From 2e809d98c050aca5510be8e5c450f1746c98ca00 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sat, 4 Jun 2022 10:10:29 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- stable/grist/1.0.25/Chart.lock | 6 - stable/grist/{1.0.25 => 1.0.26}/CHANGELOG.md | 18 +- stable/grist/{1.0.25 => 1.0.26}/CONFIG.md | 0 stable/grist/1.0.26/Chart.lock | 9 + stable/grist/{1.0.25 => 1.0.26}/Chart.yaml | 6 +- stable/grist/{1.0.25 => 1.0.26}/README.md | 1 + stable/grist/{1.0.25 => 1.0.26}/app-readme.md | 0 .../charts/common-9.3.24.tgz | Bin stable/grist/1.0.26/charts/redis-2.0.76.tgz | Bin 0 -> 83300 bytes .../grist/{1.0.25 => 1.0.26}/helm-values.md | 0 .../grist/{1.0.25 => 1.0.26}/ix_values.yaml | 17 +- .../grist/{1.0.25 => 1.0.26}/questions.yaml | 0 stable/grist/{1.0.25 => 1.0.26}/security.md | 292 +++++++++++++++++- .../{1.0.25 => 1.0.26}/templates/common.yaml | 0 stable/grist/{1.0.25 => 1.0.26}/values.yaml | 0 15 files changed, 309 insertions(+), 40 deletions(-) delete mode 100644 stable/grist/1.0.25/Chart.lock rename stable/grist/{1.0.25 => 1.0.26}/CHANGELOG.md (90%) rename stable/grist/{1.0.25 => 1.0.26}/CONFIG.md (100%) create mode 100644 stable/grist/1.0.26/Chart.lock rename stable/grist/{1.0.25 => 1.0.26}/Chart.yaml (87%) rename stable/grist/{1.0.25 => 1.0.26}/README.md (96%) rename stable/grist/{1.0.25 => 1.0.26}/app-readme.md (100%) rename stable/grist/{1.0.25 => 1.0.26}/charts/common-9.3.24.tgz (100%) create mode 100644 stable/grist/1.0.26/charts/redis-2.0.76.tgz rename stable/grist/{1.0.25 => 1.0.26}/helm-values.md (100%) rename stable/grist/{1.0.25 => 1.0.26}/ix_values.yaml (77%) rename stable/grist/{1.0.25 => 1.0.26}/questions.yaml (100%) rename stable/grist/{1.0.25 => 1.0.26}/security.md (58%) rename stable/grist/{1.0.25 => 1.0.26}/templates/common.yaml (100%) rename stable/grist/{1.0.25 => 1.0.26}/values.yaml (100%) diff --git a/stable/grist/1.0.25/Chart.lock b/stable/grist/1.0.25/Chart.lock deleted file mode 100644 index f7d26114824..00000000000 --- a/stable/grist/1.0.25/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 9.3.24 -digest: sha256:d029f09f902b1144d20ea6ed70212fc5a521092f81a3d06b3446935491b85789 -generated: "2022-05-31T19:52:18.230102005Z" diff --git a/stable/grist/1.0.25/CHANGELOG.md b/stable/grist/1.0.26/CHANGELOG.md similarity index 90% rename from stable/grist/1.0.25/CHANGELOG.md rename to stable/grist/1.0.26/CHANGELOG.md index ed249cef381..d8fa3f00d9a 100644 --- a/stable/grist/1.0.25/CHANGELOG.md +++ b/stable/grist/1.0.26/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [grist-1.0.26](https://github.com/truecharts/apps/compare/grist-1.0.25...grist-1.0.26) (2022-06-04) + +#### Fix + +* re-enable redis ([#2829](https://github.com/truecharts/apps/issues/2829)) + + + ### [grist-1.0.25](https://github.com/truecharts/apps/compare/grist-1.0.24...grist-1.0.25) (2022-05-31) @@ -88,12 +97,3 @@ ### [grist-1.0.18](https://github.com/truecharts/apps/compare/grist-1.0.17...grist-1.0.18) (2022-05-05) #### Chore - -* update helm general non-major helm releases ([#2612](https://github.com/truecharts/apps/issues/2612)) - - - - -### [grist-1.0.17](https://github.com/truecharts/apps/compare/grist-1.0.16...grist-1.0.17) (2022-04-26) - -#### Chore diff --git a/stable/grist/1.0.25/CONFIG.md b/stable/grist/1.0.26/CONFIG.md similarity index 100% rename from stable/grist/1.0.25/CONFIG.md rename to stable/grist/1.0.26/CONFIG.md diff --git a/stable/grist/1.0.26/Chart.lock b/stable/grist/1.0.26/Chart.lock new file mode 100644 index 00000000000..38522218c77 --- /dev/null +++ b/stable/grist/1.0.26/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.24 +- name: redis + repository: https://charts.truecharts.org + version: 2.0.76 +digest: sha256:0ba7ba9a6d51c3784af40aa122918df74c807ce2e39ee035186e41b704808893 +generated: "2022-06-04T09:59:35.158189175Z" diff --git a/stable/grist/1.0.25/Chart.yaml b/stable/grist/1.0.26/Chart.yaml similarity index 87% rename from stable/grist/1.0.25/Chart.yaml rename to stable/grist/1.0.26/Chart.yaml index 26b1c89a79f..be435d437de 100644 --- a/stable/grist/1.0.25/Chart.yaml +++ b/stable/grist/1.0.26/Chart.yaml @@ -4,6 +4,10 @@ dependencies: - name: common repository: https://library-charts.truecharts.org version: 9.3.24 +- condition: redis.enabled + name: redis + repository: https://charts.truecharts.org + version: 2.0.76 description: Grist is a modern relational spreadsheet. It combine the flexibility of a spreadsheet with the robustness of a database to organize your data. home: https://github.com/truecharts/apps/tree/master/charts/stable/grist icon: https://truecharts.org/_static/img/appicons/grist.png @@ -21,7 +25,7 @@ sources: - https://hub.docker.com/r/gristlabs/grist - https://github.com/gristlabs/grist-core - https://support.getgrist.com/ -version: 1.0.25 +version: 1.0.26 annotations: truecharts.org/catagories: | - productivity diff --git a/stable/grist/1.0.25/README.md b/stable/grist/1.0.26/README.md similarity index 96% rename from stable/grist/1.0.25/README.md rename to stable/grist/1.0.26/README.md index ad0d8bc0c44..72c0373099a 100644 --- a/stable/grist/1.0.25/README.md +++ b/stable/grist/1.0.26/README.md @@ -19,6 +19,7 @@ Kubernetes: `>=1.16.0-0` | Repository | Name | Version | |------------|------|---------| +| https://charts.truecharts.org | redis | 2.0.76 | | https://library-charts.truecharts.org | common | 9.3.24 | ## Installing the Chart diff --git a/stable/grist/1.0.25/app-readme.md b/stable/grist/1.0.26/app-readme.md similarity index 100% rename from stable/grist/1.0.25/app-readme.md rename to stable/grist/1.0.26/app-readme.md diff --git a/stable/grist/1.0.25/charts/common-9.3.24.tgz b/stable/grist/1.0.26/charts/common-9.3.24.tgz similarity index 100% rename from stable/grist/1.0.25/charts/common-9.3.24.tgz rename to stable/grist/1.0.26/charts/common-9.3.24.tgz diff --git a/stable/grist/1.0.26/charts/redis-2.0.76.tgz b/stable/grist/1.0.26/charts/redis-2.0.76.tgz new file mode 100644 index 0000000000000000000000000000000000000000..d0e618c9b29023d1331b4fd5929f1278cbaa9610 GIT binary patch literal 83300 zcmb5VV{|25)V3SjwrwY!q+{DQJGPCEZ9CbqZ5tiiwyl%reZMiz`F@@n>qm`RHEYjW zwbrb;?