcvB)Sd-EbDbF8Jd)cUKEgy~m?J;C4`k=gT@^y+cHC5i zZLW7+K#lCLcU}GT%kPzKTCx>%+fRTMQNDpgRHa7tBef{ldYqOGdC*z9!uKm5-`G9M zz%bWrsnqVQN}W?oxMt2@)c}Ddm~{52y#sh*n$`CXA#HC>Fx@m7`_$#TERiRUdqvhs zwsVW|hMatzu9)+~^{cCHfWilYh52&Fas{5b8-#}mJ!zP*8@8sfs;ox8t5Du*k|)+i6}-Hr#=Y54MUm#gU*`In>daEwAU8V-GLG8u-$$=IKb5yr#eeyOyVL`D;s zO>LgEvSbnv>mg^spH{lE+dagNoFn!C8=9C#5K*G{LgV*{Zb?iS>vAQE!e4-|w@JG~ zG-Y^(FFjSDEO`6rjH06XpcueE#z`)1UHYo4);D?p+gj+FU_=iYoSM?pj!sRsHarW4 z2aV67ruIg7-Vs``ec~ZnZnGyFqgAqvRrxBTR4%TzCc2T2_l!_UD-rDFQTqta}tCmWMxq79XJ^6>}|lI;ge4UE}xtTYLoc&IGnXx5IDB@V|N zDCLX$7}lB8kCK=l|1$7BG8qo= zcuIVK7>s5E6b{1il&nVk1XAb7EI`(As|+EI4A{L+A`#zWe1A=2tio+MtzK9>Yu9e; z`liXIiJs*32(oR`%4e^aJ3wxFw_@@8NsyeC`MU(Fb=%`jH-45QC*$vZ;J9kHe!C>unTw&32=dS;rx?ei3bZ0e6dgXHC!4-ACd@-$oil_30Wlmo} z9WhI&lMq!xE|ScqS=J-*^#-8dbu?gtx_zxR^G8PX86r*6O(fPESzd=m%1sjXK*6!+ zye1BUkVh~}=8&+%!1>`j6N$rYm*&DQCwJD4%xJ!eumb^w;D)fJjLJxL6z_rr?*wzz zi^grg1nOMTNbaF6=$^~ZE+kV}WOPd-a!1~=5JfNo-8oF%j%$MM@Sd%s_jKG;y^r;4 z>Q?hQN%Ehx30L6*o2gI5Z^ziY8iLpFbb3 zKfqI%*9QDlTcvW8-I09X$So3}809N!G^VQ+$x6!;Gyo(k&P7%d1xp1_Kw(@K1eXwx zp#Z+6x@e9swLD4hpIg6EF()%o;`iz=^}`aj$w4(q;r*wo0WQz9J9gzbs1E$>u64 zvFg}dy1V|s7uP^8t{0usTHA3ny-u;_8e+UsC;3+0v*FlZe*a{^TRrRTq$L)i)o+Xv z$QjN1+?dFUVBtlkbeIMf7F_zG`Av1Cmzm!kl|Hn*jj^w6uG6 zB@=e-Z#g&i|H8+b|63W`9-I7oZ~pJWU^E?6@_$c8-uQd|@8|e*yWO*Uipl)Uak@^P zgplz5?7Xm9a#d$b$)~fk|Bq<=;M`|q^`qOIs=xnFz5~#(pJ#Nt>xGQDpwIm1=H%ab zAHHWK`q5?iE+Xunklc0pe}e?uMJ90m_5A$Yxd~Cs7nMzvv$M0avp=0*6X%Mu(rV8) zlTC~j&N5#x=iPmuKY?R`tfn}=CAqlwH6Jxf^H=xV_s{pw_s{pwV?X~100960{?cox H0J;bOc+r2S literal 0 HcmV?d00001 diff --git a/stable/home-assistant/12.0.17/helm-values.md b/stable/home-assistant/12.0.17/helm-values.md new file mode 100644 index 00000000000..2221b74f881 --- /dev/null +++ b/stable/home-assistant/12.0.17/helm-values.md @@ -0,0 +1,42 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.PUID | int | `568` | | +| git.deployKey | string | `""` | | +| git.deployKeyBase64 | string | `""` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/home-assistant"` | | +| image.tag | string | `"v2021.12.2@sha256:33e2e56ae319b39a95b2a223666ee28552ac8164b2f1f1b86beed074fbbbf718"` | | +| influxdb.architecture | string | `"standalone"` | | +| influxdb.authEnabled | bool | `false` | | +| influxdb.database | string | `"home_assistant"` | | +| influxdb.enabled | bool | `false` | | +| influxdb.persistence.enabled | bool | `false` | | +| initContainers.init.command[0] | string | `"/config/init/init.sh"` | | +| initContainers.init.image | string | `"{{ .Values.image.repository }}:{{ .Values.image.tag }}"` | | +| initContainers.init.volumeMounts[0].mountPath | string | `"/config/init"` | | +| initContainers.init.volumeMounts[0].name | string | `"init"` | | +| initContainers.init.volumeMounts[1].mountPath | string | `"/config"` | | +| initContainers.init.volumeMounts[1].name | string | `"config"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql | object | See values.yaml | Enable and configure postgresql database subchart under this key. For more options see [postgresql chart documentation](https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/postgresql) | +| prometheus.serviceMonitor.enabled | bool | `false` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `8123` | | +| service.main.ports.main.targetPort | int | `8123` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/home-assistant/12.0.17/ix_values.yaml b/stable/home-assistant/12.0.17/ix_values.yaml new file mode 100644 index 00000000000..6395bf46733 --- /dev/null +++ b/stable/home-assistant/12.0.17/ix_values.yaml @@ -0,0 +1,79 @@ +image: + repository: tccr.io/truecharts/home-assistant + pullPolicy: IfNotPresent + tag: v2021.12.2@sha256:33e2e56ae319b39a95b2a223666ee28552ac8164b2f1f1b86beed074fbbbf718 + +env: + PUID: 568 + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 8123 + targetPort: 8123 + +initContainers: + init: + image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" + command: ["/config/init/init.sh"] + volumeMounts: + - name: init + mountPath: "/config/init" + - name: config + mountPath: "/config" + +# # Enable devices to be discoverable +# hostNetwork: true + +# # When hostNetwork is true set dnsPolicy to ClusterFirstWithHostNet +# dnsPolicy: ClusterFirstWithHostNet + +# Allow access a Git repository by passing in a private SSH key +git: + # Raw SSH private key + deployKey: "" + # Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence. + deployKeyBase64: "" + +# Enable a prometheus-operator servicemonitor +prometheus: + serviceMonitor: + enabled: false + # interval: 1m + # additionalLabels: {} + +persistence: + config: + enabled: true + mountPath: "/config" + + +# -- Enable and configure postgresql database subchart under this key. +# For more options see [postgresql chart documentation](https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/postgresql) +# @default -- See values.yaml +postgresql: + enabled: true + postgresqlUsername: home-assistant + postgresqlDatabase: home-assistant + existingSecret: "dbcreds" + +# Enable influxdb +# ... for more options see https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/influxdb +influxdb: + enabled: false + architecture: standalone + database: home_assistant + authEnabled: false + persistence: + enabled: false + # storageClass: "" + # diff --git a/stable/home-assistant/12.0.17/questions.yaml b/stable/home-assistant/12.0.17/questions.yaml new file mode 100644 index 00000000000..aa0918da4ce --- /dev/null +++ b/stable/home-assistant/12.0.17/questions.yaml @@ -0,0 +1,1863 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: git + group: "Container Configuration" + label: "Home-Assistant Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + label: "Git deploy key" + schema: + type: string + default: "" + - variable: deployKeyBase64 + label: "Git KeyBase64 deploy key" + schema: + type: string + default: "" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: PUID + label: "PUID" + description: "Sets the PUID env var for LinuxServer.io (compatible) containers" + schema: + type: int + default: 568 + + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 8123 + editable: true + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8123 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "/config" + hidden: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/home-assistant/12.0.17/security.md b/stable/home-assistant/12.0.17/security.md new file mode 100644 index 00000000000..155b872efab --- /dev/null +++ b/stable/home-assistant/12.0.17/security.md @@ -0,0 +1,671 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: home-assistant/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |

Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-home-assistant' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:017e4d5af2d17c98b8c779a943d8152f75a824535aca43381663c365895add33 + 'tccr.io/truecharts/home-assistant:v2021.12.2@sha256:33e2e56ae319b39a95b2a223666ee28552ac8164b2f1f1b86beed074fbbbf718' + tccr.io/truecharts/home-assistant:v2021.12.2@sha256:33e2e56ae319b39a95b2a223666ee28552ac8164b2f1f1b86beed074fbbbf718 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:017e4d5af2d17c98b8c779a943d8152f75a824535aca43381663c365895add33 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:017e4d5af2d17c98b8c779a943d8152f75a824535aca43381663c365895add33 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + + + +#### Container: tccr.io/truecharts/home-assistant:v2021.12.2@sha256:33e2e56ae319b39a95b2a223666ee28552ac8164b2f1f1b86beed074fbbbf718 (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| curl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| ffmpeg | CVE-2021-38171 | CRITICAL | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-22015 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8190
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg | CVE-2021-38291 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-20446 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-20453 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-22019 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019
https://trac.ffmpeg.org/ticket/8241
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg | CVE-2020-22021 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8240
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg | CVE-2020-22037 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2021-38114 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2021-38171 | CRITICAL | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-22015 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8190
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg-libs | CVE-2021-38291 | HIGH | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-20446 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-20453 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2020-22019 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22019
https://trac.ffmpeg.org/ticket/8241
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg-libs | CVE-2020-22021 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22021
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://trac.ffmpeg.org/ticket/8240
https://www.debian.org/security/2021/dsa-4990
| +| ffmpeg-libs | CVE-2020-22037 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg-libs | CVE-2021-38114 | MEDIUM | 4.4-r1 | 4.4.1-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libblkid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libcurl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmount | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libpq | CVE-2021-23214 | HIGH | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libpq | CVE-2021-23222 | LOW | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libuuid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| nettle | CVE-2021-3580 | HIGH | 3.7.2-r0 | 3.7.3-r0 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2021-4451.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
| +| openssh-client-common | CVE-2021-41617 | HIGH | 8.6_p1-r2 | 8.6_p1-r3 |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssh-client-default | CVE-2021-41617 | HIGH | 8.6_p1-r2 | 8.6_p1-r3 |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssh-keygen | CVE-2021-41617 | HIGH | 8.6_p1-r2 | 8.6_p1-r3 |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| postgresql-libs | CVE-2021-23214 | HIGH | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| postgresql-libs | CVE-2021-23222 | LOW | 13.4-r0 | 13.5-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + +**python-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| Pillow | CVE-2021-34552 | CRITICAL | 8.2.0 | 8.3.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34552
https://github.com/advisories/GHSA-7534-mm45-c74v
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-34552
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://pillow.readthedocs.io/en/stable/releasenotes/index.html
| +| Pillow | CVE-2021-23437 | HIGH | 8.2.0 | 8.3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23437
https://github.com/advisories/GHSA-98vv-pw6r-q6q4
https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/
https://nvd.nist.gov/vuln/detail/CVE-2021-23437
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
| +| Pillow | pyup.io-41277 | UNKNOWN | 8.2.0 | 8.3.2 |
Expand...
| +| aioftp | pyup.io-38045 | UNKNOWN | 0.12.0 | 0.15.0 |
Expand...
| +| bsblan | pyup.io-37697 | UNKNOWN | 0.4.0 | 0.27 |
Expand...