`sxeBorFZf7>@T5Urtv5|gonEQgH8FLonVH6{~fb_*@#UmWskY8%S);ozAMVPzx_(n&-C+RoQ3C|vzvn?l&5-t9vR}&zh&m&DE$@oaDN@Tts=x#Ll;GOXnDU(<2i+lN3ppu{<2 zdS3wn`Ga_88Dav+zRwKpBru2}p`XSWS}%4SZc@lBki(6_?LmOk_xM zMF{YV3;m&DM;UJRW~pMhfyhko0D>5lEgc4Fru)t<%dnuFePdM#vFiBkpuH~4f%A*) z64x(ej|m1@b>@`DC;@CaWCR{?wSLj0u`fFj8#K#YSx9ka4npnOhBC8MVt8Py_Is{f z?hBdGO9T53YZE9!o}^i3WT%HS0J6=e6^;uq0{pgL8u%&}l5!30;JG_u{OgkL~gS%pL9Y4D1y;jd_D z-|8PL9VFpO3L?a=Ufw9}f*a>1Eyne*H|}^41jc96&e4kMms)1W($_6Dm&z&Mh8Mb< zLs+y2J>?clogd;UP08QSw{3`ZIB*gfmx0b<@rGA#G>&iO^KL2!LZ#3OjwCW98 z$H5JFp$F!<;5yfJ?HBy;%>mGol1Ym52#BtI>-QFh{F;{>3DiHdl|WS|Zpb8zNG{Lsq%wdN(lkJz|Z zk0u8RV1qt8iEI*Kh{JWcci4qyV(qXyC<_$EX8VC`g)CO~6B&GwsP;@lv_5dv*lXUn zER{21sYqGKH~%Poc%d7_fyDW^A_thlAX1G9&3_Fw*4*P=Iw`HMN;(S&CBzRgm~Gxq zBdmbU+6pj*?FIW=V--ELfP8OSLOK(SZ@Z;;@n=V^9?V4Z^yl`H^)GWl)!{la=09Z5 zSj@-FNwVzd*7h9PQ&pYfU0_ja_D+hxFnw|yHnMj2Hzo$_K&n&(7z)sTYa>Av5*h3C z`nmVz63&lw2%I}B?a3w(b!^5KMtP6F5Da`tqHX02IXuxpNqT0QnKZ(_amh#mSYtl# zaq=V^Q~Big#@sPWvk}6pPv?b{bMXoAvi*2@cz^S)ZFg{Sdwkw5j`a~2hBEgu?C^<0 zn_R!V9BhsZr~@zw`EstZb9;Dx@lb(YY$P~`!aFk~oN9PS%_lZQ>ek+`+vUBdR756` zEeD9VFQ}dvqU9icq+`M1&WFsWv1Gr?%q=mX963mRVN_g<^s3jVRaI%zb z0SFX?sgK`u;o`-!P9m>sC6%Ajj$UGKACkMlAD1oLy~1(P1Jo&t%)M?q$S-h?)sTpS zNFKX`lm?;eyt-?$YnSrI7@)Ewwmb*Gxf!ENssUEu*O9Z8& zYed5?!%DiRJltlsTZ1n>Lvsfv6NWw4?quUqf^fwC)aK z8|W;NTVlKi{;B;&2Yf5bcKPAF*1{>-;Lf)FI26ZZ@DEYqB*>dWImCdW>)oNh8$(2` z{pv^;-@#i61%;86@1==%qbBy(n|G8U-kZg&F%q+bxT>~?9F0$82`1AdYz#%NnIGuU z@14=y-+A?v_-frWdWTka6835EUi(Bi-gHQ>Si=Me9j8cn(=uf5TyaKW)Qn3`gAd0% zhT#_1ZoR0B-JFwXkJ*0E)oDgbW|2mstU)WKVw(pybpHxzuvg)G7_S2NE#2flX`${cL0a+8tiBVNpQ;y$x_Me5%%8<* z%G2t8xbGHsySKTOwTxbE=$*3?|H@x#%F~^02{->W-{yL~I{Uuc^nv#qN_^&Q`)%9i z^M9E8emkv}$*5jYko84;)>sXHy!MpguKgEw0ghJ)JnDi6*MXlx_pV}O1EQVzVnZNE zMybJV(vRzQVZt%grGx?8E&;Is3Km&~Ap@pM2#W&}-4S}WVP7`2TVq;}~r;22#nhN|avUq_5U*SII7ZCF}|K{_n7Vvw1PTo=eNaY@Eq zV9dBq*a9d27qKx^wGgq!Xk+eEmFw}In_IbA^KJLXzVBOn{iDX~bz$xMqqK4Or3M;< zE+>^m`-Aoo*8Sw!B9Z6VlKefy5@>%)7XtUWqX$w36ByR6(y;&6W+XrbJW zfGu=_xW;u4Achb@n7el%YKc%XxIUsNU8eqY@si68DkuQ1zILO~`^0(|=F`f-EIv2XK!+C_kWS8FCvUbDS*BuPq zXWrXWV*At2-!1n*okNmH@=Es3_Gzx|`($63xAk(IH_%tNu96=$a?jk4M!EmG<+r-{ zczMjT>l?aL=RxBUzE5e9kvzVhBfFMo5M$+Y+{C|*Ml{;L^DQ;b`oBWgKd#?jd4b-A z@!%z}5Pj_v33;-o5!0yODLqn9dpPUv_Yr@87$5fqLGGm9-LHmkCsZ)%@#5?UKS=qD zwXD-W-$U_c6+7~u{R^Nnb8d0%hD6P&7EeYqz(0mQQ!&v!);t24gaR04KX4&_AF+qqi5WPnhSR>;mAig3(2U^`+SLVv_c zm4`h(SE*(Zaz1B$%*JV)i#@egC@%Y4H7g@A{l+nLUj}oeoSY>;Up5WU%8}P)%bhq~ z%!H1o?rLW!T6R7=Wyja_yoBj0Q7*ug8m0c@kdeO_WA-Q9q8Xfxb3KKfOM-@xg6G)d=BAuFJ!7ENK{uO>FH&{=RdLNd1A3rX0 z;25Qt4K=T7M;no%HVn!l-E$Y1n{Xo=$o^Ood(Kg6i8ZgFw9z{>GbR>SNo9bs8a$q| zUGVGNBU`rFyhbJ96bpV?*#s{0f6t#RzcopTrle9Cp*1VcPPgJVVqHc{(}AZy#qq45 zNY&(M%OmdV$$)YS*fkl)krPv$&9v8@RGfco%s4$e_0)>7{|z7T%V0DERBRECiRQ@v z--jj(twL~{KpAIalNA$ZMVfk2J4Ha-n)7e%cE}@?=U${>bR4Zo_68+*TCBrb5Rpss zA!K3(g{Y89BewF0S*9hC4Gdz2e~}@TdTix5y`?9j;Q}$qteQN^BW#nyW=X4a%dF`& zlxcDSfy^f8QHrWeVxoN#BB_&E2d+o$7GYB^!g=X92#Ugvi^ZHf8DzLwCSAp8bE#p} z0n0X{o|~Sk*tnLY38Fgmy;_)5(z5XqtFYxpPbeBN@P%INWa_{FbXilEI_8Ttn2HRl4CSlp z?%OT|851I3AkcLi;Vgu<4TONc6r6l%5QE!g;TYr`~%V< zk=PX3Sgu>NYMMX}p1I~2zDO=jR~yNu*&$J}CYqsIqR#M8!E*`Lb`=KRMp0YJrWq+! zp{0_cS)wi%cP`h#D!7T93vCIaEtA+Z)L2emf^F*gH@`6jqlkhDz^3UWRgs~bp*P&_ zG6?1JD%iTkqE*2dzGMj!DV5k%+E^}HY!NM?H=Xt~9s#!D17I1w1#>3!G*y<07N(I> zbGu7Zt^|R$5x>D?4HPZvF_P7OjOs;;n`0~rc~eSToKYUgchuAc=;il3N&m0qQ zvsF3&JWMI6$8w>RdXrV$DXO*>)Q_v@hw;P->=0`PgqDLKPJ!h#lSw<40sV_|O$jv% zqemn|a)-Zs{8<+ui1~*Pwj@rVhs2Imhjl5<2O6-@V5AA?QKd9k$aFIk1tZPr9<%oz z7Ut8db-v?f&s_iroS0A9y{~8fIV^B1C%}4 znYV=lux!)t)P?O9Q3KS%^-@%IVncctLh4I6DlI`vIfaGu;PWau{8ep$nmpK6&iG;Z zW}9XbwA&L$5}l#O$+u1i!ZvPva^oDboCJArCFch@P|*H>Q&pfFsL~3kNV_>TC`?G& zV%E*E3Cq+A>~KydR1&w*+!$)^w8Y{^)?$S1hlD~!YN!`8(@F1V_?PlvM*|}W3wRYq zCX)9V2%zkMg9L-`siloS=7NjUDHIhluaBn8MY*vWFm^y0bn)Poy1iN-< zfH$TN(tzbuRSN1oTH(fbEWic9Ul+<+G!3pv93+pO6_iKo7N{ogm<*2Dcyt4=zKRW$ zS*HggE|OzZ2?$Hc9cHQ7u_a4esN$B$qBWMcuh^n$fU*n&6}>f%bDA3GQ9LBZDSFES z^&rX>SpAdVLw2 z8yjnhI%~{~FiX%K?OD^%p zi@A$^3)qiAx<<2jc@3Hx!rv7}|V&cEIi!k}pqs4@jx0LC&s+qQwz*fB#} zy?yxBzaAXMph*C@5`#)Z?Ea2jtSaW(;=haKKqk@u2C68AG-!GNvh)cZxe^NUBK)VQ zeb>|;Tw}F?NTuBfq!x+MYdITe%EqW`+_7mRvZg0v7Yz$yDvjT3Sq7>>@8VB}a`dYU z{_l8_p4Auu#)`I*DZ-C8z?CV#1f-Q_Qg7Inhg=7E4wN&dJeQ$hq>u$xmB4DXB7oGS zk?9IOUU4`pQJD(Wt@W3ZN&M@Jp$wYPer!nu60V3EarF+eXK9;%pN%64tg`%Ag#f8d zAmx#Vze&4ioEvp)_R-sHvn2sthCIKT`9zu;>868HX&?CmtJ(Z&u%2k@5;AbhpJtR3 z?AX+0Uh97KZsyS`z8t!zu0@yC)Sj(ei!fVNOS*r~+q}|0GmrM-8F<*h&!=$Hmg zdmt)tlhrjHu0Lj|dDfR;8dcdpW~g~4WyF7)qUbfGjbL5SG4rg4z#%l6cBOu7&IhkJ~-a|CdcmWp3(CP z8;IqaNJ#3rMI1zyX1xJrl)m3xYkNu|cD;lT&|GGksyFkjFv~VfE>W-6!fagItS`A7 zdVrZ^C`-Vv)v5IbS=%2aILT2rewgq{BEO(8!u&`XG!Kni5##&~6m zQ3m1V9kxY+&=gQY64`k@L?$fQbU?RZ%ux$4T&d-foN82q7cR8MYVJZbaU(wK&pJvu z3ZdcPJS#62Shb|C)uIPit0S;Klu!sSUlANi?Y-6^BX&O*$~vy7oU)yvZtp z2@@++NmbsU=?uD3?RP-Epw7JQNOlSR(R8~fwL-HVOy!bvz@jJh-9s}ikidH6DLPh& z(&NuH{(vhM3?`{69i)O?*`Ud6oFyZ*#-U?eR6(T;3Z}g3 z$1&PkEt?<5es+n{R~bUX|7W7z7M(TrT4rNtl+Oz-Mv5o}&x=w3+H@sB|Ho~CM4APV zioaS0WeTtW&FO0P_2kgJ{~iP#Wtk9ttyU>`3QUu|C;4;jnvz_F+CEYH>|NfHhNFVE zIvB(_MnJ$K2~({KSjdd2)%oBl2`Qj$)0Y`c)G$8}2`-5q47B2}fk7D(96(cU2ABR4 z$2eV=w06JfY^2xn6HB9S$Ar;qQom=Yr0fv8yY2w4r=12aQjV zSqvzmPiHj!0;>^BwOYs!DK!1|lZTZ$g@&q8r&^YKSk}7q*i_om5NcLqy-M`h$XzmW zknx-j4j7d4?_SiX>pyxX=EFe-S<3}_I0-jcN|s6hmIgf%s5H0{7k5L1yLPV_XU~WTX?sRq7`{c{(<1e@ZGjI0VNU6DH(Wy5q0a2_68DaC^<(_ zB#(mP(Mi-d^!0@eC^fy1UTzx_E^tnWd;4+_5_nWCTqakJYDd%S-TEi_U73f#WFJ&n zv?J|;7Hl=g^ldE_Fh;w~$ihr`hG7DYK(gi5p+(o|vr3R9+-S;>Q>|WYuyomylG1Lg z^>|W8a1Vk`+(%9QW;cdc(iQdLDyi3AO`pJc(P_9_W^pXRgxcAVl2-6HGu#@qUel${ zZRqLjpETCI_^oWJZ77#ySZaVGZ#c`>))vv!4Z5W0ozM_*S?|Hm63_J%qH&7FT-Y*U{#w7;qQJj7YgJZsn3)Q1P1$ ziRZdDtDBvn&A$*Nnf6}U1R4a$ilJSDGA_K_2Z*b@&SV97BD7XXg(cZQRZi&X4YJlE z939&>D0{TlUrOlb22DozbgGrw0s9n{)W88C4dCM$^tG1F0u3U0tz4^jqDX1j@G}Zl z_LUjf|ETt<;II~;HUvtc&n>S6S2Mh7wVV)BEUz50z-a=h-FWk8h$96(aXoZ|7;HIXuB)32QZ;Ur zI`djVcApNFG7M>H?W)mDaXgU7Sn$apFQcXwZ})BSk4L<+3L*MZYC%v!@rgk(8h%!C zK_+SSsGYfOKbKsCpwOIOsEV|l(*L0v!mi;IcK`xX$}ZhFO%+P?CH0b^gyd6$Vix=? z)e_XI^E5JxII{)Pj5%=&S@8usM@rB$rQ1IdOE(8bQY?-bMy-uj9Gj$BU@LB-G_rZK zWacJvkg4V-%$~i_Kcf=vje(p;!$s_KVG6#^$rcGf1@>U#Ic^{WT`|om`ybwRIDw`$ zfy0f%BCW1VVO%SZTL)w3;YSZnp@o9CtksT(~!f54#1=01HxI7c{pR(hb4gG)d&c)!P z|Ce|EV{823opQD5@BbI?ya&1%QRK&xxr51|yeRgiK307)7U`r5gK$n9S&h31&Ye~y z+!#hhLf)I#=iQ0{SStDEG;iU?Dz|$vBtUy~xgktHKgS>v1~Ky#?HWogxhMGR#{`{3 zAPgDA6hx6BBMhvsmZV(<+h)OelH$qQuXwRSchVm64oE(!7xCqS@kx4>mj!q7{I$st z-`TFj*1dv*`%`Euc(}!mAe7Q|P&WqTzy~XiJRkKb$sq|v8S{4{2n}w}Tj?&1wimfK zk&a+D>V*hy4sP(XfYcvA3f4J6B*lssVm;?Ih{$5^v7qb3IN|;Bb<7C$D)df>9nxI; z?PB~R2JYYcUp0_DQC6ba0GwDTkR|pd_u@xb2QL2?rYe{d%bg78ucxOQe8}`uS}=vR z(%AzxWWD|8&!z!$po5C;>)_W=H}+r!X}027J5;2v1pC@}8-ru2QeM3a;^E%lp$Ol9%-H9Y z_``|+00(4T65)ux*a^Xnv;UCWPCW*=2CiNkMW+xB*Wyd}*ssrI5~E=vnro+>S*>K@5@K_@H|MePM6`Nkr9Jf} zkjeg6=JsO44mc(bj<9?|%kCn*<~J#C(hgvJZhW-GGsolKC;Hhlc|;^|8(@?zQVjVO z{W#tXGG#OVUDs-mx!4@y-sI_Q_$ao^Zrqp-b%U(gEH$G3oMc<*>iFdNKxq(h$~Y3~ z`Gq?YtGKaVv1vI#sr!O~pF}vk5a!Gy&(u%VSg5*U0bvo)pro;aD51nWo@T2s#ABmT zENU%p)fV&Uav+K@Drhkyc=^YP%#W(v_~2QN^t%0~g5f2OqXMQgfW)#%Fv)A=6G+Jn z7akZc^8$Z={Vj0yfIq?F_}~{a3OrCsjB+2ER=NBq2oPNtHlCihdz+#u3PcnKOfP?J zl*iyV714?tFhh3eu;3cdvf_UT-XJ7QD;A1ELM%XM%^Ub|YiHn*AH7Vc7vN?9Mz{Qp zM6#JN|BbWoPwfXtgj$077M_702DC&$(wt?lbxJbzOCoK7xS<5gi~$mFxjM5GH5Y8J zUG)Yzf3l6(K6qd*8Gub0oq5V{xi-F$@EP$#QWs#>mLRm3I?nuvs7Iuz6Zd)XLurF7 z<1$HEaDnL_I<2q#wW1RfGNLdKZ6v9MYIj}G-ElgM2jii_>I+ca-h!pO&1 z*iIPVAT}w0*CYn6DMTrujuQtSFjBfvK*i~12g}m#kIi_05|l{Lh# zU@z8smPS~%{)!~80U6s@tAUUTbQEx4xQ+eQV1nFZFHiGFxgj(VpyJ$+>%?_-h{jZG zx^G!zP&~6ko*yzabeV>O0p2m&W5yWII2k4SE>xCAm_1|7QVK#U$w|D=bYl<07erK` z`vv1yOfmTbql2q?*rieTf*dXY2EZ@ec@)!;{%egbBYjk(X80D3g{)iOzs3Y+ao{|h zknWzGd>jXM62Q?rjI&IDDG`e_g=~Umc9yB2EVdixN$%uc4=dqdr1B=jBq+!H!#tn= z1LCVCWv+bvxdI4nmG_ct_gWRGo%PQ!e_W#2r0vBZTF@)qXml^ojP2#<1Ynh6WIEh2 zC>PSEZY2nnyWu|WOfm>EFdd+p+`hY14 zxe9ds4UmRBCi8gsA+fh%$ls*1hzfE*Tu!TDJ~TA~+VqCNcp><3bL*9}R9YiR1Pab0 z9aetx@N#i~yL&piDvIv5Yzw4buQD{5fW$hN!7iFQSbdp?Bm$4g?URA_d{5udahv(i zB)F?M_qh3fT^(HHWzK<*>LskR&Ry%px0xR2&oRr*{}gDDdq%akD3R|Ij}Gr9Vf`Pp z%*u6x?+(T{Q;i%%bk`p)-}`-(;qQ{}`ku&C|cw{A{3akkzsNWOGv1X^*Jzn4t%l$vrHu>j>#X{Q71?1U(4>Zx2 zp7{(kTZ`YzEDzw^!fm=i4VM^tnh_e#sKp<9tegttqiixkDa~59&gC2UQZSKmO@{2S zhUsDuzfAHXrv~4`zrfMhxR=@okMJ70TZHN^9iTN-O9wx`%)k}8sZ1#yPIeeuav+pt zC!CwKgPUXLYzigT@2Bc}@hh0UVmtG?#-Yj$z#SnbFN+;WVuI$N(EHZ|F4)7nLRZpXO2(JxL&Zzf=uEc- zeA(2=-SgEvu)K>-aDDOBoOpe%UMKJB>LTvdDGV?*cLQuJPhal~ffOVlFJJY=3Wgg%Juhr=gRvnJ<+_OXXc zWY9Ppf;?f~KT#V0EmT7q?skqmA_hXEal3nzudbv zryMOx+WUXXAjl=gRB9j(EG_v5`%VI*hKbo>+xez%5+3z{saPB%P@^O2o*~1szmWNO zzqEZ!k4i=~2);!#s{3AFYD#SPd!Fw+fMQxfKi2)VicYVysTnU^ffRb#$cew>*OPXV1OowybdjW6RF5Gh!EUSD{zDwDnx};y zz>Fb-LvCMT%g!@BD$En)OAjsB2s*--Nxrw{iX*zU!e%&8iQ=32)CnKTqN-tp-;?91 z%(Hs0(aMs4Y5EioQ*|oP1&T$XjWI)eW~v71Xc}vAJ{(+#&&)czHM;-&N}2SDCskm5 zJsx<0xIq5}#(Gf-E|ERwyhz8HQ+p?W%GCXuCbvON=m+=44y$Ubh~FedIAnNr>_IUu zF9}w$EbbMN*+8@mh zkD4RBvn+%A9ruT&T-aY;my5W=z#Jp>C!#oDAgVRyK6Zk<4^_{o11Hrokd(s5W3V$e zC^*Q}1x8!O(wFoaZT%Y6&V|;l-b*7IPpN~oo**&Zi!}J`y2|He@ym(zq4X;CG;vVx zDCO$?GaMs&u6x4*HDHmKn(KF%%&7_c#zewN6e9uOGnro-@ehZ0oT$SfH@EK}Fg8Wn zHdk0LI?o>5rA#WP?Iae_!kJf2Avxvls;rr9@?L-b9_H1|w3%$l337snJlKV_7r@r#LKt zJMU1ec%X-oGE4Z}2+@^!FyxwDn3qT6IESVbz<&*9iZx~&nb*88lIvBs6%kBX`D;NI zwV~&n%kGvmB{I6qmI;)-f%wg17F=`AS&Xk(Lxl8u@?JXbj#m1Eoayx8A-RL|0>Cv+ z3!r1#-ZNhmxtn2m)E4E~J}fc&MY~q5!ZT$47rp1DtmS+j$JqCF-i+@I?rUfU1vAg= z#Y|2Reg}oq@K$+uk!;$C5kVb9wN1_7VcB5mkJzjEU&V%(^s?m0&v}X!x&|{0e&yn? zy}i9g;>nMc;=Cy)T3lqbvrcM_&A8|QfU(}iM8b;u)dZRz0UJaHVGZ)1^pV09NMikFCkM}HFwhQ?2l)0l!qa7vFe9h{foH*wB|J-R61BLgsM z_iW`GtSrbv2MK{J|9z}?c?XFhZAVTXho-^fTt%cy5OLK-v#MKwt^rPnS)-Hpmw-yprSsgna)FZY= z&boBHLjrNzs_<<8@|eoSzqBrTUADBSY*F)c;$3V!(P4YJfsL3B8Pvs3h|l}T`kH(E zYZ_SgvnAEH+jl?zlGwCwHqWM;X{4ReOikiyX?+2rB~lR69%qn%!tpbBpor5+!umGe z?Bc$Svc$uExMe!bM-@c-kcu!2Cq4M8AxT^M)Mpy-tF1OzaGKm?#r3j_@gQmT!Nmj# zb~qkls>QfGP+kZxb@BR;Ms8W4@dN2O5Lxtid8pgVVV`HY~d* zmHbr!hHy^nk{NqCSxNtMs=n*V_!Tb%kNgS0^1)B>3^D3Ij(t%W+FPJK$i#Si7zFYC zizgz9UfLyF(zL|R8PhaQ1AWbE8_%NNVa*{x%_xUvCT4{nXrSf|g*Qi|R>*@P_duu?y z_AdALp}DF0j<^4PoG>;e%}oyS$7{ZLZch9;CZI6xk%+m8TZfM@rM02U&lV)XriZZ zpt(0DGjvZHx{=dC={Q_%6k{#|w%pl-{Y32`1Hliu7f_bI-ZHFN;ChVGf#>VhsUWb7<_k=ZS<_UZX)JvB;17R!d3>p<8h%}} zh5t?{sdPq#9%G+|f~rpne=Up7u5YeEK#XC~51843%r)VHnkV#=pe#g|v-RWsU>lC# zzI63FL67Yvz@oe*>MQh2bs6$ssFtKa?xmLaNk6iVJ);8qm_UPexaIGr#79}Z1-!F) z1{xgxh<^Z`LUO($e=rq&|LZXuoBsY3aQdQ*op2X^iXK4)sE>LiHVo_!blnRdK5kVA z>-C1WOtBklHD>m3kgyc}a>j6y#`yS0d(^ax_U(V{dOi0Z^-HPC;evJuvzTfl{)vDr z*z-eA>?50yb7S|XpocX39z6KAX?y59XD7+MQVx+IcHU4xsK+f?uYxAau)h4zIqa0| z?wsD{DLBQC)>6yeJ!+E(uHOF!$HW&Uc4W}JDn@>beG3K?J!W$Cuj_ER>x;`kot9bm z3~Y$W02jGOdO~n5P4u9-TPcXEmQ*J+ZB}#Okmv_(-#Hrl)6bN1A0KX-)GsNQwm6#N z9Jolr4QxH$W80}58>sd|StflO#vwpm> z_)Hx80r7?Yt!wb}99zjie~>B$;SO@Y=gsB)LSxvJH z7-4x6Xu!**gf#wetJ)vX;$30~ZS3bIT)^S3Q`@7u!ic=KG)N|4K(NHpNv54hk9#O&r`$BuG(WsIJb_ZsKk4 zWsi#75)vNhW0_=BmZGM@C}c!Yzwto$C2H<)k_lq&`a=bi$WbZ02^%)!On*x4CC4k& zlt82oDOh=N5>3?fJEG*XY8{|Aoyf36+Ujyr3nT7luczeE?TXieRy$TyqTy{KP!5sW zhd-&MU_?ciT=kcVFNWuE?dW_u>bk3=U7lT+T-9yd7ISUXH;emPHs!a6eOaWCOGs*a zU*gmSpvVGcuS1Gd2-(1ey=Benicg8=feG&E6zn8EB-03Mqi@iG8OB%=fO6d{4_shs zapmhj1n47trcd{gyn?rnV+%*<@OYx^-18yu?lxKRv#WF-hDfx*Z`W6rHbp*i3_ln*H|+W57E5i&CH9t$iP}no z=TK7L0>2*oO=N4O*rn%*p75f9pPIh7%K$gPf(y|XKd??=_;MlFZRH|2M2d(1I~8$d z@*KG6&Zv>O0_&=}Vt4e10rPx&^mHRv{c0`RV`>YihPcUly7#~kYx_pydp2NFbD$y3 zadzW3oo`NWJ7fFTwcry!(9h>9bGf%Jcubm`h@gy_iId;g-{0So_xq4%0lw%Cb0k)| zoQ%j$+rGzS{nXjG7K~170c0a2P1GYKE)#Y7H+gOo)!MF`P#s&3idQL$Jz$0XT4INs z*;gUT0H1GQYhYIk>xsrvhiS|;k?Cc^M2qVYycNfb6yqNBNP~$A{b2RTNF-6<+)l@p z#)JsCmTrv`tAu)|Q{SxC3m;V2$)%LkmHg49+;P*|`{(oG&AOTgrCB3;CTItA#hrO1-m zER9!noJVXb8+|?oOV~r|_4in4e|!&Etv*J%<|K_Of&>UeWrUC3p^Y-j6JnBJWY+Nd zK-o4yHYB2yjHV7KKM}THnf5E-)D<|rN;nv(}jD-Iu=z?&t=Vy1SWIuU1X%Mw%j!U7|H` z>Qy3F5EiVBkpDcxt1o)*osT}#n^^i(7Ieq(4%F4|V&e?@=!&kmy>plKc;{|+Gh!G# zf0+UC9(;mqT^7m#ew5&k+2`#B=`X-aM}JV8*Owiop$LjE;w6V4SJ$$955A~H$Uxl7 z4!xw(SHhEdA7K1>NZz;2Z?