| +| pip | CVE-2021-28363 | MEDIUM | 20.2.4 | 21.1 |
Expand...https://github.com/advisories/GHSA-5phf-pp7p-vc2r
https://github.com/pypa/advisory-db/tree/main/vulns/urllib3/PYSEC-2021-59.yaml
https://github.com/urllib3/urllib3/blob/main/CHANGES.rst#1264-2021-03-15
https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0
https://github.com/urllib3/urllib3/commits/main
https://github.com/urllib3/urllib3/releases/tag/1.26.4
https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL/
https://nvd.nist.gov/vuln/detail/CVE-2021-28363
https://pypi.org/project/urllib3/1.26.4/
https://security.gentoo.org/glsa/202107-36
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| pip | CVE-2021-3572 | MEDIUM | 20.2.4 | 21.1 |
Expand...https://access.redhat.com/errata/RHSA-2021:3254
https://bugzilla.redhat.com/show_bug.cgi?id=1962856
https://github.com/advisories/GHSA-5xp3-jfq3-5q8x
https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b
https://github.com/pypa/pip/pull/9827
https://linux.oracle.com/cve/CVE-2021-3572.html
https://linux.oracle.com/errata/ELSA-2021-4455.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3572
https://packetstormsecurity.com/files/162712/USN-4961-1.txt
| +| pip | pyup.io-42218 | UNKNOWN | 20.2.4 | 21.1 |
Expand...
| +| sendgrid | CVE-2021-43572 | CRITICAL | 6.8.2 | 6.9.1 |
Expand...https://github.com/advisories/GHSA-92vm-mxjf-jqf3
https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1
https://nvd.nist.gov/vuln/detail/CVE-2021-43572
https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:017e4d5af2d17c98b8c779a943d8152f75a824535aca43381663c365895add33 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/home-assistant/12.0.17/templates/_configmap.tpl b/stable/home-assistant/12.0.17/templates/_configmap.tpl new file mode 100644 index 00000000000..086c40af678 --- /dev/null +++ b/stable/home-assistant/12.0.17/templates/_configmap.tpl @@ -0,0 +1,90 @@ +{{/* Define the configmap */}} +{{- define "hass.configmap" -}} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ include "common.names.fullname" . }}-init +data: + init.sh: |- + #!/bin/sh + if test -f "/config/configuration.yaml"; then + echo "configuration.yaml exists." + if grep -q recorder: "/config/configuration.yaml"; then + echo "configuration.yaml already contains recorder" + else + cat /config/init/recorder.default >> /config/configuration.yaml + fi + if grep -q http: "/config/configuration.yaml"; then + echo "configuration.yaml already contains http section" + else + cat /config/init/http.default >> /config/configuration.yaml + fi + else + echo "configuration.yaml does NOT exist." + cp /config/init/configuration.yaml.default /config/configuration.yaml + cat /config/init/recorder.default >> /config/configuration.yaml + cat /config/init/http.default >> /config/configuration.yaml + fi + + echo "Creating include files..." + for include_file in groups.yaml automations.yaml scripts.yaml scenes.yaml; do + if test -f "/config/$include_file"; then + echo "$include_file exists." + else + echo "$include_file does NOT exist." + touch "/config/$include_file" + fi + done + + cd "/config" || echo "Could not change path to /config" + echo "Creating custom_components directory..." + mkdir "/config/custom_components" || echo "custom_components directory already exists" + + echo "Changing to the custom_components directory..." + cd "/config/custom_components" || echo "Could not change path to /config/custom_components" + + echo "Downloading HACS" + wget "https://github.com/hacs/integration/releases/latest/download/hacs.zip" || exit 0 + + if [ -d "/config/custom_components/hacs" ]; then + echo "HACS directory already exist, cleaning up..." + rm -R "/config/custom_components/hacs" + fi + + echo "Creating HACS directory..." + mkdir "/config/custom_components/hacs" + + echo "Unpacking HACS..." + unzip "/config/custom_components/hacs.zip" -d "/config/custom_components/hacs" >/dev/null 2>&1 + + echo "Removing HACS zip file..." + rm "/config/custom_components/hacs.zip" + echo "Installation complete." + + configuration.yaml.default: |- + # Configure a default setup of Home Assistant (frontend, api, etc) + default_config: + + # Text to speech + tts: + - platform: google_translate + + group: !include groups.yaml + automation: !include automations.yaml + script: !include scripts.yaml + scene: !include scenes.yaml + recorder.default: |- + + recorder: + purge_keep_days: 30 + commit_interval: 3 + db_url: {{ ( printf "%s?client_encoding=utf8" ( .Values.postgresql.url.complete | trimAll "\"" ) ) | quote }} + http.default: |- + + http: + use_x_forwarded_for: true + trusted_proxies: + - 172.16.0.0/16 + +{{- end -}} diff --git a/stable/home-assistant/12.0.17/templates/common.yaml b/stable/home-assistant/12.0.17/templates/common.yaml new file mode 100644 index 00000000000..0cc42ff47ee --- /dev/null +++ b/stable/home-assistant/12.0.17/templates/common.yaml @@ -0,0 +1,22 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + +{{/* Render configmap for hass */}} +{{- include "hass.configmap" . }} + +{{/* Append the general secret volumes to the volumes */}} +{{- define "hass.initvolume" -}} +enabled: "true" +mountPath: "/config/init" +readOnly: true +type: "custom" +volumeSpec: + configMap: + name: {{ include "common.names.fullname" . }}-init + defaultMode: 0777 +{{- end -}} + +{{- $_ := set .Values.persistence "init" (include "hass.initvolume" . | fromYaml) -}} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/stable/home-assistant/12.0.17/templates/secret.yaml b/stable/home-assistant/12.0.17/templates/secret.yaml new file mode 100644 index 00000000000..19f769cf59b --- /dev/null +++ b/stable/home-assistant/12.0.17/templates/secret.yaml @@ -0,0 +1,15 @@ +{{- if or .Values.git.deployKey .Values.git.deployKeyBase64 }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ template "common.names.fullname" . }}-deploykey + labels: + {{- include "common.labels" . | nindent 4 }} +type: Opaque +data: + {{- if .Values.git.deployKey }} + id_rsa: {{ .Values.git.deployKey | b64enc | quote }} + {{- else }} + id_rsa: {{ .Values.git.deployKeyBase64 | quote }} + {{- end }} +{{- end }} diff --git a/stable/unifi/9.0.24/values.yaml b/stable/home-assistant/12.0.17/values.yaml similarity index 100% rename from stable/unifi/9.0.24/values.yaml rename to stable/home-assistant/12.0.17/values.yaml diff --git a/stable/home-assistant/item.yaml b/stable/home-assistant/item.yaml index 804bb7a1263..e1b3541536c 100644 --- a/stable/home-assistant/item.yaml +++ b/stable/home-assistant/item.yaml @@ -1,4 +1,4 @@ -icon_url: https://upload.wikimedia.org/wikipedia/commons/thumb/6/6e/Home_Assistant_Logo.svg/519px-Home_Assistant_Logo.svg.png +icon_url: https://truecharts.org/_static/img/appicons/home-assistant-icon.png categories: - home-automation diff --git a/stable/unifi/9.0.24/CHANGELOG.md b/stable/unifi/9.0.25/CHANGELOG.md similarity index 88% rename from stable/unifi/9.0.24/CHANGELOG.md rename to stable/unifi/9.0.25/CHANGELOG.md index 424c25422df..f6b93ac61f6 100644 --- a/stable/unifi/9.0.24/CHANGELOG.md +++ b/stable/unifi/9.0.25/CHANGELOG.md @@ -1,6 +1,17 @@ # Changelog
+ +### [unifi-9.0.25](https://github.com/truecharts/apps/compare/unifi-9.0.24...unifi-9.0.25) (2021-12-15) + +#### Chore + +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) +* update docker general non-major docker tags ([#1542](https://github.com/truecharts/apps/issues/1542)) +* update docker general non-major + + + ### [unifi-9.0.24](https://github.com/truecharts/apps/compare/unifi-9.0.23...unifi-9.0.24) (2021-12-14) @@ -86,14 +97,3 @@ ### [unifi-9.0.16](https://github.com/truecharts/apps/compare/unifi-9.0.15...unifi-9.0.16) (2021-12-04) -#### Chore - -* bump apps to generate security page - - - - -### [unifi-9.0.15](https://github.com/truecharts/apps/compare/unifi-9.0.14...unifi-9.0.15) (2021-12-04) - -#### Chore - diff --git a/stable/unifi/9.0.25/CONFIG.md b/stable/unifi/9.0.25/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/unifi/9.0.25/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/unifi/9.0.24/Chart.lock b/stable/unifi/9.0.25/Chart.lock similarity index 78% rename from stable/unifi/9.0.24/Chart.lock rename to stable/unifi/9.0.25/Chart.lock index 6fca55f0929..db9b6179e13 100644 --- a/stable/unifi/9.0.24/Chart.lock +++ b/stable/unifi/9.0.25/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.21 digest: sha256:29937b76d07f882a8d7e24ffdbc0df01638eb45efbda32695bb24015ead912ba -generated: "2021-12-14T20:38:25.057902265Z" +generated: "2021-12-15T19:29:25.309544753Z" diff --git a/stable/unifi/9.0.24/Chart.yaml b/stable/unifi/9.0.25/Chart.yaml similarity index 86% rename from stable/unifi/9.0.24/Chart.yaml rename to stable/unifi/9.0.25/Chart.yaml index 2560ec85346..d59d65a8a8e 100644 --- a/stable/unifi/9.0.24/Chart.yaml +++ b/stable/unifi/9.0.25/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "6.5.54" +appVersion: "6.5.55" dependencies: - name: common repository: https://truecharts.org @@ -7,7 +7,7 @@ dependencies: deprecated: false description: Ubiquiti Network's Unifi Controller home: https://github.com/truecharts/apps/tree/master/charts/stable/unifi -icon: https://dl.ubnt.com/press/logo-UniFi.png +icon: https://truecharts.org/_static/img/appicons/unifi-icon.png keywords: - ubiquiti - unifi @@ -21,7 +21,7 @@ sources: - https://github.com/jacobalberty/unifi-docker - https://unifi-network.ui.com type: application -version: 9.0.24 +version: 9.0.25 annotations: truecharts.org/catagories: | - Networking diff --git a/stable/unifi/9.0.24/README.md b/stable/unifi/9.0.25/README.md similarity index 100% rename from stable/unifi/9.0.24/README.md rename to stable/unifi/9.0.25/README.md diff --git a/stable/unifi/9.0.24/app-readme.md b/stable/unifi/9.0.25/app-readme.md similarity index 100% rename from stable/unifi/9.0.24/app-readme.md rename to stable/unifi/9.0.25/app-readme.md diff --git a/stable/unifi/9.0.25/charts/common-8.9.21.tgz b/stable/unifi/9.0.25/charts/common-8.9.21.tgz new file mode 100644 index 0000000000000000000000000000000000000000..aa4eb2a0381ab703afffb0c640d71bdac73f8708 GIT binary patch literal 38016 zcmV)mK%T!JiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)w1m9ZuYsZleRgVI6kqH{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdQcbC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZ{e!)OVSn(KUVkt=82knF?g5w5v!pr9{?fa3 zTW;rmCl5^VN0d=ak}+5fS};xZ&lu*2=B)_PFvDri-~F&mLiQJk@g#%U8cazB&a)-r z1VmeNvOr@n&-0XyyWJVi=gUbaB#UmIEm6qJbYYs(Zk{33T|kkBp=(yDeMPseD!nDm_wAw&6bGe)# z-PLdZ_M+eEk2<|}@7vY_;v|PSK^X^z77)i{fRictuL5v~WV03k31s~>1^|F%78mF{ z6-04~LB3AWSfSTiDO?Ua&pU&D>w)H9uKyK`mx$gI1E^j9{oY`2FmTuZ!Cvoi{XfL> z1hm`WU5b*Arze1>D8y47f{-LrJX>avt@YLu@Lv&{!eyMZ!eo`idFe>53{{pb5|I2nd$KO7xQC%tgcdp_Me?Cp*A2Yob&_WGk} zI)De!=x{O|>`$JD!^6p5uQ3McGLAt?VjQkpfd4w>KgQto^n~Q68KSI1Ee`ExoS`3= zFpIVw^(&mA8LL=5?gi|IL#|;qfMyQ#s^95#2E9SQ_q;#U;~gFB9Sr)D!-LV`bJ(8@ z55v*$aJn~{hR>r(bT~PD-XHa!KOgmb(_Sm@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU5TSME(B3!Q^0s!pUeF?j4N!{k=&z>_>aU2oCmo z;jlM=!^8dk25nc5?ooUN*Hn&cNFqd0wnEvqBU{w09$QwXEx|V&UZYAQh!zR&b^3!& zPqTA~~;{b7HC!qGu* zIvotc5bYf{Ykw;;hH;7$wCzxfTGhjRB%n4NVF7Iu9CuuYoq-zHVek3=-t!@xOdxvR zJ3!Belm2utjRt5Cp;0)T4tjmKKY4!88}1+M4TgImJVcZJD4HCG(c~c9*z|UMm(YBc zA^OYqoLASZ;k^a)rrcN8XadjP=Z2krLB75I0UAd8a5{+k2jTO>$zgbK@EkrL?nQ_F z{lWBLA07^d`+NH^gu}hP!~STr7w(Pr51;SDDB9a=)O^#SZp~scfpIZLCJ|C%o2m}w(Yhj}MUTToazl;k)=ybOrY6epNZ9MAyFnwXv)AH8`s z22&VQ)M_zREhBM^G7T3ca1tZAVAa=73&;=Am@98C7DZ9Ow5AUK{t?DF0)%U(6u^uj zn8swiKuP`#L=Y`VLQxJ#251g*G+o9NvCTm!UPWPR=P7;nsQKxHw z?CQ2!z^wHK(|ip6@lOF?>WY*skR13Y006FdiMRYu6PMd#Fb3CODtZ^g35vG?D=OT! zPd9AV?8wP-F+mw4^l4I=xm_*<`iDR71KBN)MC0#ODXR?8JkTu`fT&6i%eg^wUzxha>qAWy7&S;tyJS@t+MGKOxYm16r z9}5n~gk&5d7=~n-` zfrMsI3dji~5B3k6ItQj_V^c8B=TbnCvW<&PPQa2%=KOjJ5~izi@{J@?08=h@JOfYw z!W7I?x*W(iFoM~jr{joJbn1ojX^a2zjbjs_e(zfzD{QBlU0H76}p`K3xzpVgj~i!kRndPcp1s*gcGvTtHoWRK*Kax*s;{4 zxP9S@WS3$u()$HhdcYiIs8eTyDQa#cIjeL9b%jfslLh{_tdf%G48iG9&q2{AQ`io%%J6K}Sv zf)k?-uknEj*^KorCFwF2e1I~!F$Y&TpYu*jDR51eQYl`u>G>W3cm=t12f4&bktr`S zmW7fqTc?aVCTk@OJQGZeGh4=r(UeJuOdeta-4o7Hll6o|Yk>d^L)H&D{>GsXnBo|9 zS^`-uY@Z&To&Ego{mU^}tlKH1^onGW?Cx8L6M&Kx&Pc+g!WGOgrX z-4r$1UQ&fS$9spZaf!q($LJ-wO0HlQfuqyctTJ2T>J0L7IYC*1azs0rbR!bdZVu@s z?c#*-ly(Gj*oG+=LfGVVjahB0S#6`wDWRyHlBkW7DajV1EbHY*h8mv;)z_1EFJE1p z9KC%tmMY;Cqd0nxrs}tRa|-kMn6HCQLL$UQq195es^mXmGI|SBUSHH!2dV5!djZq7 z6b;*Qy_JfJ*Sc669CJnm(hQRf=W7tgkP2Zt!qX|r7)j@h9dqKI2qO&*=O|h-0a4XE zX4Ou36W|G;Ynr1)oAsp~W;n+ojFrS0$K;BtHP0jpD4AsemE+pdKQ&l*b;%~T9l>OV zGP0!Y0+A}{=rfy8oP#-`TmWTcpR)~6y--@q&vTSWA%}fB5nLWD;3Z<}91^^WselPp z43~gUa$EZWXEbL^<|k42Q_BFNw+7zOON0LhX7vEzsns^7q9SK+K}AcxT1<-Tv^1i8 z^vvo?QA?!`^77Q730N4ne5RSO67CJLx&51E9z7EECio$gmqpF_i0;V-W8sA~E1~|d_u_{fu z&|3!0{<;%34vgT=bx9-e;A_$OU^+tjMsRwUX#t#Jmg@a)V zeN`NN#1`0=kY(-j56gfpw2Dvc(dpga`x9`nejV^;qw2V?9YWF!fKRylkdvU6AetcRq@Ola$`04!oRJMSr;N?ma z9cB5GXr0m8qBx&hn1ic14u!#UirLa2#v5BW|CRy+ELb2);Y?f9z*UCx93>sq zoRAai#Ka77^G%41k8POZF4I+G0;4ulX&g{warx{qR0TOFZLWxbFm z);|4o1K=YM3R0(nQ6voh3{B3r4Hb^5k`ym+3^QfY|CW*Dw+hTgtjGKW8YiW_tbF(* zYk0P_qV8LGsm?(7?t>Q$O?4c*!}kcBh)sh&W7`ooz2{-4)7dqcGe62;JH$dbyubwX z6_{s+VUiz~kR)CgpLs2qU80ETyAlNfTK*_uZMj?sOX+et#h(RuwYQ0>!_*oG+X2o4 zQtv|YAWQ57>Qqaf96G*AswZsYm0#aUyCFEki!??%ZwQPgFosEpvfXEZ{rq13e5UN3 zuTP(W6B40QlI6xmuD=Siiq~7M!ndo^yGwT9G$Sk4=?W(lu>maLnh|z}ep%v7utM+2 zzQ^J0hG^Z$?X0>>5>!oZV(VnOv`reYr0El+B+G$utRh*%CXs?wD+b8dmN5S{XvE+_ z9O{i35aa0v18UR-B^DK|Xd^pH6;)U8qYXTXkHrRtWWc#0PZA?u$&f0Tk|phO5DE8q zEb5RfA3J5)Drf!3Nl4<3@$GDxau~*G@+T&he|jeVJ!5~IAD>FGjifubm>L=aPH2u` z1jy8Ahn4=6@+SCfbl42bGkZ2dkz9J}#Gi_(GdCZuloYrZSiAIK-9M4LfIO>KLWsF* z@L5v3g|!1wbEIy2N~8~j7-W7-$~suAG==H7Bt}Vp3&!j=OHtgmUCqJ7XM=G`;EuHP zkAJp|Rx5=&S*D3}R}{UScqidhi+9R9rMY;ghQMN{+OMaUm&&TQmG2~&DqgBuxp(?6+*XXiK{f z6*a|2+1@Fi1{|-8akWlhHLk_F*r6!p&X&6tIt)j$%mH^jk!SJ?)jCR|_L9n7aq5n( zn7ID&^K#D_SsEsxGhZyyRNmlB_^y?Ju)mCC}9cs~WFPt$*W;pp=Q8bTf8;0EJ zmMx&*cdjhlv6`WjNI9U~J*f$!djj4I;M8*n3)t zvK&vjbyzbQ!0(bAqb#@1er)o8qA1Nr#ICrRGFqWI8{ry3_=9wpl6M=}4pgue)(0fK zi`X_NuxD@al{BxG^PU3??wEqqJL7S;IM$UQ`thNCiInh)p`qmT2H;YSDqx}u%L9VIA)ZX z#_06p@iY17Pp8j7x(c5Gv`F*yOPoEEd)>2QwLRne6q9`zd59x&;~*hjnHtrUWTC$I zn)18NtS`pU|BU09OFdj=O4d3cK_>Nap~*2gC;CpEhW|4+8RSIlQ{up%#LERz%9?!^ zs|MI~IserCD?{gkOfT{|x)9a>_UV}{D&4?Y$#2`=%H5NiElrlWy-LLUw+tiEAV*GI zY5-4wbV)R3P8#L#)C5}`5cBFN;{G#jlEl)mp&V{Y40%h-hG?(euyK}?49*ZZ*4H5l zMr{G$h8&9c?aEK>PtQQKPT&HEOd=B(ve{r_szxmGRO8Y|`+t5o`}EB6+0Y|HJ#7-<%gIe0dj^{C;?RTN_47Rf0=O8EsDU7fyOQ;O#wPt#_=wB#2d0Q!t6r_eBlc=4>5bm@+wzq5sB zX(z@>k1BM`VDQG*WSO-&NCSrt(v%mHaLB!djzAOGn}J$Omr=}e?CV53g$?r8b{R&w(%fZ93@na4aNUPWAOa>^B=JWE{qC< zD=~s18Iu+F9zGs}Wl9q8Y0iYPWx^&G#_=b~xL85=_VKaSOVsA0D1%ML9A->j$*&Mf z0E|sH_Lecq+YGWES>9fRv)y|CK88XxwnZMTz=_RIVeWGMuBhxW$ShEVm)v?8i2M3M zv714VFVZOmJMWL)wkI&WWb>qNR_v-3BY|q~Gcm;qFq>&sm+CVgxhL`Od{v2tZC1k% zrOxobk@)yMZ~dbfu}@%%V9u7wOx}{0z*)n;gi{^BpqfyAq_GAiRp^+|RV2s;MJp;!?%=)QkrP>i% zZJ2z8o2j%i-JeUu(xSl1loh^?J`|DU5}}nL*s9}2u8gE8TVP7LZZCZK!#TN1L?DRy zf(UY;C_gOVVm5eb+4>Z~w{kxUsv>@gN+DnU@GoAcq=LNixq`DKz7 zE}Oq0I9;w{4FAbzn9Sm!9(Iy}~|fU9` z{9@f!Q8p^*N*!A@AuUx_otAE*FYA=4>>X*C&6Vdun$5K+ym_K!>kVhwh59(dRSYUB7?gH~J^}5Mvskxh8Cj;?#k#GFv^JQ$jX>3s%8J9lPll%j zP9nU*(GtdNW-f)<0f~qqG>1uuIxR86+<2~{q){2^il15YpjD>k$lmgorV%)>tiS>P zE-bfPb$apyyvqPTHUKfExe-Q{DPPO9)Qa(1o8j|0Iun0y(f;5^EPh#M9N`?nv@PGY zxs#t9^%F)H!UE3*JR}LtGl+Ru(ycZz5fBR}vo>0ZWB4wl6weYKCWPs|-6si8j36#w z?Y7vjGwUjrL3b3uDfi}I8#sx8k6VXJYJ!?-tqqf?4U-(V)tlXx`pbi4PErz++4?MH zOY-=Zn5w&#{7R*`SE(9kQ{F6FK+a=!B;@nYKkDmeAuoKQG9AB3F5^2Q0hgE`|c`TP`c z`55R%oM@0tK0k^vq)0oyNU04ad4|Q?F3Q8M@MmMAm8OjCzdlutkfM+Z*>)$Px?mKw zB?9f7a2iB;*ycF28OP&)wxPhhyW2AQq30E+V-WP84?6wPVW;2e_j-a0XiNnsYlA?! zw1s35sCQRaR~_qp%QA|otG(*jih`~P_f0DTJat<7Ht@Iwo`9bbSkfho<2A@oNEQo} zMBMkl2&+&;!jLtE<23;>f-8B=f#0uZBp+h3qzrO6C)n^5VtYtO+{%YBB>*REFW@&k z=8WM};Y&n8woI4`Z3JVJaUElv=P_cSH6qUdU50bk_*#-eF0A@tR9hyZ zuVNIZB#y}y4|)3p#Ee}$12Fp6lIFsZ9#W7X#?xW87J)=%v{Rv8WbqnIGVXc~r#Z^N zx5XHL+u@oKNq#BUffLcX>DSf%FGAX8Rm{p6W8d|5W6L&r0n1&w6D%pj&SY{-J< zU7Y$%bD~`JZBf}^p?ivhg9s%#hQfnN1|n2;9oE>Hbpf5Px;EU^Fqj}KZBQ!4t*~p8 zXKGADfXltVM4>;Bi{pB-F?;*yGtiaYm#wtzN|2qr?`86S2N446%b5rW} z#?+EIm5o=>^6U*N^=)}~FjJ5TuFT~=;Z-EubHBb_!$7*po>3&1D+j>JmPt|`iGpY0 zA}NQ*ieqy;n5=6;*P8IP+4DZwgqel!CfvfPf3Hl#8aty=nP7&?e*k7Pj-kHu#WXg| zNKe_D+T1E4LV`z_yRJjiRV*g*4t-8Qnu$iN$xwho9;8-ujOVG*=9zXIE;WB?gM=go z7jO|Uz68>pw%b`z)}rY$X^JjV%>f+!In4FEGU0*k|8tbsDCaVBGbr+daJNz6VhPh! z1#A_|LS4jUY$t_toly;EG&g9Pp-8xl$7>NhS8)soe#E(vrHCp#?_4|A0uQh9J)~$fY@>vY zVC2^Bh+yIq!UNW;b;g87?jFl^JK5$XVp{qoqKuA0Cc>$3Ax7(>H5Z3h%F$KY1?7Td zZ~VOxk$8nnk3Oe7IR{o|-&7>h(>xe~PdK{BDEy>&v4zr^Op&03KIami$qtLa6@?$Q zyFqj|?#On)9?ozKYS&K2PH-0`q?+MX%FMecGzR^_-k@*1^nu6pv1O_MPamK z6nOIFUZPTPz!{p3>k=N^AS#8`fcc|{QUUfx{oa9~10&=@i4GDSyh_y$#iPtLLe(-vY5<- z*@w2J!_tq}?I3+=Tnag? zLif84E8x}FWyg)|0=@0lg-%Lstc#2+842*$iB77)GhAHZe9mQ#Qxe_T+E6&utqqOm zeW(!{_+2iJA|d)s7Kf88{Jv}qPoA`7G+A04y@_DD{O%1C%0!b4gDE%RCbhytB?3Iovo z!nR=c6;DCuqmUYm+`Apgc4R?O^yxf>{7&xpg-Wiep^DRUmB2Ls9lNGbUYl3`@}<>o zw_7m9QkfY81H0~OFhM!&w=QuKjX}kVYAsL>h0~Anlf1qzI>FJCTAN1H#Y}u>82t(o z%y@VXhODZJHqVWikkQD7(cOd*>k>*L^Ji@jYZ6M|u#=18meDQx*#IxAtLjHv zavJsbZ_RYSqNlw7!#KXhUhjK0?Ek&}LC@a*`@{ah-yih% zob|uIH`;q#{}1u-_5Yr)WG57yUJNQ|mGUbQY@l)hYx=2L#v;_Y5fcv@ZCEQWgUJkm zr>w#=@U*y`Gk&3kgyN+w+!Uots)7{xbpZj10X3RvfBDkVrMusWI6%gEn;Ac;6wXdu zHQ@tPG$;>1+;%$_qyk5YzO zxlQgmL+CO_e(Ge-NdTVK%4LRF_B&*qe~72d|8;b`hvNT(!N`^W_J_T}BmaMhr`G<% zn3`yR`9Z5nt~<7r^2j7u33f$e_6G$+|w z2JkRcc%waESpit5!