|D~{j0-iTYK}=jqB;XJf#ut4P=G-NCR7fkS#l| z5t4mA7#(E|1Qt2G`qLJzNYf2T|GApdFzH-pm%|#0h{d5x5+&kC<*&5p$9Rr8*;ZRt z>nKks-MN3TbARp+B_SpDrb^Rzkx8h{M6vZ&HEbWSMoT%Ej7Z5$v{U6S?)^Ior%B*~ zcWXTuY(E_g!NRV>U8}z)v+_EaEwWnFj-fcIgz1%fT!Sv`L{~i6I<+=&Q)R08rasVu zh7H|aY+&=6($BWPZZR=+Ym+QTePb8Y)J+gC5g%_{wL}u%&t_I78#zdmt+cZZVTJw- z_w&y5G3;hJco~n|p)F+A$Id*aHU8a=GVj&njSg|O6t|A!xLrWp66n&>ys?zhp?vk` z3AVqK^}aOOwz$#MbkdBGjb>GB@iGewiekDx5OBHM`($t6#dQOY0QrRqVVnID&>RS- zN*mEp$MX{_^B97q3Yceu+L0V&m-QYlo=SV6g4h^Uw{wH@35)cwl=-d{7rbh2Y~&{z zyfa#AvNwiz#3pvn7A1}CI}Yt1~e0l?3(lFm2ULs>X+D4JEP=k|SJgFk@8Hfm~;z zx2n8Q33;h;aXU#xU2uq0PYUN}O{6XU`k>jTUjtt*al?`Vb6fYA$6n)2zp!Yh|F9|X zI_dCpp1V+sWfaq;NO!?`jtzEYA71TJoq2SfKQHynd?)Mmz|L)zy4}uqEPHz2-JMQt z$&*_zUrC3V)j8FrK6g^}9X0zXhaCw!3eNG+K_iq_;i$qjni!PR`|Lq*8TChemjzea z%Av`VFfM16Z{Ze$K9S^s^P0S`fN6=%7SqQr=@8QXJ45A{yWtA|7VV76EDPs^tCk$c zc^KyPu;U)(7cn4BDEScrYi4GFJ-;p>7h6x)7Hl&EMAD?C8!l?Q%-r zM|Qda2bW_L%Yc)WxreR+<4sSWr`^}}+*myVKAtx3x1*rj-7A0zImGjC@@siLJ};NA zw`d20POmS^>zC7Wz%^sjacFzYmeyOxL`QByGS+CjNo0wRFwn05JPIH3*p2%nYIECC z`=uy00V{AB&Zvrts*9AdZTa%doKc+QsD2w;U5MlaI)O%e}djPr1G|E}&y84{Gs``w4ol);yBsLDaKDUN3 zq4M=q^g4tiE7i&z)k>zYV4|3y{kEl-o#B6tt?qZm3W2P3EJgD(M)Rqy->7qoP4zm* zvdvF#=E;){dAm)+Mzf~vx)-dru&vdo%{9HXOj!VEBkRbyOZtDnO3v^9Y=(0 z4h8*LVf=ePOKhwE|9=aFJHUCyxZ1l!+#xo{2U=v9WTd~LT$hGrPsO-teUbqY5}hvz zeH;qFyjas+SUkyfa|YYhOgIn+zkFl%;1%fAkU3)S+dTL>De6w8BHVPe9XCQ%OB2 z#Un9>l5(h&bMc{=94IPW%3O*Se)1FnLuEFS-Sc&$^o!5a=T&c&r%Qo|E&A?!UA@Jo z*bBU|%9 z(<@>=Ur3yLD4kP`#>7 zgkEhcB#KBRFfAcLI>-9=$oxbPXEUShgIJz%+P=b}`==wuQoFt8*Qc*dr)~6CQGvm) zGWr4oQ>araER{TqU-X3rJOsveqs!d56kzXgrKu0ud`t8f86{U(Ii?-e2=Qm- zDf#c+#((||ly0lL$X;fa*ci+>s7}=X0vl?F9JxkxF}=z-AT_ z_gW(Q2o%u8VBZEY4K09$l;{6pFPGSG?Go^p0>ri7Ypn|iKs&+vnv;GN<7G#N3rRv*!s)hG>D z_DcXa)XIDTMW13(b&oX=xo)`0Rm z`K7Szy%^*(;>bHS;!}!pVv%Ci8prkT0jd9Ag(?N^i8{uog=eU;A43y}7&objVI2-g zC8bN=S!vif!h+ga5>at8q>{?OLif(q4pgIjaG`<`JppBrmuNy*u#9k0TJT?M;`=n*$NZ_S9z%If1s?=O*?~t#x4czlMa0#r z#85MTTp@u(QGrR#sZNgWZX2K92u;N5b_C$qCsmxpPZUSR6ccz|;fb_g>NAdPe^!6j zrJ(~!bTHn-ZdG<=ebl4>= z-+yv&p5LopWj!s81Gx-Oa*Wg4dK%*9c8Geq-Cplsj~&O5Zn=z&C_(Qz2@P%|q3=hb zEul64BHdEuw=4TlaJhzf6G{(e#}GIy=$viWyTB!Z=XH z?0sSCOxQ@!4M%B#qwTW%`i(YRM{bT6d5_(Ly}x2q7M0J8L`OElYBhuRe% zIaQ7oRjLdrZu&v0-R$9}vU_4XS`)iVS(E4%@sXD;5Z^5(H;mNQt=K_5Q?H-RmAgN! z{jsbEXxWw)$JYuS-gF$>7khXOgY}~%0-M3S(qe5c)x2^En*&_KYq@XpVj!g~9GZR$q0>Pu)i;pxu1Qg|UER?|z8PfQ@I-J}%cLYqIV zHv3iRcZHVi4N(Eh<$o!)T9R*2gl%ui;hq$el9bf{L)be;XYzc}!pX!=Cf3BZHL-2m zd}7;}7!z}1`-yGawr$`1{&(H4@4Hrg=w98cyQ;hEoU`{nb=v9oKW!gye07)K6KcA+ zkAPx%czmx=fG6-Oy-Gg4w5F(|@j*M!^z`ubH~FT_YrjeSMY>RhlTlssKAk@)Y7{S= zRcKM0!UYc>c`)HW?wCKU#j!36#Lz++$5=f5z}mu7WUb^&jm`he+}#-KMi01`J6f0s z{mkxumLr}oKm zcCnF@TG9VsP;tL+qTl9i-N6?7@R1Xh;&pt#yD@M!)-(tOr)yz%=_{pXRI^B=BB(&HLN+wkGp*T`*>caZ_PYYq0AXzxPmi@yDcSKxDqBIIWB)g*H)SlKa(cdpIR zl@(&Dzff1n8c9o*BD#Hg>L=IJe-H-E_X+|3itpy^v>O_98o1xKpgi~}?TJ{HF z0$2lhqN~tOkL2CO4lbE?dG)EZ!%DX@KKB@CtfX1*N@!YvqJ2=h5#R(OaoFQH$o5m!M%4U`@0^%)b!aHWOLD^AZo(!$*i<-vM|lj&Vu z|8~rFyy1txMDo$7=i5`yr4}};$c5iB%dz*Hl688`Z95bCQ|eB%Fq4LRI(;&1J6Ye$ zl9}1FI=ID#GAa${Drp@U{GYV|t(EJxbWPgxT$+tOO^#kI>)F*pZ-x7=XX|Bn=Na*9 zbglKQ!BK3}X+6><@#Jad2gw=j#K8qDQ)&)D5}HI4jJW+&8ue_>tM3KuAM z(aJV^XltAUk06h+Hlb&LiEB3L>&;4R-zlhUztao}pKodisOr)5zova24UpXYZVZ|U zZrdJzD!-|VMm9PC1o4_)Nr{D9V^vwI+ho?jGu=u(2&y#SR7P@NJK}J(Th^?32W^^& z`Z)tb%qwW)qS!sZX=cA>rfZm={IE+Lq{BUU+P8r86)nE^mB;%VduQK@nI2}e4acbT zl|f8q&(}2wwHMOJdi^ex6DO`g?1=+B!GuUWAe6WAcLNnhy4Lbds>liHL5#vp;Vt`i zuU~FzNz0c(stdZ((rLM??&8JjDq*^`4tYdXe3{Hvj`i|cp61+=ryCt?ku?p6V~v<& zUl#l)YB14dVc+v%J`Z*ci0L-JL#`eli!~w%stv7z?UP(KRj_l7qG~Rn3f|#QfC=06 z?kGDrvQ+iWwiaoV^BN@DZ%Tza%qY;In+M1N4g>-?Tfx>@KxE^ACMe=D25C>OGpHnP=6U#$Sp^bqCBzN+RK zZny5JZubFbopIqd28FaQV*$UNagja}Zl)RSd9C!rgPY7`=;}ZIFLAKf%g}&cvYDZ+ zu}w@gNR?`$hZ+RHTc)`h3^JoAjz1(c>dOvNAU|=9V(G)y2#0d-r+K)|V)K))*7>sGs?H?|F57 zd;d%7qpH^cA6<7N9061fu4lFBm-Zj4g>YWOH5WS2#3cy!RqY?j5=^i+q&LF|lYJb$ z$CPz8#mg6GrK!{^;ZpispP+2kuI$KL$SFH|1>{B1ed2el=+aHSOjp#G$? zwaAM4)_+N&?#9-K`mZ@+5*Jkn>SP04UGVC+en}Vc!*!zgpeC|-Db@(O|E*;hj?K%V zU&$YuD>_vY2|=9n&ZPUXR$4Cl3mVFvXW3kdQYy@DnghFR@G%oCc~$a~cjQJMnASMCD)GYR~#)l@XG zTP1hpnO=|ICbFxzK|y<=Cxxa^nZ;e_IDJ`1O3K+!n!(~r(#qy1)}*-MpS z8TAb75^0ffTZ|odk#?EX#o)~XI+1b0u@G>efQu&S{LHMsjo> zB(Dh$EDaJID<`69xCE9;!U$kukjIuY#I$r%RG0lK#R%L$%J-0D4PEKpZn9~W5) zqDne0V|qy;Wp>FvqN5H=`xp2Mf&;cY*XVEW-M4JZl70uaEvH<`nsVVW61gqMa7)Yd zgR;<8YR3-OD?gz*FzWPB4Emq8!}k^s%$Uos5CU#UvMmHMB9dCA4>1u2B0=!655YLu;{l%&( zPu5T9xyAlF$AbM<1#SiSY+!<##X)A`x)*MVfEN>%iJz2X&)PErKq6M@&}g+~(3e(u zl>bN%S7i^}<9x!&wn)z3=bQ|!%lebO*hGw1{6K{jwwk$Gl}iXlR}MU(1uCsUbaO)) zNLZHxr3LgOuUqy=^0W-=SDVGgn-{%aGn*|zsYvW|^9hARR(GZ4uXsqc3}!!*Il$JI zA5OVQ3%be1uo#!sOySLt^>f%de?JxyZ86iGuawE*Ee$R&vGv*OuG!0=XJATG9*C zhebl|guz{;mt3TWvM=Lg(cn6Q@=Pgu)MP8T6kG@u0sF7u!f@rX|717P#Dwyyz{RmDptfA$f6bqM|?eOAaW^@N<{O3o~q}))+Su zC-&c-t$p&Qf5VWFhYSlve8@Ma1nWT+-UlCLLlC2u7XbyyE9SsD`HDN+dbP~>K4S0f zvSIn5_0EB#Pg*WCmR0zQC;JHHJIik7jsB5$iKWI)8+w(GDWdrC%?DSzD$fgOOB^g? z=k)I2hBf@_gv+NwdznpkgX#B}t1dqAf-0Txlh4p}ZkS?M^=bMlhwNH+_Fh@CX`WGl zm>?+?2Rr|*&zAf=e=6pc%b7}(-X$-upQ~fkxcLxN_10yVm*4g6_VrO)S5EW)a7|>> zTS|58mIcEmKmXEJwqB>l%jItIk-68^^jM_%)K<>cM^Z(cFaBAp(%wSIz^{qH&3SIV>UB=n%zBIEwZxtc)k8y z>iJavFK8~#VaV3~g=MFodz7*omiXj#d@#pxBp-|D%g5vX^lE~WBZl*8A^fcBJ4Q; zNz=O(>8SO=7gw^#@flWGH=D5;-W-9g>)$p4YXiPpj_|U55@8B%6P+?zIsJ@&z3+Ug zg2`MR7M~EYv#>I&+7j?K#u&4B-~4|9#?K&tDbWOBXJ>xHf}@vh8SW2nlFjz2x_#^V z4i5eh9qno1A^%A*B*}Taw7{xrfK0H7;}F$y&OGXut7BJg*>SQVz1rHA0&@2oTC;Q8 z{jAOG)f1%QIdxgAUEAh-6DCJ#*3>MY47A){xSg;aR-836vEpOxbJ~Q`lxq=5W3V;T z?-y3YJ;J>>MCwa1cAIuR3u66VAQdg1Ri(905rS;nL8TR9eZX2UoJkYp-x%Ym*l)Kq z|Hz77LTs|N@~M+`3Q?I|_MoyHbedGEEf@hrLAQkv;eRB5CtI`Ke!`m*5IgucoZxD0 zo9!LAcA1T5BMf8kA1@_M=6_H__p^KS+Y~Ld@>X;-oy7uZ6(zx3tp&d%>5kdCXVv1Y zxZKS9{-7hP&{>oru%g>F7nO~k*p!z!GVW~iIjr#Z@0wa}5|((3MHUHn^vlxutA(Hb z3;UhBVZ1w=1)n6y3ImqXB`Y8D&WKbNnJ(3eYWZeoNc7FrpeOjplnDwK-AZHs$EA)Z zSJ~P7DK?~<>Z5vT9SzK_NW?4U^e6!*hJ;ZKdq&dkb5QCPR1 zO5i}ug;hn*Ym5Im;kJhs|EP}W*!@>$e!EeCO=DP~x*9tkQ1UbVJ18={hRT*{l|fvQ z;)*Qplss!}_PrUPf6Bwfx6q1qCIK`T*=8zHw^gc9q%|&Mt!k~6IS?-@eI}JE%k~to zf(OTh#(6^F2o)W<01Fqbw5_ZGV=rz9n`=N3*`|YZRSvVHQQNVFqX# zKgk95#uRiOtvU}C1%P{aao-EAC*$(1PjewKx4{`jw00`?_bSq4=-;}7lvQnRR5+G@s7PA0_6XQddZ6A zEiO|n2xc^Hb<_Pek;3y}uHm-~{#E*?baR17&)9dY)*`1*CXYS2S4UJ3(lg_i!9ap~iE+RM(wTYeh{r<&1s*Bw0`Kld$=@CkG} zy>AXbq(4sb41fFF-JcJ?zZ@N{Lf!q}o||;3yIIyh>RV4DPBNb(eAkgHT49iw!%6l0 z(T$*yPM*MpRbbHD!-6+xiEK&=9|Ril`*Lt*fEdO#h;i7K{}w*9!L8QK+fh$Pp5}<5 zawekv;snc+W-alXLsAN3XMV7DB{fYJfY2=ZEZl2=zyTm6eowOGkssd{Mk%G-aanCa z+#LC=pmcLWJNZgtOLK_7tCLY*uYGmP&+YZ{V`t><4ijoMY!8XQtKIwaG{oTv$L)WT zh4|tC7jtZ^FCV{$=lgqcUylCAy&k`h-}fk;?87%VgaxzyVtL=-Iz&qsofVD0kU_jD zjh2WlX7pm3VkLj7wgcFP3OgFi4HAAN_W-?Vgh6kLQEC|cUaxnK7kYZa5-~B0kMH-- z-LFmtMk0~y_`ErJ-e0!2FAGPc;4i(TCbRYQI@`QIKQCr(GM?s)FIynfSNTf*- zmZHMxo0;jLNjGDV$}IsLXTi-?Ez)-UbtB6|pjsaE&iOAyGF4^C7*#9tfW3JrJ%nU# z;QmGfi+@Ae8Ky~y5Q^i@;7GMYm}kQS8>ucx${LIfwuZ>hGlm;!Cl=`}+FFZWfkkP{ z6s`mYt9bei1APMXBr}WxsI<>N1E__QsI}-lLdUu|I-}?L}88Ma*K5?^)bBr)R2AsqL zrM(n-=RbsVOWZ8$UITvp5V4JZB~|aBFAC1pdRDHc-$WPqTlwmV7oB9Nk!{QkL0L7T zsD+#ff6c{vj%j1|EN7jwQ|kyp#VtJ0X0__Fbhr+FO~pq&EVP^_)KHT>6z4wf01MjE z2i3FcB29xsWox84Kur7L~UfUCY#s(<5Y=&O+M#IL; zJNkTFN8swEYNTcZsLq#;lC=*9N0^q`bAhg1YJa`~v(azv%L6W?|8T}rbHg}hB!Hqs zy?k4$+wL+>C9#vT-O5bufVi=RTnAF)$p3y!Wiuz|e;6YZ?Hglw)~)9B{)aIzzA;87 zT0=pZb7YXxSQB6>nEO^{_9?g2lbQ%}<_);>B2ph;tThZA2qVfkZl@yJGmuF@F>M;% z&<6ke|1d@Y&K;D=+5K%JxbfG0H99g5bj;qmwZT74v4lNN+))6v=Qmoj&s?O?$Fp+c zZVL>AZ>X3os$Z5e#{@aU^CYUQoTLZ!p-VW5i4CwKo3I+gVH(rAI&rEif-teRRBk7I z9_s?NzWEre>}FT1H2)9uk67`-163QdvHO?I!x)e}EQgz9;Jkoks6&lRk1i98I!o+$ z$^+z~=>X(&t>&#O+}0q3-Q}Xv$FCc8z?Z&YV4HfgADM^lC;eb@CZulDN%QobjnU7_ zD+`|qVW4?wS*Xs0lB@}FUlUPaYvEaIp|QMMxa#`4zA?t7fyIhsjVh`&q6)r*3T_Ku z&$LicDeiDzk>Ss!pkzt-E+kZW)3??49VN>wa0~g-f;{ni<75>5tQc5{Dp%D%@w^}<9f3qCb(dl@gJ4MB;8A| z$-9-W9#Q5-glotOD)zu>H7^O z_{<-LXslF%K=5H#8JU2QT+(pL0sk7CF|lwZv(_IP;4A?x31tlw*XCHRD}UX&5Lf?* z5SpUwG{Zvg{{Y1gM5{$sFY1?&B%-@CxLi(dNQ0q0r5#UDrluR2Q)TuYKjWDG`5Ji{em80skknJUNJCdyfPpy*|Q z=HK*nYxMICT>c!nT)CJWl5ZPo^Qu+^cR+`#rb{?m%gU%vM0)-x4x(}Na=6=h-g}to zId~Lz_U`bzK0%-CtlrNRwromsk(2F~{|PBh*j5|DiWDRtXH98re#1VZL1lw)XkXae z9fxeG37ys*Ob*^%*Ak5mFD zDiTJC(rt1;RcSSCy=EIc#mO_^)rNVzeNDo}$^UNu^78uZ7^|<--sT;qx9M8FzuhS6 zcz@veWtOtpDGtT)eD_ieaDKn+TWIUsU`S~rnCje4!5oo7)YB$y;s z$t~Mc0Sui~e@Ne)m|4bpR#{jl=yIVckHAwhreXRS%Vc73Bk<<{jZJz>LOwVCt}(fZ zSsÖ=XN)X}dtrUsX1PvDW~MaGnDk)VIvi&3JJi!J6pWH+Qgq<1G(7fP8GqUx5e z6%%(SnXOA(3`;Sx{amSX_hQmL+mHy2dwD_ik2S)R@~G#V_k{__i>J;gqdcV5S(lCH z$*-bLCjgkG74&sVtGm?z!Wtg4LZ8e50?%scE?35C=?}GUq5S-O*pMG9T2_{u@Q#MF zF2Ex8)s88kfHeunU+wsWDTFv2VA4AK>!Hz?@s^jT3k(^}4Md31u1E{j^5SKpBRt(- zE*{zf6y7r9mfqBa4eslw+nj0^!!X0oPf%M0S}aT7?p%;6JRtcHL5L zVX{Swn{!PiN6xU)1}qpu47%MPU?JQxmf0VDNNUSZG4hn2SaO+puA#p7BDpp>vY>s3 zV73sL=}&&#I6k5#Dm`J^7?nJZ*9~IWz58&u((F=PwaEXmrf|vpA(?-&b(&<2__4`> z!pAb}>Z%5%qdm^BYUxUESlGjAeF8zxw3M;ZvbiFOJ0Z7f<*J43bG0@$WYdtEMr8wl znl?|hfUxrb;q7DR_Wz8s=)eSJwW%xmJ1?E9&QI0&6_9;ilYcj*ew6dXKyTL>MAbSh%T<4r%W3%1QBferk zw@)qo?$_0bDc-YnTC*Rxq&fLye8x9TEcemGde7X78#VFc1 zhOYR%xyi2{DSe)HHV%m1ZVy2G%orFF{^B_g+vQ{zKCFI~v~Uqi2Djsu5T=>55Jp*Z zdZ2f+J*UDqu0YBd{>`H3MKWfPNV@X!K_B)8P3fdXhgrMp*gvt(u0Y0JTBA5p-8aP7#2!8|8hqe4ZLzq$dfgov6+HzbR6$3;|S> zoiP_l(V0(ap?V34!smZ+be)K)mUnaI)AN3BaPzf)@Wu4wdwD;2KHR?N_3?0OO9)!R z7$NHF6guC(9$R>6OAN~IU?>*P86GIMe!c9w{Pp?_``1y;@p=QPeW5B)P9pHVWv?&A8&1(yUOiKb*%b? zk|p1jWdc#Y(p#rE(ZfsM9c~itX$huV#W2z&jgfyM^79<)@mD;0v>%MWM5(J$eW;1S zWV43K=Q@oivUgjwIn}5tJp0QjXOu8io;}Y?17L4e(hbqLNzw}RafOH2b~P-P8{#1D z^OUIrrV;fgCMjjxlK$S(-RiUPM-*FG3W8~f(p9!N{kpJh2Ua)xICT2R z@Hw=*Id}Lt__%mYATijv$=mU5`f|Uy*Sy_!?*7k_q!7qIx-K8BbtvC|?oG7GN9kYu z($VoD=ONg1aQ=if4gYo}tL>9idFlQ!e@O@h)XHB4$V@meko_rX1P$3u^MZ9+M9D(? zgl^W?2H&i~nOJY$edl`3E>ht9wWE{aG~aAD*jl1VtiST{3g0G8Dbw8uMoF`vqT3ku zxSNN(JO9jfMFfqnaSbmpeJ|P*JZ!`_>GXw4b90I-AJD&eaST1<9L}U`kra#i;lY6> zr`A01>%kaID_8*B(=S?uU&-M-L~!cY!OG#k9FBEgLJlM7)ycGoW&elo!V|RlMoY4Tbv*K8FR6$!Ib6(q!rbeix)`i`BCt%&sayS^H5%Ra3?l^Z^V*y~}niC_%; zpO`V1^_C%RK7lzc2d_I@Xd~8GeR+r~-4b`QVpHw9AE)`F`nTmJkcDjg{}Ssr&);Z;^k(VA>#L&wHzqgwPGbjRH+s^R9n0 z&B@})w`IuAa_o7n?6JAB-{o*yRr9vm=I z)fC@5`W03@qy?Ah;YYfO^;{e3$?B7nowP~k6fq3zA9a|`E9sow(BZx)t#S4`EBJcPv^RbTheYE zlWo)n{Lz=T0x`zH7ErF)H*_+RSrrYAV=li)gevQ2)uKbGgF+Zh*>=%2>k(Z62XuMp z;RFj+fL-(q_W^Rf+6Z+UcH^(Vx;KyzS!yd=1l{O<2NP3%PjgZ+vMxG`+gqg0I(Y_1 zx7V-V(kB8~KzJbd zO?h}dApX#C-Ox_7*jvP$nmbO;fyr%DMq;(-EfUp}&Rqh=9bpdTRP$YC=Imyn4$>oW zwS9Vfxp!B^BKM`_=s(rKOzBPHh4+j?w!pEvh3`x@Y=tfcIH(gnD;B} z-zRm4>5))jIL2-*y<1*EAaDoV-)vy0{&Az#I<7mZ>1rC^#+jYZZmY6QOdcvFJ36O@ zfD-j1;VtO)3O8PuW|$6FvwlK(hK?k~XDfVN>9X#M$2@rgC(NvQveV}7a;%wt!~Dd9 zu9acu)HR3F1G8kGDe6+1bZFJ)oKRRg-=74v`ua*+QG3+tJ?x6CMID1mKSJZhaI0HC z{>3HUUyZ$bO%qR&goe`wln8(A?`T3dYpLdnKAF)-U9U^~^Di|U3xi3J)HYC1V_sd^ z_R#|B0s?+ok7a6n+@l>f{dsNqX19 zpsWzC2!34u$oNzwpTWs%Z6gsChD6DM8M{!9dgvrXay0pKiW5FL`ZlzHdr5IvqEW-N zu%_{VW`c1BR&OLK|JUrx?{o9{Dk{jrftf&tGgRu7SnX?5fKYI)l~Azio5&m>AK!F! zJ)~PLTv?lXsHh5Dg{!|`CpGzk8(u-P3T--B$OR$Ha33P#5(e9pwEjJ?RAs&l1AkNq znNb_i@;wAX(v)9*koUflPb`x zFbq6Kwk9mNiHP`FQl0@@IlDo2#}o@><@TEDPAx&0Ui8W?RvcOEhEusGbjA*0UeuK* zi25O);+O2*GD=SK#MeMNiujzQNzYd{Pc>0n-eiEW?u`Jl$f#9wqO=0^(L?I3P{dJO z{El&CXT$6MGc@)CVw;_=#PZ~kWD&n#o}!28#^6S~>_iZ&3BywCrs*8^WunuD(^mw1 zXRr=-d7F|V4|!au%3@r+RW>_dUvK3gLM46@T{SXJXVYcez8Mj|hZNP4yGGk!#cp;i zg``Avf3F-rH-_)X`vZAWSD(9E0(F3!=Ku5;KU(D81Vo^waXGlL_&%Ssm@bv2hw{c) z2YrPCTI0@|pn@e!K1TCyX;@YY+wvEyydoXJFCheDCpE*0laV>`aFbn0iu1Er!+rSt zdyiQtK@eiFRLDAb?Fi19x)8;4YhwF`cghSV&3b1drAGg{kD6+vUK>nXt%gzsB?5$- zn@lvH9SDbiWWJez37RxY@x&d%2de^!cE<3W7G0hL(^%v)QCFkIL;(D*L=1`9)CZIC z_6TK^FvrYbBq)IXucGigD^-7Mc-U6aucHA^%UcVFecIEx$j1A>Yl`mGKLE&LQmC$+ zQmwzYJlo1VhtHQkvz{LTj;{KgNcwYv2!zB}MaD2LIO;C@!Lb1ZuoR1;nI*%KS56On zbvZ+aj|(nkh^g!y!4{EKMxq;G!YE|&1BeL0gZ$#16oCqn?fhTx4?7$7vkuX~zZ>Hh z5THgfRcHFMxuAk(0^`Xj<2WiP=V69h>bLZ;P*%S+?`>!i`%Ee}azO*)n`U-JmOF9e zD^AoK5RFu$JZtBTQTkgQ#X|QA$-hod_nXcV%eQ8m?r=XR{NoI{4U6avJisqsMtddS zzpNBZkZ=ZDWH2gymxNBqQbo>;9VK;)u@6F+luXWPyky)ByBom@U25G~Z!H!QpFq5rg5m`VPOY`FkV+=N2w z%)}}44Qi2a0$Yorc1xJsR+=tXb>L7yL}?0f_x-Y~QT&7Sr=Q76cTf{Di5%!bG6W&p z9p27R(-aTiMBYUzBUdl^05stb9Ohc+)ju#%*dg6U$ck3%#zsU9_^5bkAjp5P8gQh( z_s~(n6^*`YQwyPS{CAKI72^Pp5K_^J{4n>g%Xyz9Mx3G0~7>j;y$cn5;^;+f+2B(Fn zp?