{SKrH0E!Nsi~Wsj;i~{Ggl)4UeUD#Zx9RsrQxn>&Nt*8HVk%? zhxVjfW1o`fs66I1pSC9s;X@u}7pZDi!T7;O7s;dolSna)b?0 zU}M5MV{aNj@f?R0qx~q1J_@6MB4M;F|0y5xyE_BiDF5x1>_5GO{YUxlAs%krHtqkf zp!Rx;w16ZoBoS5m<=ue>h^?T_gAkRtG^=N3Y)+DY*_pi9G|^EQt_I~mV6;L zklX=j8S|z1!0qxoE}Kz^%A}P6c)Gh=XZ^P^-)Q@9-^}>0r_XM$so}q<4(yiYbTT&j z`5Abc$Ho-6LztIYJf4D%PNrpkl>M@fP{uF74p4&FH>>tHs{jOfEIJjT&%hq%676g{ zmhrV&YLd5F2XP}tj@(n4!D0-3#88L%<|81KNP)?A8d7;Io}z@FOM@uy;HN=S$` zZo4h2HC|fr99V`ZQ;NnfKoB&+z1*gQJ!g7zNdJ!3Ma4i3;cn48H5pFtBtkD7ezmbD z>f}_`w;VS$%uBSUo-X_<@8y<(+W`KoE@EZ*PhR{vB{2@ycOnID^8Xl(MvnY9+Uq^a ze-H9-```B^8{dgZ1UgLS9O`>tlJn~<_&k(SwQ)}pRm$N7dbJr|s5aRt{wNKB!surq zWf=#H%e)wc|Tw=nc=XH!(_WlEwm!<10lS)*))(QZR|QG?+wmElUuoxuiU zs;ws_Gso?W9OjdKKUoB>=%PP`c;NrPT z6CN|z7Nx!Dtdp0;VP^ zKKrk7UNpD19;g6X_`BCTjjux60ln;_&V!H~g&|ocxl?xPJJj(F)D)m!d}TQe2F?*{ zwH|L4ER6z?-la@{*wmoq)K$}7QSLU)8F9G-P~W0ew6;wPO!YCJi;Otgt3Y+vHG6Qv zDba5U>udtUD!MEc<`*d&mX*}kxV*OXbwI@;F=$qXX)0Ktr+HyADns+E>gpxiNlBK& zxDu})jy8m%n1pAY@Wq7iJo8AWD z`=0+WC|!jc4}jE(!Rg0i)4XbCJ}=uSS!umH?x0`5j&=~?=t5A1ne#9u+_TBB1`89i45s;>#ONz>9Oa1HE~6EmO^qBzt6JFF-?PN6%P@JK z8TOg~p-kP?22Kf(N#wVizVC4o;bitWi`zAmkr>H9FfheGW@MSxjC@N4g)!I7)<+^s z!5mndZ3*wpvUYGJHvqNmBPZrGin=s~q4fTIk75KV>YS+89=BTm;3`~;GM;fAR7x_x zKRvO${|jCGE+v2s`+sl0=brx#5BmMb{r@2zx&I?@=E;aCH}UGNTG?$po3ZBE0`PCc zr-irtyA=MiMCA=k+NBta;t9rHO7!ZM{U1$z@vVQ(Xdll1cQEXg&i{I&$MydpPs#qH zk|o{H-lGl4bq>HP2zyiiUlsY?umGu7j(?pZ-U|OZ`Ps1DC^$EX_o3=mMEfXwgso71g)({A?MXpXywiTEx1EDC@jE&lE{+a`vpDMc3JL z12LAIJv9#ZlTk8R~^FrBnXP4;6jM?>igJmM{>JMsnE^VD9MPj!KljQcXc0I-f zr;(D)#%t?obn*I*6%fz*FFYgeNC()k{)c;mzAOJ9j7E>^{~?|m#D6%G1aj9Ape&ah zS>)+Ti|TS|=`Wcu@~N2JmeJ40SnL22Mkl@^6Y^a}kf;NEhrH-34FX}sF1Sr3h%KeO9W%)eNce(0Gi_kWWJlXBtll|y*8`6BbqLX7%2{d_XtKmXE;ai zxQEX!_!a!JBxV?xB5c0}+D_ZA9>%rdtiZWL@xQJ1oF zB(aGMW-*z-H~>#ezO#Q6Q~Yo8l;nTmj^8z|XLK)&+ZH#`2sX+8gT530W6&QA4<6yDgu4JI@>(b=toRk-|9L*;&9VPW_jEj7K-D*Zl&!D( z9XLu;#t+<7t3?h$X~Kt5ghle@WA#ag`?!`-!etFlULY6WjxH^BuW3dWe2cU$z8Ekq z`=+)B8$B%}7w|^g<{*^-mJF-i@4#z`yExRak{K(jD_W%a+UmVLA#Kui2WF9Bsj!AS zw*U(GWv5YJ4~#jL^~9F0=2HB!r%#sHssqBW?M%nhs+dIyx_$~xM`d~a<`S*-VTz>O z00eoqL;(nRQt?xm&jS#&*=wF@DF~M|CyM|CD+4!)!EW7@=bZk)*dWu24$e>)lHVJ$ zK5!gOcv82xcm|%%3C+#eQ4%`Or(Jo*w<9zPUb!Q(1^0Fh>Xg(f`l81pV0Z+&GrJWB zX-(I{#_&#cYrzQabc?l6_4jWr2mM)}hVs9ZFK%`qu*v`D;9%s+|NY*h{Qn@2KL4{s z1UGTDJO{)HMOp1ZV4XzFmbpxMsK2*(mg_MHEQ6u?`kH<0WGE#R=OkN$FJHzr1#>t9 zU%mta=IJtyMKBJ>8fn)_bun(xE@xS{GOWv=(rvoeLdj~}GPVbqle>P?QH5ONv#Kpj zNctC7nndBYVJ@-?OMWcVe4C#|ZOa&QZAE|4ChOpopP$GS=WE_nS5%*p%$PH8KJ}pL zpwf49z&j?YjvUI%XW;3I4`jLTm!1x<%uf1ELwuJXw-h9U3PC~YY@fB$P;MzTaMaR_ zA3oaDqf zKoMs1Elzj*7WaqPA-0zF#75`|1q-6h=L}&~K z`y;jqJJYiT^w-$^ZL2>|#xfes&GpE-3d;*bk6^7hx{KJBa{N1 zOmTwq^=72+*hq7a&u0FwJ9XpBARG99?_l3!|9QOs@gPr?|Cbrb_aU9XilDyLu3x24 z!G6at-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY49182|l29xear zsN!P2x3u}{z~V;u?CJ&V3qxLMvOVSy-@^3f_q5uoLCa>lmBm)It5ILWMLY(-iW42K zxGM>8p6BUB%)S0DQhu8Fym#1>A7@z_+8@OiF6)~2L8drHqLbZxk#_ZW-mw4nm^->L zxx`8y3S*3tTmfHZv7IN?y{ZvrFhz3dmu^^8w>P83U59^>$%US!j&rpkhdB;y_^gg_ z7;`Q-#3Y3AoX}jqb+5eu)|jsy_FP<~FrQysNL_>d;0i;<6@ovR38NAJzhC`-F!1RA zkNKY-<|*_4+v@-3R#4XeH7EAy|LWTY{ogLuME|#I+*1GFLa8_Qx!w#fxG|jJ;wign5WAAV3C8MZ@p|jaey(NW z_P73YKUVj3)z8`K@BPBxjkVX!{Qs8DKMm~vdxMhx*Bd9 zkovYsta`1JUj`&aiO8jT<5a8#2;dh`bYoXIL$f8!Zk74f1mbD1)kxx4rHPU?JeY`2 zKj2tKy8g48yB{CtspJ208FViMnckcJ-#-|-^50lRERUK4t57covM?9WrY`EWsVX1~f$)Fr0-(D-HB52*0#-fpe$(_04i zQGKO%9n9x(ulc&3M*RPN<3H>jj9mWT@9#hA{}1w%?tk9)_}9ZFi_>5E(RcVOKW#Ys zwMsQP`n4+DF4)5sj^FCd*?*s1ynXlb!<$!IoEo#y`+Xi5Gy1u!vtl_4_kT=Wamc{h zzr=BTc7^kBZnyTs>-VpIK6>-UY%O?q5*S6^zx#0h>Y{Iz=pPI^{ZXga>2>>qz@O+^ z3}yvUd=}1lCn9S-y?A}P8rqnNX0NZgxFw_54t(QMG39zn`~%{{U{q9ps=mv-`gAoC zDQR>G?@9cIzE#710l6@lFPRtGy46TjD9thk__zl&{J%8 zNm0g^`)+-?6jFLcvPg^!N>)E)WFdSNgd8W6go4ePIUSp<;_(LZWq%06>%sKXDGVAN zI)@pGI=Y}5MuCj@T76N}v3Xe2q%9>S{|hGUsG3du9az~IuTX+0JhjRu z(8|3zR5X(R?l=BNZ`2=@{J$UL|31uf5Ai=--LZXN*+HM0?53$__tPrR?vJM@7e^n? ze;SL3>dv;(gylA4x4(kPXo!;V>u__bTmRZFeM<}A#`Qlc`~N=r|2)i7W&itG&HbHN z042+)=NrZ`h~K(b;B-s-o;KN)+#?-KEL-31Jy`gRJ~zJ8b*J;+aQ)xP0<_8gGuqpC z?LWiOWBjiNdG!8YEUw#HfV``xumS1MJ}Z#^xWNwOlxt!Ma;j`&3)&wYI@TcZ=GOM0 zLMb_Wb$ayv==|M#%VO}K!K2BjY%=;?+Km4G`puiOpI@IJ|76WDcLS_6pA5PA#I_sV zi!Ei?(3Udv+fvG%ym>7{CW@7%mm}gKP8Zyb%toLU!)ZEiklK*75|GT*Nubxf*9|x}d*FWg(J?eiC^3>*k zg--TY7%M0Iw=lia+^;IhgcCkMvfSx1j#Yk;%{J(^d#B+oOjYdylu@dbW42>oVkqP( znGwI^&vRj3$v3}u%6B5{mS5E5`u8{mVFRx-Hi1QnvXV`hCS1P4W$c@r}Xe#@V8Uf$;=;mc;!9B zl_X#X=-d67ZESwzuQ#s-C^P|!vo`xyZHqNTNNj#*a< zfuI6Zp?Txa?QdA0s-Tops%s{LKcna^j-nV{!Ax+3z>k}_!TEz*L9JWIqr?F$vP26& zr8X@l!CJJEP;=;IL|<5zhi8BjaVNLczhDPY_O;!8KF>ur07(k0-1a7SEm4# z)SDpBAe!P!-RFXuI+%1bvdno}uRL3)1SdHS4A(bmd@$2WU7-m-h*8%6rp*}hESoWB zzH~}augPtpx~UBP=4p%GGwU}q_pLQL)%%~t{fu2HS5uqErEq*cYL8n#>&fHvSs zOvgsXehoxdmWfUaLION+64OvSTru_J{kMV(7RVPcX$WIg+b-8grSR&J zY3=;F7EzS)M0>G#p_zt$r6t~^jE{+tQI-F;BxMgy7UhaDPu0l?A9Eg2(o6Uzt!uvE zd}p=Kc{-@;>w*)WW@w5(2Ld?z>;qfE41fs?FHsVWt(TjT04hhbThZL0)IgW&0-n;j zTor(1xtO3#R47r`Hz>c*7-*5accz$h9RQ#Es2oMD8@y4-D~~bR0rQ982y~#9KB0I z6mZvhL&UP2D*%r~gAC<`<|O0pg@#^5@xQGGo4EaAQ|CoQxIkG+d|bS=DR0$XPzR}`@a&4@B93(chEm@_y5Q9zlVCZ z-v8Bs%6;tklH_W4eN#QW&5rM?nOp7lEmIl&t+srt{qinueyxP$N-%U4a&6PFit`{= z2GcZVM;;zor&O}m-JDK|KX!L(eM=-oR!9KmFx=Lx>acQmQ&fAR^Sy3^EQuJ`I=0x3 zHNKrRBRL64Y){252!1+0KRwe1(|UWU8g`Megwk-1*f`DeJf%Jh<7Uz1MuyTIk_kyw zky~&aFKLdl*QdcQ*b(7s)W==9kBXexx?p)aLiI_M*FUX&)hTp+ZC(dg#y$(RSD$l~ zC6J#t2PP_MR!QP*d#W}~ zMpZW`qKvm4O+}tTQO0>`3$(rp^+1Iuo)@(ER5dDoI8BD6lA|C^?9?WZ*QeWh(UrQL zE+;Xj^AnOYHDY}fMT{RRlBoJ>jcz>%t8u=MIre(C2R$>);MUG)q0C;Hxv;p6*|KJK zOp~U_l4P4ZJH<<5hj?mU=hnHY%#xBG+nSdYfR(w3G{Ca+TY8)=B_hWE= zeA@C^fQu4E=RL@}$0%M1RvSfyLOSq_&kh&OELM9$B5qw~o0G7zh#iU}m&lL1ySkI= zmC*(D%Gf#mI=hdi#c_LrDtD#bs?Tg2*_CTOMqy5}v5!NDPZg`w{w&vIwLfar+B9dV zTJF-Vy{Q+&s%-Wf_R~rs@>LRvbLzVmBTGX=mlKNAMH{FYkG>;_Q}2$bwqAqRY{_lv z_>E}V0J=a$zsGY5W^&jwk4~!BkpF=5Pk6TSdw4e5e=dZIb{i|uru#p8CI9b(gZ;<* z-w*O|`_FrnFSA4@+u$lEX9dFMBV%~mcAv(!99P3P%omaYopKH}ej%)?#dkkn>sWlP zUB}oQuWKEb!ERWvuWC>1ipbwRuoI)ihP7+5J%0IlM;T>Kh+x~?Ql=1O!