(wkHl_UgQ*5A3Zv@9CSa5mf*5r(Nr8Cv zj)5l8$tZfw8EK#TMT{VeAhTV6i@d;O&TL@}aBP<^Sc>Y_X6&)VBrUNW>~OEDBTRW| z4#@yG356itswQ*nvLiz9Y6&6Dp0uh0aV_cEDh@KHFu{w+KLE7gkS9_^1%R^Q7?Q5U zGaS`0Y=)!tNn`*v}1Uv!dwb+d4xtg<(x3W{OnaR zn>m*6x6j+>4exJD(zh;G=Pk0eva@FHc{Je~O)ESf2@@TGpc${lmQb}f@;8K0 ze%w!DwM5(l3bNy~wot<89=(3oLi%LNNWu0f(ij2t21!6622-+OkrL+<+$-kdx6@OR zSP|9@Q`K_Qf-8V-8KwEP;r>wQ5f(W~)Hc=X!bCC(L3npWJ5;R#k301w3xfQ2HMZ(^ zgxopdc7y`G=yi{%^@hKq8MRgSNHIC*=~$Vi6yVt_>Grvq>!W3I2HA z@B_*lvf=D{1}^iO$@V@@IkjqI(Qlqgro$F)E*s|_N}d-78ANGeqZcUMrm1s50TY%T zC9R1m+6z;F)4*BBnYrY-AyFAI5}%_emg)dkFDFA!*a%6kOv7553CK+HD&4sL$JY2B~J|7fPlQZkVwF%Z4?9~Xjr4;wjioW22tgYb!ge5mv3uoVX z?sHX(`ewdl{NNq(2hp7V0q3Q$-rzyeCG1~fdV`Y{l>s~p7WB7vO<)JCz(5t)QsB{6 z5$h64uTOjXAuS>iz*FtYP@(yrKez(9Ab>|lQUH~qK6(#& z-MNM(Jk=GK>>QQJKs*RkW@?Fl6vm9VsCLKY)kq}#3h_0(ThhPL{T>3VtEBcf1l$WN zMqLyu%vwrp^PqNusAI4vFj}{#e;k}5JTR5F(ZP8qgCC;RKx|a?tK^7U*{<;fhR_{VNm<^1o!Y_)} zC7kepQH8C=PBgCJ)-1yk*O5NK+)W>HWSRn7fjrM9ONiLiRxj zCI@A&HLaV?`@@D>M zU9?+#F$2?cmn0ch7K*dHgg7;vnLLGHEuoQ_Uh70hzVWiTROjoM;-5n>Lz2Za`}pLNb= zAjkKx7MgvwRd!7Oa9cYe%Id5i=#a2aw$>RFq@KHb~obXB?-Z5UjeqDGoGc^t4gK72|@FhTn) zTtb$n>}@ZMgAro*aoxo!UHz-hD^)~1lvk}1*5}~*mBu{tu3-A7%qiUgEA$I3s9QS9 z7=48r*7zdXN+C?9Eh~*dvLK0RI3@@yOz__;^{YJiB!SBQ>&{+pevEbgrek{RiOF`a zS(Ju~;~Wr1q#H8x=TI$Ws1o541UOgX{}CiN#T$E51W$G=*q+}}wN>oR$H#`U zum97N+;mEP$Ny89j?AH+w~udckMZWR?jnQM^5t`?Iy2YfNM6%&FV57P!)*Si%8iu^ zJNksjRPlSi`}1FIc>l{`aFvi0PVEr_5^p^B?7l@OFCwu6vp7)4cB6<>dK( zv-^H;@%4O%LcWjc@ddj;s_v*jm7uy1IQk?}VY|k?DoV(LtBNtYx>RMG*r=zpLH^|% z0p=xNuSBxb>m|t%P%pb}gUY!EKFJ*Nq-fV39o=+;>VX>)uhp#Bbi>8YH#B&({EUa2vln*5m0WrjeN=n%+xO>G zpIg6zFn8&&V?K^p=7cVvymPOg(|R*M_LMGcAVW2>C>yx>RKTKG#g2wmGB-aTQvv}+ zAERg%9B>Lj~7`Vn*?DNTgurY^Pcvkk{NU18CmTPM9gb)H1ZN0 z-js*+ZCX&{10lY-5>Y^ra;d+n>*wea4bbBz6ZN{6p>u4)AFcW-S+I5AXuYbSt$1{D zR!cD;-$)KCEC3!#Z~BWj18csFE9KCBgF=P7PD`c)O>O0+V;)MWxorB$kQJUJzT}HSmOV<^*v2iJuQUKv7TdqlB3leZ8Ji)>?K z1(riHcMuIYGW8LOAM{SF6&$G!bvA)?;LaIKd$sfSda;IMnUn5XJQJR=7)EnsKdc(A z4)+{?fIuPmtm8Gz=ubSPz(WNwF4G2bL~c(IyVpbemWp2gq^sA2_>!&;OzC==V0N#E z-=q!tD%=>J;C8P^+^h)VINK)B2>6g>)lj7fR1U;kCyMRTPJ>n$Hvopd!m%_gYLXkt zq`S3a*@9NaObXs8WpG15*t8&yP``NP3qI-ylSCO$;D5Xn$D1Re3o~St&J){<<*|Y- zNvhs_k*@eLTWyy)x&Rl183f@>d?vk;R5i07=r&h zxrYv((1_fX)EU^2CEAvx^6qF#6hQd!H@b#!;SK=-uCHJDxqkc@=pUNI>m>Llif zLYsru@xkRmq15CbI#NrJ<3+Rk>}FV1=2qXmpo0(uttUI2Ci=lRmlq?67lSQ=Q8ez1 z9UR4@ArSEwLU)@IlWVlNyBf7uAVu-nxvoc;E#3@6>>o7I-Lz1E~Aw+SzKN1 zNQtE}DwUB^BxuO!)t>Ku)GC=-r^J7E0AT?b3Uy;O#YNie5*n;7Cy4w+tSvx{U$4Vg zUX>AoL*7w}>DB_jAGx0b{EB7aB8v{0%qM8}oDAF^&s26a&{FYzu%&m(cGpu5t<4L|l}%?z&aL-ysi%|d6W4#`OFU1ap}ha7k4IC`8j z&mP6m2%7SOhi)y>VsTj-n1uNwvCFV3aCsVPg>iZA>sRx9rQj^% zR7@iU4JLIbKwZY28PgW4)12cwt=N+(PO<~pgv-6eRH&;luobB)TK~x;w-^4WifA7B z^sxf(WSqcRO=eeuGhb7=73+;MWqdILxT4Z(WYkx>^TvU}1tNm|O!avqveYPUTo8-9 z8*eeJJT({TG26?oAc9pe0g(}4bW2J?peCq?sd&(s+66FcE|x$;FJ?0-b>Uy_U8{?q zxv}w&6FvbzlI*<&1HyIe@zJpoq62#sffRu@pZi@_ zzCYzpP%LDee`oTO&n6GT0vCNlK)Cq7+I>8oy&UVDZY`f)Kg7MI?f9}bGQB;XE>kn> zQ@Z*M$o@;Oxwyb@=!jlLg^c}0Nw%gjtVhDrsdaJgt?vp~)@ZDw<5V3Cs)9v}L^KR!w z&G&j%pU@J;&F;?4b!_xy%z0;=MVA^&2kBz;)Fy-^;yxg_?Z3rfO7lmFD_&0Fv`OLY zc~zb@RZFqyfrbrs)*(oox^md+Uzn`zP|irZg^G@<8?_IzfN+3#`&tg9;PihN`hK2D zkkW%|xugkn=4{YFDX2MknJCoC$8&@WNJBepxuO|iYfZHKO#4pKsdCK~W6aTwT^ed| zu~AOW-~ytGSP!}G;Gi=aGY1s*Ql^vabn`wVY(F9CZWY=P6gg-P#) z6X~epao0Hgb7p`0)pZ9%VgAWhU5>7O4QH!bZQeaA?mu)0Jd5ciFCo2o-qNLAI*IPF z>w)j%1jog%$fU6~BY$TV#r8hkfuWt)j86iS*6oIs=b-a$yk9$EO5{4CPLyVnMY(h} zXpIHiF2mxLdw`r#nZ1j~0!L{U5L*^crfjAulXRiiHu!HYHUfmd(Iiro}1(I+F1QlHhGt*dh6*_W&0&Em?%s@*jez_&UEc@&a^6b)2!7w zoj%%n`k-XO`DLd#vXIEY=nmp=tjklO%}g*-rhVefz@&zNS?>3jOyxGeVy64JW6*7q zX+OE#JDA8%oWY2r?^oYVF4rEzc|!wXWlUzuiACQj&^t>zr)6KFIE3>ecTj??rJq%7 zdUIP<@Pf0lPa|!LI54~fX^3?o%>8f$PeGFC={!~aat20h(3$J(MQK@>}s^d6F(Tfdio7BrSJm8w4?`1U{p#98@h_rc_0Y07v?cP(<5wF1@7 z$OSAe_Lx{x_@UQ$(hnYn;>WOOOqA63FI|6$l`b4&@2MpiX~rB-Axi$QlTqdUuB zX^yPZl|^OYTEil%6g?Imowc%@hT&@Vsn??3z#{t;HB{rWf(`y+<0!}SePQ@BGxM^- z+x#_bNm@f{P+Hhrdo1Pkx+KDBb|NzNJ-lWqVoP8Ri;HAeZdP7u<;G-`<@c2lY-cls zY|h6ACmU*5>Qw{v7A6}?9TR&O&CIdv2sosBtQ%R{GqOsPM`LZx8A0h4*xi`+PJReW z?EElfvTU0rLKF!Ek($}nR$3H(CA)}{T(UEVO~*fnx3e)%wmGsrACEOPHg_@px z+{FHq#UB&1#ee?kf#TgZ8#C_fY}~3&FV@yJ($w@M??%oQ>-PEV$@6?6>HRz;;NH18 z^~vuexO8yjJ7VigNWzV*NG#01nUuQqzh=iG&Te|hVS3o*l=i~eDZKEcVFZ2RtthGt zh2t5r!*!VJ@lPF6+fze0cELcwUEP?;{TqT8qN1>v(^?7sAF|#txRVF!{)}zgwlT47 z+qTV#oqS{4_QbZ0iJgh{eUAIXnq9XT!CNvw z-T^Kiu<}Bv?y6fb-qi5EA7JB@quO+p+*sSG%vkJz9KmUYDa{~N0eAM#R5v;a(paP16n+*95ZVZb$`p&;q!C7w%rpMFk!L{NlA_q<-K;@E zXzQOBQIH{Sc5FvmkP10EX>LyNAw?2;QaKug^RC#T3gjvpG~azfsIX4}Bm^zg>e;{6 z+W+I_&Sv$0ro-~Dd;I*|J^?+`XWXwZM+bZFMS#J{MLTb2*QT~;1AQ`D?$bj7A=vc5 zmfO6Ev6N9&-Au^v{Q}~`AwUmH9PtQLqVu*v&Pqr-2?q~P7QKQ^UjvBQmV*D(+_~=)F+c@2k1N#eDYC`N zn_l-&3+CT_dfCwej6SVxAwgFk#@!bK-ta^_O>y_L-D$W!3hs|_VkEuUU^mP(hz63z zld3As0x*ul2TnAuJw)S1{bt7_HxPNQ!jA)?{L1X0HNa;~HA14w@U8J4BaEuy;P=N^ zVqAfO6ETIhBo&XiWHDB<%)l5xLybuoj6jxXq~a=`G*F1pa{7IUICPezm!R*j?HDSMt!H&tUw#bubJbRsdpZp&PPdDJ$$HymK_lodZH=u+6 z2f!N~jn|;e>+$W{cy(=kzdHKy5Pu_tA6s15$@M8?u7$q|V`4eRI{nI$MszD56a=+t z&y*H*Dm>KNm14f6BmrswrX!UfDBy_d&aVS+nCt3$l%PqF1{46)!k{G*Ibwt@$WZB{ zLQ|=B;@P>Q0FL>EYw0iJj5}(}z~@u&Df5d=(C>*@+k6%I*Wl7(`g60I*e(euerQTa zHtUZXdx~NW6mJ8t`=a+rny`ewtxf_yi+Kb@oy(eopmNz(G2Ek3NH-<7#N&EMSeKrhG>+8z=K4PRXlQYEBMBk2A&GKc-tIYGl>-B{+$^0#%>dTqnD1-Cf0X0S^O zMSmK)V3W%VPhg->aRDfjTUm$lKO21{!9E`>+Vdq{WJqd~1;B9X=X_sG>?Q=9m7CB* zjqG_A3E%_a4RQX%Ar->qD%+OYjIhdyZX1!EEf#-8GT>H7 zk82Xb^LmxhT9|%N?)V_}MDZGl(x{*5Fo%(DKAZBR$825x~Nb;-)LNA%{ra}=RnFf2tA)DQ0FmBK1PO%&hy!1CTX$&Pmn@5$(2eie=I+u|w zKkt)ep}w7dy~d)F%0I^c%ryp$zirO(DkRr(^Jcay2sQy{SUi&_nu~K^Obm*n;`asLX5j{S9nKEVES!zIFd%EL!75kPG zGw7=n!B&=MX!E^UD)Nn3oQ)yF0e@b1V1d(RRQvn;p?9fBc0jZD{io&9zXzk5!%hQOf(&d z*ng-*qZ+-_?40EnKWpfWy&GYX^Kr&_Bc54K>U`Kaowc?uX6}Pd1nCQdwVc?e>s11ec!?yc(V6kP!M2ge*Zc+d0t(8_t9YNMf~pz zFygJ9vtqNu?h-9jWp=y*w%(IYY^+|i5vldQu?*R?B2$TYyyJ1_Hs*2b7O1wk3M|7Q zXTRIR)n1fQu1C__j9u2Eb3%6*h}qr)_QQx zvdV={92mylO}P%VHXl8;Bdo&6BH?yNB4-T@k@+W{yY#aW2$FKTnJ}FP5=)9q@0EzxUHN_KKD<4Lq{#2wjQ2l zE(KYSX3hvgM|VOqP=C`M+4a9R`swwKwdi^*Jf~U^usC2g3cwTI>Xh6buBIc((3;2JE-(Yw9@xbk!f8^7Q5Dxkrs z+t1lwEyhAp+NR+L!44;07}f(YiT;Ogz%xuwYof~o>BzpPP^+4ZK-0&=fK0{!7^C)AerOLBx0KnEhMEk9g8E9QP58}#@T@rv4UW=sE%L+WPnMihaQk*e za*|@=A1jIjJ^bvZ&Gm2JRMtQ5j=CO1wfe=SM;b#~h%GMep87HIr~OMM1K2~Vs3s8r zlvN;I)T>8Hqxs4)e%q6(HV={uV--dImSiYSD^+gyi*Yw7yGr$KQKO2)P+ZOjo!CWj z-dK+X-1WN?S?tAJ7c<7WBH5k&hYQ_#-8#Vc|KmfMsI$PKpp$9ev8g(sKGHMySb5EA zzxuAm4=Rk#Y2Ds!kRdAScAFUltbxL(n^0DK9%hs^LaZ2`U40IRT5Kp;@ztH^tIPEz zdGR?fiKuCHPdB9fKayKH@AX(YKVF;skwTti{lNTsw%7kHPej~nBbQ?{6B=6CqvO8G zAIac*Ry@sel5%B!@Vj9+9A^_n)t)cj3h_j)K{@e`>)y@4I{wtRP>Vd zpk%J}_EHy6m>}Tf#~dvMjYI$_==K->$^Q(_FU@5mn+9v$ptGcN?$1VRkPdHN48a?60^cQj7f8*Dy3SJIn#evu7HZ@ z=}X8yPSG-)3)fE13GdxVmdV^G_#xzC0MuZk_;lP^tjkh?kStiDnIKT(_Z=MYQT3Rp zcI0(moRpV%B|hu@=`kc0GU!lsVsy&S(DTcPO;zYh0>W=6`npsf7wB(a2%sYOT!@BJ zAu$~pUd%b|9y>I?frWulp3Sl_X-j*#@%AuKlN4%Jk9Wh(nQg;BwEc`d5WLckNuIwP zLrB*vQ;5Oy3fhX%i1> zT{+O*S5_XVg3_e9QT4kq+E{0Sqw;ED#4qgL;h$DuBH}s(l^>^fy{HG6yOAP;xMt6W zCy}2%p5s)Tx%dLQIp`+X^n+`?AAX}T<_ zL}-%D0yRh9i2)ssP2ptBaMD8MygruH&W{xNw!1$fa($}0!n!rv^DM_D5J`+x^`ysv zXCONNx3jK1G$sOiu#zDyAY(x+E@7z|Y7b8)0#6@V_ENrW5iB%y*)~kLDplMQimyyF z%)A$)VWgdCpaL4>Ne6V*x(y1bsWyyiLtSoNhzll3PSF8%X%p-bXDU`s)B$z=Jr}vV z5bU>kw5A=+g)Pm+#~ix5I>L%vV$T06uVGByor3g<_9+#s%w^97|D0*A52v&#VqbK; zvkzeGooojAJJ4)Mifc){0rR1S2qP1-{Yw&D*^0$A`50WAE2{Z_!WouIbj_l#{?+43 z*&(3l!y~4pJ-!-hoeZsnPj1+J@PK;4$h|E9%$t6`>LK`NObRn3^}GZ!ctdJMjAMDB zChGqnW?oX&q4E6>$XSnos}H2{oCOFH&jnor-VyCn>lw)x>0gOk4&xuvNoukZMg2_p z!yPdXWd*q*5XIWQoH!xzZ*xwR+0~XBV*K*|r{=DJJdG9|j&v^zIq(UJimjrBw}La7 zoCp}kVwTQ>G^eCdt2WC5{;9cLE-%41irO_QPGKhg{B5DahbOrmAX-`a9hIBZ=?dc6 zfDyl6kTf1L-J)dM^E}Q(i*KttUzJL(m(PoS^!Lq(`jLK9IFt$h z#NdDoMM&Tidj=~DK~%fkABxS8`2I*W;INp27G{vQfbnu3Xbq^8I7xKu-F2>5TgDGJ zEC>dL5m#lSDDAIRE!Jz~G5EJC%jb<3Lk-}x(Wx>y=5f9c;PJztjRf3vL+(|Lp^6t9 zr}Utja5efV9HaKHZS`#b-o3N-k-l^-ZH^fhB#$?8{l*gS0l=pT@{O280)YroM4Y&! zXZV()yK=I~AT|vl#^rRAgvm1HtTNqiv9OHiM5*pX18l`li{4K- zIixt$3a(A01QBFQ)_(@{$~}_FMdSq(*U4S+62Cq92R@Z^Tp5=WrQ3(8uh7(Metp!} z?U?x|l%eoJ#a>hx*AYgTqETN8iRJ2uHklK)CY#R3&b-k?%1)M}f3zT)8C*6_&Ynnw zhktw?A-{Y2{OqcC_xXIi@cm}x+xT>Sx(jdAaK1Swc@3U_n%|@U;~U`mQ!^Zf`L}a( zbMf=>`F_8CJh0Q4)g0z4lYyp0xL#Nsh837_>1T`P@=XLU@nCLRh|`h&c=>5a!V8}_*c%k+;m4KMpV@Mtx2=Lq)BxnFe?N}8c#)f zvIW_d8bjI1+UZ;yDN|Jti~{sgtXu;-l0#!7j+Kx5+Mn+Vu4ckFMa!!g*6YASn%Re8 zv#VN30yhP*^td1aZJD?}J)#^6HWMkok;N)bPesy69mQ^rzGd_HJbHQ=(`~ReL@V|R zb!L;ZnHkF5I~JN ztOcdK3$y5!QIQW1zPA=ck%rQVaI(ll@{iJ>o2Z;AK2>YGL~Er|Z5O?i!EU&tE{o2v_ z{uIx8<@}B;?ap|+nLejD+qt)+`6>al72hq0b^PQ$JcFW)NpZj%2lkPtsZi4gOx3*|Kr^VB5Z0>u!tf_2I(b7#$Og3T4j8B(xBl5!;{Ga%U41=&kH;m6?#{-JLdBO*nSsh|@s z0O~uIbX*iy6)MPVG)VioK@WzhDMZG0qF`Xj6}g_cH5mns8;-@{Y};slXs7({AYx&Da% zdY*r>=i_sZ6TRy4B39!C=2G(P|N3>iNdAd7AWZ(A^Pl*xQ*<6{CFjf_Nz%?13MV}z zf>gGYhJ=cdHC;!!8P+amZ!xbHpU@ytZ%B;jxeW|N2-0s*>4I6RK9KG&>JPNpImKT* zz1fRL&t59N+u)|Z*nb$jop~B&-sl+3#7Y4pC$R^yv^Lur5^!D`e^%CRPb?%s*K@`aGGoE!j{UiI4C>A0Z(NWLF%o(?^ zAJl7W2I+8j6d)}NA9B)r<`sndb&%m$>DK1m?TY?dN*Ac_fc83jF$;8e3=TQIsMw9& z)b_}9JiO2lH)dlsCU*ZV^g@bWrvOZs^Nl1N)_?IaYRUR-aI{m$C-*N0QO(iEX(c*b z+Pjw0=f}aS6NqXAu;}zYeeIQ3FUW1YNLS?6eB3zE;#KY%Vc{W&8g#FpKeA|RV8@o} zJC}Kj{my;hLnq^7v}<4fCuWT`qK_i3;NbnqgMFs2xq=8TJ*nh&_JoosKPLJxn)#3L zHb*eIyMY`dd0kRC8pas4qTKXvOOR-va|1L}5fsg4e*!lH%3q^WIiwbPDOud#8+dRM zJv+EzJ(PK^-s=XK>x2&8;a6Jex}r4lgqE~LPxH}B{gR^cDis3WiRWc~)_(*RYpL&` zr*W1hf@h3#UQ^l0P`z9VB5Xh`jRBbxM(H{nE^=wCtEvo61#(;s$il7AR2qH3tw0<~ zOJ-w@)xUVzP#&3JAS?c@t1g)6w&YVL+e~=<^=Gf4rY6lfH>A^#OQ!uZi0vvH6j={$ z5@C#h2So%4BXdf%>Si}wAczp8tQnzFfz$}ph|#m3(Ss|+sVL=(878H27U#6QkfT^j zz2)@2++3Lg9^4wugbF1%*-X}ACk@>OtU|%m5F27FEPO!~if=`#^G8q+C=|XN7MR24 zL63gR?puj>I8@i{v|LjRk;a;4-NLlRw&^Vy{55l*UdUQ08)rb2a#jS(c=NE2WI+t0 zRZke16W=UDdV@lp1DwHK_P7H^5wJOgUOR{vS$70jIQ&wJlshZ%KII;17cjO(E)?Kz8B8Yu9tiiKM>EqyC zdt=hlLOw_oDZHaGA5sewa#=Od7t_1k<~@u#lSQ|}G&$_DsNXTR+H~y@dd=O<1Y11B zhg<@O@OfjEAAEStCs8hhHAHh3s>CQSTKG4Suxcr7`~Yk=wv6nAYaJD)mok`0_AWTD zn`!LDa|DY#X{5NWMjzX4e|S7=`}<3P`;(*@IUH0C>T6ZME-e(|PNB(Qvdi^kSMK`z zQ(<`VbwJ%8wUImjA8X4+>j#lVQBX~xD-jRP6Uos-SOMyZ%l30|#LmNR5-=Oi6X{<0 zPrXW_^jTJY=8yI0PB}Fcppe(^az{Bnx>Ayqh!T1J*`lZz@Gr9OOfRhG8vHZs2Oc-p zEp4uiD*K}h8<_*yIiV4mNqH;FPuZFkNkYDO|0aZ0qB0u2cs=q_rb0^tkQAWe`)Z1@ z@WzR7=vE>k2stTJVH8REvKOWx5c|v)eA#Z@N!2(^Bd-Hk2JcCw`a;xHSYSt3(Q+VQ8TUB@>7=AGR^AsGI;EF`S#zieG&YL|P zUD5@n((kgi8P|7uZPD@LQyiIBAVHD20%E^83Rqh!0KVxpg-RSLm~%)<0{X%7y$nKa z_>>Z!{i4GUNsh8s$r-RZa9F`Cn>7=Y7wh>w&u5+(4^fHKqJ zR{fnrN25ULLK@d&>>SGXDEkn)CVot_H5k^KERej~e)ux}FhfXta>pDQ-??YLmxBxI z@dm)qQ&M=p@pM7bMF?>-k>#7hS#3xOgADBoNnh zGU+%BiD{JFb;dj*4Weg{5nj;54wrKYUg{8(sA);k>QC>cUKTz@LTBo@F@!b-u==N# zS2G-D6J;HlqL)%`xeHEn#kXCdIyc)ykw-w?j2Ro;{(MUA(f#k=?7@7o1Nr#kkcYJd zgFGIiCq?=vw;W4WRrj;e;b(^OoeyTg;wAyP5nX6qAvWU2_lc*I_`d+V$ii4mQ)?%C z7&4OcszbS73AuJ+d+2aoyUxbhKE38oUPL`|0T6v56Enlpa{I5_dF!1$iixU1N!Itx z1+RavRN)6st*jP5Dm)A>XOy+X3{NUie2F1qml((aD|e&BUj)!(3>^gV&i>ZN!a0l2 z-gkrH@lBsfUB}+Ynxms$&ml2Q01qY{Jmr5LppX}B9l0(Mmp8zm3lOixb5^OL71yxO z>=u9>V{)bVLG#M;peP<;?mqAJb=el~R?~c-X4g1Tfy-b>V!RV^itlI$xb-GRysv#V ze~71$@9wgwykSV~FOTyU^S*z!(AhIvp-anatT%jTX7(~)QdiN-A!vGOA8lD&20agW zjLIyxdEV=C=pLciGA)LCz}`ZIBpPEE@cO1wV-@n~@g&L)-mBE`?^aa%n#0{btOSTz zTyD5(Xi(pdvP29u>M8+Ncf&ugEKS5M<8a|JZd8BP{xga2O|%PTc(1DAB^2H7QX2w= zIGu+(0YpakiTPSjkn_jpZAKFTgi|D7&_wJTGcM^Rwjm{_eQ=UlvRCla_3s#HgZ17X z$)zGsZ&tB@M#uE7M6wI`!M(9rHP37Ycfj8g$x)jIS3ejDvE3_bKgR1Q%mtY%(PNj< z%C0fFnpl`d*vMp+yN~bO&Acgj^V;$(2Af4O-42*fc3g;l0RArpZqV1)@Y^NoBjpF( zS&cXKnF}&u#|A&Q$J-C*XE}$PVl%PG!7*xrXI0bf`QMnKLaoU;p2yzT9rd=e+lzJG zRb@oTJ0r}coIllG>-P#SBd7mm_q)#a=2h0V!Pn0Bzq2&2jxPUH?TPQ#yk6VSjm-?U zbsGIh7=ouFN2b@#)kQZy8F0kVu=f@Z9&?(2FX7^fJ@=nW%>8F{vuRM&rzRAY`iTt! zPcYjLcvi~j*|MeOjhORg0pG9*SlnaETB`qbJ7j4cAPBe6>%uu;qjkf2Y zxu?3#zqeot3`gQvo;6vr+%<;od$uHmGet=Wv_Rx2PJ3=;esB}h5?n8)RdJJ?R#D*% zZ?KZ8EiJb_gnCPr+BY%dRgp>Mq}@UuXikpupvSDP8D(c5VRUdJJy&9u^$3+#t1h?% zd)m?sZhzD3CiyW&0bD1#W*fdeszgoQ;h$_f1E>cB&b+Qvcl5JCSwEj-#1x_xDmnWhT^P$IH?E3a?#x z0eu*ks>G#*y}1~a7ApM<_tZos@BHNZvzPSfEARV$m0VgREJ$^bjAMkW#_{-vM)b!n zo+vJsFs`w*{K&*5U_7-M&%p`!Xsh|luX_|=UUpChImHF!h8&u)*Ac0<#Pj#^^Kt*! z@!8=FQ1VuRS!L8Zb(hyV5}u_DT^76jK*jpgGi5DaRvmEi0nM%5qYIrw#2Tk~$(-E~ zn0O2jDea)>MeP-XxiI39H=M|(hC_0OpULDQ{61RrDg%>QcPw<&?Bd@`9t@eC@xZ8~ z^}a^mQt-Wr<`r~ipVq^uA^_iXq5<5hm=ofO?pbnu4dr~X62OP|NQVdCG%y1MjUZ{E_PG2|{sOj$q!