>i0t{~LTm z|2OzQfp$k=J59C2YKACd$->ET)0o*EcE-$hnr1ZuHCek_{1PUJ0HQME@AKoJImwYzx|KY*@sC55x z^mzXNAdioO>x;i){)58gZQRBe-$41Az9bq$yu7~S`yqAa=ZCu_ajmY?2-|;zK9?>L z?QkyUzLk8;fWp1@7%zXy)Wi#%21Orb=Z3>Qqu){;W>vWD)+i72Ie*_R-pPg?Q2Mx@ z_rbD9us5!LaBcdN&N9~vR1pDteV)dqroeOr-oqDQr|?o_g`QS=Tk`UL7|u6WwRB3` zLt5borjRfBJ{Cjz0_=$0M-UVoJ^>r_-Th6vv}{kLMQ$?$mum+P0W!uTuidK9v! z^5j4)-#H1~^YduSpF^d5I+eB6om+z_G{^K*_Y;e^InL=!u#zGAiaB80?RIPX zfB*uZ>pDOt3JJ#mZP}i+x4jr!%QeTgo;lx? z$G8|g>)SGmOE(^6mxu@7e7l z|B7dm|8IZLcjf=V;4%OIgFHU@A7!}}yjOX<=!-3lon7?SY==WZS^g7=BP-IS;m1=| z*!GX{C7+S5Fy6aDfmNug5yxv*-5#neUfd}tw?R$#$ky-T_DZ*6dYM{D6Nq0YuPVpKGyoukd3UZfeKD9H=& z|F)?zsvlxJT|Q|YjI``&5X>E1qBS7aG}I5gu_t_WLkR){J4R-D@Aqv+#fWYiDY0p7 zKUBtM_tlNn4TolnrL31IzzM*gkBhIgcH9bz_j%~+m$qNKwtrjgfF13U>kePX7&b!; z+15T@Z_`jpQ$Nc{f^6(rh$Ksxr zdBHj@b~2eNgJ8W_(FsoG(t(Ia_M^mpj{TAO!qY9N!&R$ zD;e!}RQqbB8i1U8i;mz63?D|ArWr{y%!HT1?#JEj+~~Di^~wzER&+{Sj}0Wt!O5({ z7!oGkRX?!p+Y~KUC_5&Ll*ixuYroTf9(b&A8%MNbhjNe@Oi&K3CcUbrVEA(sUh2W1 zxoB^_-Eb7aKHJV&Z?i60QSx@{M^N56$dyGkfad zgyt{_k=--X&Fqo8{!yPg{x3-9-s8Uv4-Q=Ue>Chp`hPsg!}-*!&nc8SR{2#9G8N%l z7#UQuCzG)lt^y+d(TV9r;oed)Ts=NIQIjm64iBgoU`O9=_Iy@qgZO0ma_m;#8!5CB zzCCchr(01FEw>O))BL2fgz zJCik^;+H39tSnAuJVE1br}cUYGO+^)AToz1mDIrBVVMhfg20k8JSl)2d5LX3$rMgP z2H7OFenp=29%2f9kclAfh}KHr%Jfz$;?SJx-DbM8Gvm4SD%-QrPJ~O2ORZZ1v&{R3 zKdqj7c}dO^4V>Fx5)*%!QUi9SA}%}kTDM^|yc4Xwu z$y}}(QHo1v8Pt zNs6*~4MNC>LJ^7DGf9$XB#u$W1Hfz|5MBCwoq7x@Mm{=OPWsJ9D2>T_p^su6Q_#!O z=W9ERP&HtP79^pl0xti0hPDPvbC{#)GUkANkk4cRAMAF`wb~p&u!1p;fZOKIH*`0s z!pO&!D>rC1uYsV+{{TUU|5x9C3BdH1DA}~-{Sqa`DlND`hjD>M3&CWG;@-{eIE0e_ z>g0cl^5yNbe{MeiI~bPYKMseF=YJ3Kcu1B{yW#oW{SLfE*-Wg1n1nEvTcC85P^yEB z_9(td&P%~}-NF&Up>uV=vIC5!j+Qx@p#)`Y<)wt?vkcK+Vvs^guSgbAet#UH2t{?U zBb1^fLP?1E4HX5ZgOh)8Yf4?K8HzByRf8NtqqY_>!!VlMsx=A2ZLg8xrf&VK0Fd`< z{~Zht`tJGvXw-X*|M4IXmu_ygy#4#$suY9O5E3OQOOufhiv%^1biJ#swWKKXRM{a5 zoEI9OsObhkU$9~CV2o)sb**=YAH5!=b zwr87)q6T_17L_kj z9&62QvZ4$2e!^?l;o!xYk7?yj;WVa&-!kqx=tLzEl*A_Y(}PWYgRMz`*(iy5VcuY_ zttdrUBKlU|HCjMSV5MU3s#wm-UvvZL{_i&dt_cxvjfmw-u1@j@8Nrd~CL&?HjOI zqmk{|t6C@yYqehA`_$eUJ1xVz6ILq0de~^W!R=UR0l7K*e8tC+UpmDxnxP2rpk_E< zGfe?~&cW3jC8j)!<I$ka z`myTUEM1nrDXi0F&W1W`qa;Ten;N4BvN@c1dr&buDT&UU3G$4Jzhf_M3dNzgqcml2 zcyc?|shOS%50LGMuPEpneKmDp&;x^V-2I#5$8S0Rc=}<}(on^G(=U-54neEYe z789HZR}Nv$g>hU#*lM3PNtrIwg4{xqgfO@1+nRA>>OAX)C=@eTGA6TD@~_w6fRshC&vezTxwOMNt3m8Cv4zy{npxlgCGGqxU@ zt#&Te@rxS(aD$>Yf)KF|RCK%{5;lk`EcB39b>E_g7me#}(Vo*+n+R%K z^mb9N&kV0rjBpVU#o=`>2X$GYOs8PP1u5t75|LAN&deei*DlxrmpF-Db0a_zzQrzM zg4!uv6nz2uy}^)iOU)y_P^=)Ws@E@sykEgZq;_GWpVlHSzup|@^v2k3V;T(Aug?FE=WX7DoXA zTW>)Dr((a7P1)VpvLzTrfre7nS$)g6WM5XCCwDVqqF;dWPsNKgMyDT-123u|$hm)R zkgmcqeN@8x>2w3QIidL}%;$DU?hZxyDasa@CtRdw999J&yJ)bfZiyQ!3~C!G(5x(f zqjhS}+p0+Jf3Doo9&!R3BU;)gHsB`4Y6D`PNa&3)yuRJ_Ouzr1KKJfkFu5`<2&%J& zi*4NjH~9bV?HxGrp9lSe(PR9N2YG7qzvpx0WPoRH7G#;2JO=!WOhg)ZOhL9xS`#!S znYt&#FBiu#x1QHz4Ko~RY=ScavvEs{b&^=NtxYMnl@yf}!+OiGw)2dYMLgcMsU28|Yu~c6PrF7}Z&>o#GNd;EmUVW|M%a>MLhBtPGxCH=Sz?r=N zEqe~*6es94d*8`WN+`}rwgz9mj4KM|P-hjkrbI^IUnWQN14Y>w^!SUyAUzgRIe!b| zm|UHzPp@bQ1?8A!OaVcq&13?J`Wt{YIC}G@1we)ha&uuP%0;3vAKSBAWjeF@WaUIzZMw-}tyX=b-m=m$@y~QQ zu|LWe1%Ofs5B7H>EBz6ljq;zo1B|kp-vg&r^`4#B{2@ymN+Epr21na6Ie2ZlnXpUf@EsSqDHyAr~Ap6CTq=N zT2@xO>+2fXWRtFF;Rv&tWYz4iyTI=5aC7|@ss+j|gtbyDF`lAu9V+{U{&{=IIg{oR zq3kRWrHr8T=45<)TYMWEL%Th2gBU&F4LbIjHc+w}TRZmYkFQ@!dgInaYYEh7Th=lv z!2S6C-G|eQy9Id{(5`j#jh#v}WQJh$E{WIg3CWo(M%Oe)3oeOOR$)5M2}xKLP?EsT zMi=j29lgAGck<@HFW$dSHFH=)HO2o6g{$F2o>7xqkL2< zoT|DEb#GPk&_q@YRVq6Nar6Bq#LcqXB5u{)jJWeoPV29VX+#-Xpxgu+(X$81ZND&dzK6)5uA!>M>Ittp00U=T>*k=hbUR$ zj3f&-BFbURmnl;J@bhkztUT(}C0kY^(}1PEXqSnnm(B;h2%oM>3X^?WXAhHYfXdJ> zOPrwy1itQ35zvVrkC7=@z?7;Q02-mC)RCaaFT>Ekj42co^0ZvsKz_l~%ZhHc9rWGw z2{J`O6?lulNkBYHq8Rb$_;kh2KrUO zi7h@{)bX-klU9J2eyp`iSogaY5P=fJxyX68L?=gQ z;OzM5%`2edc|?G_wkA^|I>}0w?ahn_w1DLyP<&J;6akOf$9?2VPO-o0BLrU5^rR>N zX@|7pRfXx>Zzq3xa|8LKq3!qbY_$KSB)V+`m<{K@qh2Zg(?Ngu82|M_9%27$ozHoA z3}Md0IVMSs{jbw%WB^P_WX6B7#9?h}6De3ZhjHK4T4Tzty5$gsHJhC;o?)lL?Ba3M z=gl=YN>%w4+s$N{aDXwSR0ZEIy=-nRqTw7x%NS(}mi3}JoH?QSiAc@BN*F)4gQ28; z^>=M;^PWmV3oDoYVHtj`BDSzr(F+64alE8C%6`BZ&40%E{3lV;k;N)1l(#)Qs%wBpFtHC~LtKmK`#O_|*X zK>gaj5#vvBsCuTZwj?r5RH0M2pBtECXBiC9DatVC6(osxC8NZTr2-Z7&)Ba%HqioE zo%C9An5kerTg1r2c_kDxMVE!DDI`91K3N|4mIXxJX1SEP6)(}6RyFV|SSI)v@GGDs z%Xt>9UB^07oL;F^i4~x1+oYj67a(jG98h+{DH@Z(LCZi(`nfwWF8~xb=-dwmbf1bW zDL;+DjwwrYPcK1dJ;v#9N@6PNd_3HNl;`pTSy7 zRvqTWM0!7OKb<}>n@g}j=ro|m+C`BGs4L&SlVaSh}SporTD`Nh%Op%3QM@S zR%q!dX-0AqlGu97y*|({#@FDd^YhbyyLOb{pZPwVAM^6!WJJClgY)Cl(g{xSl_6e6 zsC*l<8mP4`-%-Z(&HSIAjofGc@4eB%pp^f6|1tmLgFJ%&^En10(;y}Zh{+6x&A7fi zI@9-U(hM(PwpMu&r5^4w`;vMhKXhbuo#WPosV;E`MRW3|ui2ux0U7nAJ-{w3_l>f$ z6hlf2bVacOw;gdnC%+2oaibmuDlEE#$L_9o5kKXld%jLZUMtRZbXo?vIq)JUayw*y zTi2Jw#G33+6e{hmPIG2!>T?hn>Ov2cDoQ&uCnn3QR5mH@?Yk+U#5bCv(B}d%u=ZHT zA-3=&a!A0M_;$&gp+Je>n`nEyN5uV2vs7^O;rv}tD(o3Kv-N`G`&w~QVpTxon}0pJ zmXQLKf|ofxQ#+v1hO^bVU)Tpfp20lN(;rbj4t%rbmR8b4%KcuySp}+RsklQ^aviP$ zK*Kp=0#5;gBU=ffa^i!-tV-pU($vpw{5Gh81j zDX9Ex5XLW24AZA>Fu#vM-~P(Q2+JQF#W89JY5h|WnIm0`Oj8UoJo0+D52iL(8@ zA<)#e=DRSh&whvv^$7o;ceDR*l>ba`n;S}j8|1&iUT@#M|J^(2Kgxd(@o*LOqcHu} zSO6;Xyi_`Ex$1uNaL}eLU&MMN9H=F66xRmFFA6QS%NHSUY1cID;g^9I8by zJ_{uSYwKR6dF!&X;ef<|p)OGX>1HN=Z3{(oAR{T9aYME!=)Tq-TO!pa?HZmcrsNPlF3Y$-pB$*SA3NztJ1K!0xG@w-H^~*AD-w z%8s4xdMuj5@<@`byk5j;>gz(mZdDO+(I>DXCO;*Uf1xnfEKOhc(^PB};AeSAg!eL8 zG1t==sVg$J8ZQ7;wk&Up8E>9~l1f(FX?*}Fehd06*uMeUYb6##BWj7iPd3%HCC@V5 z$i3w)iF7^V)wmobVG}?$%32NJKgI?*di-=o)uM6j!gNASs-L2@RLSVY#Zax}O8Rhi zQvJEMcdFF64vq+TTKt-U+T0Uyj$knuI9Tv`Ir%OFdo#W<$u#LxO*YfOTU)crMK4vHpu_``+Zmb?;i{v?)sgf(X+eoGUupyIqaTGdZ%!F-cS`u5e zzgY#K^B(aF{2k8B0|_Dk>YUVYSXbapb)wyF!4%67L1VD$w=QuKje)p?)LNh%Mlgqr zPl_x;#?huD0;()So|_0_(~|9n8H%XrRWwO6w8CU5{G% zh7k&l*x*I`O@Oh&br9V~`9888jusrNy@tR_I4X{A-P$gOkS!s8S>a^40Q)`v(0B`Z zd#eERkwHmlUmvgTSkaoVrnLnxvsjLWK5qRb9(TLntj6E0{_C4nTedRZ+v|W#W>%MA}}f6}4W%98MrbK+S)tm&+_p2&LO$`F|;m7bHS2WSGPU$2yH6PEwNP zjFCC0b6& za32ct(>)>~MC5lV{AGz+*WRf45|WG0EY8JH_%zMcsG$?~>GzHdKW-$mj zRWcA;5#$ZpV3hw5?XZ>WX{W)WyfG=0B&vb_r*4M6PH=vsW1vm31oKs7ghr?gj%*8f!3z zD+C~jPz={70&E-`s(Gcm##?K71%$vjGb$oBX!xF!qvC6uwO&M-4Xjv_s*oE3-;RLq zmJ?C%gQ}>dUt{cgf7tqElH(YpvkOc!1fw-*e*oTo8-Hr%|K$s4&&Bb9n9wg@{u4w5 z&={c<3;_F)puiV%_x1FI;D9QgYT=wgIw&MRcGyrb0|LqOk{4az4=<)u?gFIiC z{m0+m?!)+JY@wU%e-eSF(Bz+WU_Fg*Fx^$4TY}~` zz6Dqx-ZwT3>M`>csp@~dWpHCZRjW5J4;HXZmC<;+KinHwT4TNVP_H|B>)zOC*cA6_ z^WksMmyM>xTAp|}hQuZit89tRp!-SX?gp%ZJ&R2k`R{QQo!{aU0X<>GO z4VqFJ+D&vLPm^^z&jzK1Lo+v9@uIZP3c}(4ZMeG{HSR-{mo$DiQhY72268j6FTvbU zS{B2#opfuUy*2!%GVN{J*h-SUZ9`khul~j!rKdmXTOIe2o9}Fb}`~zru^LxC4S?#F+kz1sj%dj>h6L7>{JvdXMsDmH-GSndTrN5js+l zQ;WO-El|noKuL}JG=!a`!O!Gn5aa_YO02&X4 z^fMvw4@0s^NrDoV?*;n6GWdoQ?Q3ml z>S6_zU&QM*gf?arEuRp*CV zA3R}#mve&WY+DW~A7|Dc?n>L;*_4)7t>TGc&wDPYy;#m)J8x39GZyWn+BDb9VVXMk z+Xc!J#1M5b8RnhNDn_bWflAHMR5H^taH9PYCBDh|nOe05 z&qWQgPJsSjoZXfeL>Gu@DaW4fG?t{=zveU+V(;^v#`Xes(0uBi?#$In&>nT*KK-~g z9JY=}?dXG68M1!JS{|`u4%nU}^<<~%^Qanfq$kic3|aVeiiUBd59t}7+y2{U|BKkn zPqh92uVeE6dw#|KpH5x(i~avOKF8VrCU0PC1k#KfLo#?5C{|KC0E&FX|N7v$s%k3! zye5PhH`$P_9Y!3sMzS^NuVS)*u@IYk7(jW1Tmlxc+ByS zZbXXwyk(ID=1d5W%18pxUdzE)ycZ_*m@O<}^@J;kxNL!p z@1ZipVR6$*_bgLwZJ&IxOx5u40yW_CB%)&<|5sYt@6G?+iC@kCKb-_$^1pqSPYeG4 zU%3(qD1%AFjV?(dR^n9@q?;Rg`>hw~jb~r!)r<%(ND>gCG$uQlXqhVW!!##EpaOje z%PkJ!S+Ym=qng8fZNvOuy|c%C_MLyqNG9GieIf%maQ;XBcv8LpaosQZpFhi|z5ZuP z;2TLHK$ItLlBSx3L_v*0gc_NXn$}hEKC9A=HmSI%fbJAe^Y@5 zD#_L~wBqI;e;B9^1F;SwSs_rGSUD8nq&j*dXxoHK#;Y#2EQbN+s_3D00hl_p>WGJX zG>n%%01oN@Q#Yu} ze}D2t|NktXR`Q>lpj4(s+#;E&SXJjMjB2O%j=~i>YtjY^f|BNJp%93#n^ghv)zRj1 zeTWJ}tD3X9W>?`Eq8hDX#c)^i+|GG`wtXnx9|Kv!Yskb>XSVH zhy1^;KdzpCZxVbt|DWU2;{5+C$pOFx*)p)D{NEXgWBz{zSNjfrPD!f$EnMw!|6UWq z_MP!YXr_`bt_Z6>+>anbEA-)eoJ62M$o~4*=s*ACBVEJMWO^pkC;xnY{r2+h4`<-I zm=%Z+Lm@*Ec>e3J!1NxgJRmaR$H^&3g=)jcR;&@rJnk$b$tvD~3~}^1Q;Gm106q{L z)mM=MEUw=&5^ZHIMwC3@j3gVBFsJvQI9U>~W-O&=!(l{1>MSrz;08M(*$j)S{=+qS z956E63ZBhi5)ITS13t>YXlcg&{xO)+m(OSWDE{xPQM|$8qW|f~IPCwe`hP}&JNm-^ zKgZ`8xPpwKED_#SNde$-jS{ff;yB`5DTU#^xP$0D1LCEas{Bj=U86V#+_sZ3A2?Z^ zf(*rw;Rhs=iW}d=IqTo&v{m!vo~*?^Y{1zpRp1xfRYUY5nhT%7)<050oyG8ii$ENI%}3l)~qrehA12Oj_(AODb36&dA4mV_DyZ5*giLCw|#D~XZr%%e2*KXY5S&?xdz5u z-C1S(ShiCp4FnX4_Yw$XC?OBxVR=TloaGBpWRYYU#EEr6Q`>~5ohLM@OlaCTA^Ya> zT^rBZ9lG&s-=Uk>COPRm$#G?p6LXTmk&_ILJM{S^gZZ9Gj%|}1f6`H`lIOV7M2}nO zVxp5h6ZMUWmcBO-o7527kOu@{9E0322l*2;p_<=bTwF_R$1Q1Z%xUjymA0W7KFkm( z>*Ei-uR$0im~2y-!~u(g%m1kpn}QUs5P)ETS?_DG*ltoa-`>|CLoCCq70T3C+$unj zBI_1Rk2}!$q^46bsb*l~mV`T=?*rzy1m^DnHfqQ1$D?2$u$GvON|>p=D)DbYg%L`r zFp4Y>+3J zbbTvhvZ;2RHM@#pH?N{m-kkRA=l5rcPslwii*8duJL#XiV@35eHBa{l&9gg4vrN#Y zaduWXD+0YxH@$)H9y!5IT-Gu{n{w7!H>;>-6Jvs-d4=;pSuR$T_XLn@(r|-BY-5JP z4DqRxB?wW*22_QBlSD6yT#8Z4r5M?l!luG?(%^VUzq}M4fxYg1d;?Kr=Tog7BMQ6LA;-6@opxO|{(5s<1 zV8y9WUcRFUge1#Q$l{%veLGFtpY7AMZQ`}->?@xI9UOl0E)5)9C9lt-s5|kSvGIhb@PJq=FQ5R z=T$eaz+P5M&Cyj6`&>+@nNUY1+g*Ku{EyV_=@}Y!$ zGGzu`%lgPvElbOjJ++?fsYRcfcGah*WqoQ|)~BkZffJ=Qr5RZuS-M870K*$Zwz3HJ zBZBuR19V3j+ECj(nw6nxS7m5gR)(e}Wym|yE$L5MN}q{U`b;g_)3mGhG%agS(~|b& zO^=-5xScxdkFDzL)S^92yJ}CE}ePwDa5pv?khW;MQy5SAzBw#}hgkWab_@<~~c zPfCLP*ekbD&`whs1y)UEViDw%u7Z407UYwXAb0DU%8j&)ci@M2m-==)COd9ApO$oL zrD~g10p()M+A)REY!6dt7W$K}LVr>g`je8-Z&(b@@?aE+>_9LEFvgHlB;~$vAt10O zl!@3tb8X~0v=a)WnbmJQu?YQ1SD`9U6mKc zTnM&H5mn34lKai9y5QKd9OJIb;a6gr#s}8pJc{)8E4PElq68^`;5C8KcQA%Yh%#`_ z*F{agoeDUzdrEyJYWUoB>HhWSt97oNlgcLt)M~i;wx}q-b5xXHiHh>gs3>f>=v>FN--2(J)j ze1)cgA1udHxf(5RAV=kxic%1rcr)`{e03s$`z?=@zwbyj>)3wh*et&io8_CaS^Ji{ za-{s0^yKfOr)DkJ|J2wlw=&VOIZ?NAtYmsC>AB_7vh>JZXzMbt(9nK`^e{pRNdn|U zb+JNT%N6qWtx&TL&41`j2BXUA_{QpZ^BNgk$;SqRmtl-kia-i821cgY#417GBWqym`T%7$&dfMS&+T3Yt9ha<}9QJ4_OBDZwB^%WWJ}#H_o~tnl+6 zI`4*8*^QC88`Zn$3zF_YIemgty9Z?iglil}vi_09kL=rGr~HnwQ=(_};CaoHQMwry zXnDdBeW;{-t4)e)t8&-GkxU3%i)$1LR`>xW@+!$|d5z-PuTgwk6qVmGii-D~SC+>$ zmnW#~_5Zh}45S%(z!3uK<*A%}xZaQmEFqTHX>iL(in0xsIpyU_OxjsA-o$Fr_?7@J zziR-O?^G1nxw#B=e>J!49$?0KiXsbX(Xb4`O^g!+q6OGyF$HjC4e9nR5mA2Eh^R_1 zzHdZCsaZ6mVbdZzE0Gl)GH6`P{K#pSfg#PdS*%O1X-+$CX8?L*s{!a+JfVJ9PpI!y zG)7Zlv_Idey@8PG8=q`TkH2U4`1=;msNdBy>N^#k%~aX!?{+G3v!(ysvxj2&7Qdw5 z)i3Fn{gS?8s%q}siiS-s>Z}!2lp_B)G;I1ncXgnQ#^^XStdhJd8dW)d92z!(*->7O zs+-~-gT~0RDWk5NGAeJ%sJtm-D;mw4GU~c1qw=PV%9~Fvt8#_>^j%5>)g2v@U@`Qd|uqn zMvYrBYFxvpIe<#@_PCu@Znvy*yN1fWACqR4*X^eAD!+tR)?C~|@8!76thh8Qu5MSw z)h#QoZlSnxG^SQGniW^KtK#aG6<4=VT=%2VtWLUJ)k(LyDbwT7Xx4+=u6mGL)`Q$a z58`OptO?hm2f5w!pqx&}WnBE@aIx``?rfxt#^^XSnk9|fRnoX+N#hohWR`w}R zu)HdjxQB5GILb}bDu3vLO;C}05|V*R5!|C6vcY=ZqfH(Y@pRLO z-Jj1}*=O^)#XJjaVmIh4c7ux84XR?dA3fS<^itdfk?LZ^6lSGS8r9k zAeC9w9ubI0@)Z*o2G4hhodB|BfGkxyAM2EwI6=@^sR_zTO;A;8YBS>fW5kfi1Sg(0 zZj&uVQ9e82zt2ycEL0ClEtVwX>tUN=ld=?aRhELXf)Z5pq}ue3c4yrL0K^hDvFW7w;7El z519DAD;nc68k2p?rg#rb62ioDq1Tu)N#Wx8iTqO@W6q7zjD(1CQWxP*^U17wTdG)Vv`u3ia?;V9NT(JS zPw^@moo)GSYDsskq`Z73oy4sY=^H)~@h(etsVp7YW?c0&zE%CN(GtqXc3-QjZB=_L zhC43(8PNhWPc|fv8Rd!r#SsemB;#l{J`+BiYk#tAAmPJJ=g@Bs-y z$~7SAZ8v(M# zQWc~eVJ-FAz2}Iqb4M%#%0Mx6v-H$d;Wa*entn74c0`3OUPy7 z6K|K$V?MS#I8<0R&%A4hh3x8YSQ? zrjOjs;q}Y&7jItv9?4&i$p1eXRqOwa+|l?;{@2g(c?K@kQw34ax%d4xk+FC&USu%a z32ovw+oB5<#dfH{4Hi#bKum;FhASe)ui!jQrMaN~UJ{`VKtS;Z$1u~WpHBf>W15fg z2&u?NEyQDn#KVdW#0f(Qz-o&lL<@FY@L-2ztKkMFTNn@jf6?QH_xOKC?hm5R z(DepCrYITk?H`_iCC(^wdINBSkeKHCpYc7mK|bjXz(s-53rs_jMMdjKe&MWEL-rHB zx_$NYEz5W(J|uwPy$}v<#7Kf3hvAwKicWfi!Ju~@$KV>T){Jts4rLE00t0YcCT$g< z`zMn=ivO=sycsC-{mF&Ee*Pbfy~(t~|9yWn{lfo0$A|MU8SBeA%RrW7>Gce{#uTI( z-oOmUJ6RNfGhw0B?F9Y5J-<;g!TfkTy;tNBJ)rCqJRYr zBH4aK!mY?W#3A5~u!;0noL%VfWL44`CxSDmbpDDd3YIC(HlKm;qc3)aT;d%BGK}QW zy%Z*>$W$P_m1KoODHZg}d<6f6ICsC@rJTF#)#Lw?o@|rX*O~mFBm;UM4O{S{@P&L- zzEAKG-2M979ry@tQWWCl4!~sBXg*S~Mwxg}$E`>HW3~gBp$&DwOBk-3ZBDu-+c=V* z1k9*#zTBgoBgIUSoFRk>SjgK52Pmw$6=&edS@{BSVg6BYM(yAcJ5W@N;FJMl-hV(6 z>hPvq;z;!^Sa>#XZeDScvybe^2k4SdQC9 z@`nLRc+aQ`+5ta{S~7&Kjg8~BK1J+QtaGLi;)uvpU1^3w6p8A*$DpPP{?}1^`2kb$ zG)mn;s*UI0R9E0u+YA7GNX4ZS7PiJhB&MaDkoAE_;0{NB%P73t!b`bUnhw1WylkaV73;=_liVEijoGrTk-T9!$S<+fZmOr=Oa~l zxe57+IC(x+OFo|WJCcj18QCz1<0l}M9F##SxpEPcl~gk68jBqJLeGuKJ#J4XdZ1Qh zl4Ey>ObqDV$Rr=BN+u@cCnA%4td?Yw_iITej@ZX4-kdyA$ktTu=}Np1AQq_3rvL2lQIBD7rqR$BXZ_(rnhbT{e(@8x;xd z;S{_Og^_8|BqRwH6}1@1w!(Sw{(Xj)zZBl@`}_<#mU-k2QcvG=K@i1O1I+(s7CtbSX&DLS3@SUg9c%IO#TyuSkr; ziaC3^d`sAsw9aa4elCZQCxSx&sRB`fo|#uR2K3cB%=ikKR|KNl{-LViWf5uv?t{nx zGx~p3<>|3IpZN1JTr41(y8)Vy7v6HTj7De_p=mf?j$98;7W2RzPXd25_Cq*B3vU`N zW?{4l!u{BY(K$w0gO2j!1IjWk#)Q4aTWHfz+g!z|5J0w!&=AIQCi%wxMU(KioYh4U zfZ!F$@IQIqm|H#ITy<1%3d?dYk(izvJE2s7bt4wjB5kIa>M$*+#sGfAz)gcS($L6p zH4QCBoroHDLTe{zcG<|cprx$!Hv`69z3sk6{Gf{h@94e*Ly zqJaqgOjyNHuYw>W3&sbHLkf!UYkCZ_s+d3>-PiJm12bnCiDQ%Yj7iDxD2T39ikq!05Vf1iH;u$OgRuWfPk0Sj`IX z4g3I9&waqR34DM!7L?Ith*JOZKwP z=dJxhxW9lYT;Lcpj4DUC52L7m_WqaCew2}v|4SU|i{i3W z+>~>AE!z@KXu>30#%(=q$o=r{k{|2x%{oU%MoN~M!~0)KQqo8yE7~=Q%6AGcwaqXw z*$N*Vsj@#NxO_;l!Lu2bre zE1A<%4g)rD2QoxS{D440V?yq?srKxXL_TFOyc!g-ZK|j@N@#;3s?O>Q9c91>=wHNJ z%24(_&M4~xycBMhxA`>!5K>wkqf*nKFzQ`Ngd3Cpnjc8FLwhpc() z)Lxy(F?rO!O5xH)ANYyHtmvj#sDOp{8Q%(Kvt^C<+0&(-W}CcY)iy5m&{nIyUq5JN zaspJ1(LqDAXxP=x+(4XsrQtXxst*52*&W~G4=8$rqbNp?FhjJ#49S@`(OMKtcDd2L z;eA!t<{?_yg!yV#VJ+*3=0~<4t|3ka3rKO;7w1x|_!Y$RoT8M=Qgl*6gkwjxBI<-trGaepxG0GRTdI5|rIi-E>->4O;uDz4 z%eWS!iU)B=k1ARpJ*xVnNZq?f1u)ynxE&obn-7vRDfK#nnrg3j7BR2muxaK6@=~lg z8-HR>P@D20C8*>mm11k+W3qP*!r%>83Pf+IUCDNuYs>33oX8T0^pu|; z{y)S*$8k;^a4Gb#3~^*O(jbQk@HBu^L+KDWlO*01KZ{;4yGId#I&gf~fIf@sBvHuW z+t)X_^v##xJHpl~l<%!BgDurM&R|py3H?MyGoRAXdu?a4%^}I((%3CaOw5js^sY2M z5aL~GZIA7~U85=lp`EC3JBG3iP9%YnEJE4gXz&;>QMe1Mu^7MI)s(BErCwrA4V7yF zT`kX|uIZnR%>VU!A=Sv)W=-}~Sa#6}iiQb5knU7?mQbho(EyJk&f?wm>l@y5OOX-7 z#V7FMJGlrt&TQ|cRuRNzztSoJvR-JNi_-A5tD8!+TUFaG!)|elr8^!Pus%rb_DT>D z)0bBhcM|zy-$hXndePWlqR5*?i^%hWU=d7FxR@?OKbU%+zX-=(2{B+Lny)+3kPQ75hxAQ;smIE0}1@Nv1{WUI1G!> zhm+}I6ngUs952QpnuOC}xp2dgJ74-U*Pl*C9$G}cH;tAf7(~Harptwb-1vjeM|18v-Qs|(HmQ}_;SygaKPV~Fs zUpQ)iBg?-lm>>u4E*kqCrq zph|t*@zR`BEesTJ7z3`XTSuYzpA|}&&*wkjJPH}gjUmgt0EnJUhW@cdl;txr&ICI& zw^E^}CL>jiB^#8J8|APsm%{tW31M(|3Zh*CH#n3pJ1HiKDpI3El}a7*+BbKnrC61` zGs+rVJZcL~NR(`ltcQbQiX<@cq@`TU%IvvKgv%X8;JGpMi8x6TXtIrCZlu*~@o-Vf zfr*z?;<>uM!fKd-efhTw+kt$iEX9x{f7e+bgb{sL;$(M@qCu`RKtQ*PfpAISgz5v3 zdo7~kNaq=;xN#!VL0K@Y-~FZ!p}zF3b70ZDcI$gq6yiKp|9o|I3et!06rfGYb}w*t zs;tY?B2wkFNUO!=h`d{9#&ZKx?RK-trc0>7G$$n&sxE{! zJK1)yfoWaGH-ulYj%v+i#Jy&FhcWoQnX4e0f!gF_2t!htg(?ha{}u#c&gV1kgd+iP zsMfe@NnUa{ep2J{_F`dM-4aUHJyeN&)s>%#nz#{+(8Ey#lCvbavkH?gh&trSg_{h(Q&D8qA<9LBV9y>JM!25J=*op`uYi3|FoaVXPcYdKxB;^ zZgzwG*WZ4rh-o#fgu7n@tf2C5phQ(>WLK$W!@cUXTF9ex>B_jjv-(EYFcXfsW=~}v z&Z^BhJqWkVdDlEaU@1*H{Uq5T#)@!OmmLyYXM-ZVZFKhO%Xig+5zv2wHYD5i3wncq zZPFzL&#%wl3>GlFN0D@2?kGc>6Vr+od#79_8sr)>zi2ji` zKHFMfng0RzJ=-RKk`u3x{iAOEC%;p9!p9{kiOvr{F)X+0__R=`&Phr1+V<*?Ln*)C ztMzLC1keC+W6y$c_iKMif8gqL|7S-9?>_CsIiRuAdw-QrK$k?{cNbf0s%|8jlEFobFhh}ym8tgo zeDOiWpnC%)jEeAkVkIiTx`j&^Lp6s=R7YtMEm3qmJZ#fY^*8U{*zt-t@2(f1aWsL; zQRD^Te72Z{K`@8&u^-L6$!Hl&;A}LW_!AhyvG32k>C_MX>0~yaz$o(l!&v1}5*a4q zH0_I|RV~Q^S(ThC{%d6`2ZLk$$PChZA<*P85-&<}S!jG8;|G)=N(bDC!s1^dzuq<- zNYu3BS^VMX<~D?1>)+D`%p2f1`g*Lv`V%4(ORHG=V6cjHz;rF7z1oVMt^uT>%4KUB z?qJSC8E{ydL=&89EPH?0m!cDbSGTuUs;9oP*Kbz^-{QXy`G0QmH*hCLP`2*VG%Bs! zJXG`Nir<$Q$%1-(uW8{3tEcKHEtjJsNvMe2LJ_!=dvhjU1>ULb`V#t@#1Yl7^y@FB zmsFrO&7*od+rPcI;_H`J6qU;-nu+v}31Q0Dm0xw$_9iD_+X`Ky2;yUiGl%rF)R}{= zk!LaBQS@2N)V>IxmqLqSpO{3;YxZO`S_RuUmEVO*6?3&M(T)1~0EH?jPfMQ)XpK7c zU`Np=Elr>S%4elZJ?IltrMXg1Mw4Zr4U>3sdK4)n_bZlpV$3~ir3t8`Qd!QUSyL%X zBeYQ{RmVdE)(5Gpk|SsAcv_R3`HK*tXf%aWf3_HTUNoI7rfB9yW9a*l>qX&gw3vBl z>bub-K(m>@7|&f8y5S^1%kd$Ev>ur)pp|a5BLt`iyVoR^?^}$&zr#tSpWAX+PFVc5 z-@2{ao8~Z0@YGnJ0Cpd?>bJf2@p;{}J`(yTfGyy4hyrf2bs{&P1;uOe+dkyzRu#r= zNIMlpApcoioz@X?08YYqs~;G`1$jWaB)DeBFbwkx!wf}upDKpw{>M0?|7SF{GepTY z3v2mWMCu{hKl`;GrrZ8mf9$&MrhnR(9auH=V%d-9wKNkRbUyvtE(6_I(WqwCdu0y0G-NusNsP_5O zNF^kN43r}};5!7Mc=9ORl1vorF!KCx$%K+H+oeqU<&(3E^pb`!78KY&6G!*7ZzkR0 zJ6q4*bJ|aJ|0wUKZ#Az8Vc+L2T%8}-EPX1!Yvc23c>Jbc`yQ36K&wuN9H@D_Ps>!G z-z}Sn+R_M=^~pNB%;#AJ^~90&)^TJW?4y?X#(aT|lO@SElDX9uS_195%4^2beXA^> zcU^G#*nAJjghc4d@*=$yEuh=Um>f-duL+F4gE34(l!>GNR=3kzz_r;Y$gh&81LE*R zQd&NVlf84Zy|lm83zNvycY9&9d~q${9(ZnTeQm9fu)VgHlxTfwZJz>RBoxRS`Y<=c zWcCIQRkv|;Wk8eJ-|@D0r}FG&7Qx=Z0>0wB1(xXKBE z|GGk~IH@>cDC6hn-Sunnt2oz2`l)@BVlZ1Fc8GF|0w_lNiWwc@9KlOIdDi@(OZVV$)Gn((Yaga5@B8p7gFbzXk^3vbd!r#iUrJdpE3PlvjLb3{B zm1gf0$O_#2Z^g7wq}(;k%xRXV#4!+Tc?S2Yd>pLI-yn9vS!FOpS17~cQkW!>neo*X zA(Yxq!wJ`~MH79UoFEiQm0W>DKmg>^*%fzJ`viIZ@XPpd08>2V!aOE08sxUxFeTC8 z!5coyb3~l{Qk&3*+k-1)3)d{GZNifXnKB#2MyQG$#W!UQ{3~jX2GnSIjfTezGlml9 zGt7P9?U}tb#oA>Oaq)z}nmisqz2f|6%P?xnn|jBsA0_L*hjF}s;r%UnO;+^B!!gEsDM8xibLp|U>Uq4UUA;$>0KHUEn1#|Ruc4{nHhBNj2yE#iSPrC zwlL-<$-U%VNT#fz4CaOY^12s$9oawQ4E-RgW9;!{mqB%NWfucA`?4!zv~XtUJr9oA zFit~ggyT9RcjUQqZ=9!+hyp(td5c*voz0=Q7|+7#c((Kx%WxhoqS<0L_om)_KK0zC z8%;xRIhlpwbUv9P6fJ^!nTslB(y#sRTpRoUgpaEKtzBzRU;O)E{cqPD2X3YQ_bBj# zFZI7a$7e7Y^wu~+XFUK0fRRuXyzf0Le3snQdBEtg*ZWJ1lY6kv(DIvpbE*E}-?#+8 z;gDtcVdsRD_Juw3O`o9;Y$*QDQ2b4wvR#bm8X?vP!*4}_?V=Jm|MS_iXW%A;31=$X zn9*LZ*ZTExpand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| -#### Container: tccr.io/truecharts/unifi:v6.5.54@sha256:b001bbeb9daf75840bf7068748c75279e043e841d2547cd0137e5f9b8bc714d3 (ubuntu 18.04) +#### Container: tccr.io/truecharts/unifi:v6.5.55@sha256:9297be1525e4e84a98a30f26249f3a7cb67cc9d384e748c8c50f8f902a81dfa5 (ubuntu 18.04) **ubuntu** diff --git a/stable/unifi/9.0.24/templates/common.yaml b/stable/unifi/9.0.25/templates/common.yaml similarity index 100% rename from stable/unifi/9.0.24/templates/common.yaml rename to stable/unifi/9.0.25/templates/common.yaml diff --git a/stable/unifi/9.0.25/values.yaml b/stable/unifi/9.0.25/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/unifi/item.yaml b/stable/unifi/item.yaml index 97b25de0603..289de7d1e9c 100644 --- a/stable/unifi/item.yaml +++ b/stable/unifi/item.yaml @@ -1,4 +1,4 @@ -icon_url: https://dl.ubnt.com/press/logo-UniFi.png +icon_url: https://truecharts.org/_static/img/appicons/unifi-icon.png categories: - Networking