}YmHuYwiaO(aiJ zQ5IaHqBv@UM1Kd{6lz1c~3P*AnYM=%Y-i)k-VY;ROpfRZIQ8Xv5={EDBbilb5 z^exh>i-4#ZJ^;K~Wtlx?hwTw14FSr%6UZD$97uvIjodvlKcWa(tJgCaXbRXInL-dR z^nM28o1DFMJxWL9@H7xaw(h0$LOe+27oUz>>x*7IDyY*fOcA%86ndeAM6gI;g&l|N z3DAjUl3Sn5La~yzrSFJi7!XCwvkBN05_&@2=vbH#e?t$1aNFnw;UZ88{tYY)J22vl zbvIydDUt3hvJ~^OB-Edpw|!0dP*%v+<5Jt0;=l zZE9rvrja_xmPc_J!j|WzqecET%hUJNIp6j1^De;Q!Uciy|I^d6OTQaqrzcD(ypH<1P5!MrUei6? zk=^G@cix_P<^8dd5OJ`dwiKP@WOUa-bS^6}xsj$bQtrl8-b9Q^Dsl)Ax$t35a;0#` z&a94g!h^^N9GfNs<8&TiD8dtD7C0_M4+R^NoxdOCbVyVZ#%GoeEs~~)d@)q_Nli0&$O5U|$7I7nL{4cmSx~M(sePD0EQ;by)C6qXJA2${% zH@569U#=`ASk>?AC-2#JNIqv8GB;{$WV(Jf;5OO$D3=ZzmgguM1FrDy8hVNb;X(0H zUhla-q1-QABm9f_h|F3z4NoJyF}_*A@N~Ozt9QIN%)?%Bg>jZ~8hb5SM5TefwHz5eZHH&l$W(E${TsJ^Px9a(Sj$7D|DB&SO}kgjpVhT8#(7E*X3lIhYYh z#;%kjAVEqner(xcd%kjODu1o2Fhf5F_!(_12>VMhIwYq;2qJV++h-2g0~PS7ZdlRb zK-@iq=MGCv?w};%lCX1kkxKX74|Rl-c3_xVGznFB;PB9&8u!tu>h{(aRJT@dKTV+~Fy(1IfbL7iPm@T|%McpHySv^CLPhpulGo#YBd4`p^H1e$I z)3*x(vpu+B;Ml&E`ZnrQjDMY+IYwM#dp5K+R19V?Bb5R-gBJe{eQ{&hgf7M=>=bCT zRTEPf8=35#c;BMsl@e~grwRK>IT;-mHMhWy%@V%O>J@PFcdmh-I0Z7Kd!?<79ch$` zIcw9Vtv#h`Ki?tf7T?CWb_{98*a4w(m01%!7)7a!z~ns9Bm6!fpVywaXz!B2Qx$U% z9^@~om$R;KN6E$C8`9UD12~X+}bPi#kZ8z_fQD* zvB>Q%>$7P%$CfKCVPzF2{X`X8z>$eUd`!KfJ*kh{AT9G^10P>vqBLm8&LwlF$+2Go z*BUa8vm_)Wx)f}%9J%@TEqWki%_l8Yf6Q2BTa|j?4ux4D^w-S??DKsqU-zTXn))n;=lWd9VYV)I!Re17$+G%9RGo!1Fq2SzUY9494D(a&H zio0m!ZvS?vHs2lIRpR}n33@cm93_ssdT20t^8BSjHq;Gkf8bj!JIE3YGz@}6It$)u zMbJAiujh1ev>ZT(mt{yMH`E6PDfEI|Dw!vQQ}xCE8hlzdFgCZ0hNxwyF7DXE8)_MG z{lMt4V=<*k9K?@8u?A*z_VXVn)=6`3@(M6Dc937PEYeI;NZiP%FNd5C+AZXE>#A~3 ziEU+njSppUG@ej2T2MSf*o7tq!*{V1Tm+}{+x^Bwo8t=e`KDj^d7DR5@9Q}X&x9R} z!u)a!RW}2ol=4nZ$!phorv?+(x~8V3>3FP>-Qfz6c?>rZ%ESol>j(GZBq(SY+04eq3JJkiWC znFu`uS(5{oK0RVRWFcjqqXNe!MT?h$XM%e9AV1{;dbel=jaRNPmw>ll$}9R|=p*eG z6ayM^-FWxTv;6Hi!uRR_u#Wjg_?Lmsb@+$j zBjYs1AqGJJSzd478N<$v`*PA|NftUhv>;TRHjd>p^SG>lI{d*>ni3ug4oS#^81CDS zBbM@fcy3nVpO}9DXLcZ-8Dy@L1tE=r?^tV^yL3DCDSHxxGE_2o+vAj0EW<6xeZS{A zu$(MUPeA-UeAQRmb7vRTvkVb=uU)`o+nlV!nR{kdRY-S$9FsA;@?m-!yeCAvnZ>O) zD56{ad1jEh1TedZHLHrLvPQZUX8T<*4ElUD}^rAiS7}V;X#Y^7o5AN z^}pun8gG8#6 z?0DPGDFuWQz0qUas%E#_KsP-_;HZH_S=+4{N~+1wzmh3~1ZxxvewRJ1QNvD2@f9Cw z6T7U=l(s$0_01bsQOBZk?fXMQ5b_r2Gt`;zsiyBn{1L0FOQB&s4(3gX%LqRvLrBnN zm0k~+lv{gwXz+qpd<)>33r)U(6W1_WGsiL?&?}RxA4`WJn5f17Ed%y@M>)HQQ`Asx ztCxTj2%9q|97SRtwsA3ER!=KAPA=>_G_D^};NylhwJ(E)xKsjDJTat-%rJ8Z z*;4^@NS5@9_BPjrMtLqy&yhxf)VK{fS%|^}PKBi8kPtZv2+r;Po8B%N6Wf%#vAG+l ztj4-iGFaHrc7p3}ZN!}?=+E?VXLX|pJgX3Ju5wPvXrZ5{^?NW;9@!w=g>G(_{f_W= z+!VmI&ngmqFi5(Jk7F2wDZ@&c6W}4^i(0sIR%r~MRUM}9ueTRK{B$d^@y5epeBF=K zpG^lqj&JB6HA!=(A`~}nQq>54F|hrVqvGoG87vc=$3k=f&kf=)YOV`rGiQQ7P--Q! zn=;%WU*=qDFh4hxMU+cQFD>0QQQ=-Jen?u(R!CxW41T@%dZqC2lM%=fA2p-gf%xwP zx5H8%Q)j~r2%Y9EpN!eunE6p$twTE4#Urz1O9wB=2oHkF?1}Qiog?CtC%JXpi0wG& zia>Rd+tD9L@g-oH3aA7`T1=2>og4{Eg**qgV<2!TflNwHe~5=Z^C7splj?S_Ys&+Ubu zM{n+-luh@hzmB|J@XDNSPL;wrBdC2KcYLXYqX4)v-A)y2wXW@MCS%N=NCxlonI3_W z0M6Yrgb`t3^&qhUiET|jV!BhZh>m6I7DVm;#Y*6is9iNT7uoR?(N)6u7)>=3}9P=hwXyCVVsNhOiDi1Txx0=Bz2yJakuYhX`SOzkyS75wi5R__&Db zM@sc_uen!L5%T+;Q%qr-5`;@Oyw#BCKc1G~N{de#BNgA~p~#cODoCM!JLz@$vz5|a z{n2!PK{O)M%CaT?^m=ftWOCc>OJRk)!xwg#NB(JAjY;#;C<9Nk3?a~Lv}7RRwPc25 zaKRiB`8lJ>5K32V)ChJ1x2Jh_V@%hrt>sG{KzQa)KCSQUEDnpcl5|k}#t>yVx)AK~@|k6~fAgqX6hA5NpTc z&|)Q}5Kp;dXXM{V{n#2S^J`=whkkeptRU-zqnb^~WImGNVr)T17@&BG-GSbKSm?po zbaW$#1uN0GIc-Tr0zIxFF9H$}ZIVXV#tH$7*xnIjip5RjFk&G(I}uTVX6wa>$CTK8 zCWOHkQuxeoxR4ON3lOXi{%Pl9VNg~i;(?#VvKF`1URbW~U6O;`?Q#{1(0IpG;5(Jf zU#%j8gNfKi@3ncd@%{dFt64X&VbIgs&!4mDBP+&D<>;3>;E3LJ4N;Y2fC3j-S^Ln$ zAh>Bo7?DP{jYA|l5GEEEOl%&;d~x2ta}^5{C=fw0hWhJ`&6mC&PBU58flXaPi-DAj zh5Bw>I3u09q(}-bH_x7#Nh1Cu823(Twc9gW&sw<0mrlF|RYkZ8i>**CliXJHSO+Z1OK?dy&Ekva^f(TKEEmf zQBBTAxo2HMZcnCZ;lNSOa2e}lh~cykzls}ZNj)L;-0aqpm?DTK-4scdesyj}m67hX z5SfZqm;*OfH_CSn8hJh`J<3_ z8$%C;(QTzSGZkaqA8b!43Xhp;888imA+rF@y3(4WO(#bcr`JKF$^IAtae*ZIY_G?o zB+`3r&hSl(IJBRr2qm-%x8mbokqyZhYwcs{L(B7LP^3qb{Jnm2xac)eoTo z%V)fInKR&w@ajtt{3bJt#R3omy|U$U|HGPYrdnpb*x$vW;7X&29`#=ujN`5FOxdv)IK04bF3_HG3h8$&tig%FI2UmbryH zhSJsh6n+t}d0`v)L;Oo`AilXakkk<9>PlGQM0vMB%|8VD*I$RCh!{h|)vNks47QG7 zZ3|J$Vv4&5+tJM~k;7#Fa28<+e&jt-OOhJ5mCV>d8KaAt$6#NfB+jetda7gDQi*41 zx$Dr-4NfEOa&koRT|NZ+1-Kr}t~J54D2sDs;k+aNswNS1PhoC_HC)j$cL|Q)IZ9zg zN}aB3^&nEv#A=8~KSPVkIp$NuCkVgG8dy@pAxM;4Rqj@rtJsw|_1*O*%E&+w;4({3 z-4u6=NGL9G&^JVMWXKErCm)FzgytIt@Lv(8TuIqeE?|;+Nvxec zaIh9@FR5k&a(XGetSIUHKgDE5Jj2E0B_zS#rTjauOe~%}{{q%m$9Tp-lErs0PIxiNjS-{a1;>vrpW%o#>I} z92(q^3wUuyryy0TquFv%Q1a_YGd3cRwcaA`nNzqK_6^N!M0OQhILLApoMICCH2!dr z&6Qw;SARDD3bUAP^(4EJ)$48$JY4#YgEFg@3hqy+bS%;hae+|`CLw7wN=8=XWt7f7 zGW~uF_s@1%cz18_eer)f z)U7ss^Q`gkzQlih8Gai&I0WP+bRfuB%SOPyl-J_ z;hE~9d#mqZ7Pjr7kyFQM3g$LQ59STg!4VWe+KUc@#`mk105rJQ<(NyF9`&9V%WA?Q ztt1Z{KysWw_~yPupUm#i5rt0hQOTQ=zwmnuy@b?VeX<45s{=lC4=+*`*Hb#iV6TJX zv;aAlSsGstR#jW}4*g*Fs58uS_5Wrd+Ni=mYk2U$NApdQ?c@{@GRPB{a(z7&bMjAb zi?T(RMq>OZu|9!GWZMl8o}|b=nlJjRgx7zX=oCz!(M>$%qbuT9ha@v*48TLjqm@11@L53FJcnI--7hG;&A9 zAN+XOzud$Ne=%_N_#;@M0M?0&GB|&{kuBpN&T#1QrIJ(X<-cW0vr`WtZ%!3TTFkD@ z+Tn(k$WTBv7oh%>zztU02tYmZe~Iwt=$kyPe3?Ja7XSGClW~Rluypaw1c$l#Pfua` zYljExVd}Ftz|*mP{d@Ip?lbQsV|J1IzE!nSMx?2)F*%ske>RDv5}Zgvy%G^>oxWzO z$qP18a|)e|H%gjl38Z9G08Yg3{n{VW-#qAFs5+r|5X1R>-`kFxTSoszuVtoXj}iB7 zspY^mS_qa3bZoXkooj>vt4)R0_kzqmvu?im=QHFdpUo#BKK_N>%J(mVjxWYD=~fbv ziD9CFRcI5`-0F5)V3{Opoe{d#UB}5{sQ`Me0+R(j*kF*g_5suCUzB2QS_8#irQj@9Fc#6bqN?s z?~>B@*%RosrG_*xkwH443zB~KP+L*ug45A0v67x~w|%t`byEl5L4bO^)Wg`f&wxmv zO7t@*0RqZQHOX^g4|d*(+ogK6i4wGih_v2ay7)!z_=_U^y_P3kGi<{Qg9H-hpg#is zC314hhpwVq8gYMqneKw?x!mCN11Vx%H6H7VY!eR}a=dnPpN*_hIyoxi-A6gK1zN%2 z0o)0hMRztW*RXmUCI3J-g1bJd4#@uzQj$V}jFb8c1+DP3botGK@k9z1nE4st@IBV^ zeFpFSp7j}kKg;soTO7Fz1B7CW3N47S9RU;of=uM5w}Zw0x*RKN!ZWFoUNoPbZ82Q% zw^K9*hz}DzKR6?xMDisL#= zjrK+u-3X)qM#5-~{3oo;A9V*D*>-zsQ?!Hi|{Rd@29H*CR z)xXNa+fef_Tq-oZzj$S7{RO?2==}L-P2(@%xb*#j2;x-K0{ zvl)RX&zkFj?N+Nw`)^`itNU*+r~H@GXSUZ=@vo`_vt>S=gpJPvPE{_gP|!274(-KLOH1>lzg?lOQm%I&HK1m?Rywbg8s zELlq0K?zC6btMVZ*J^`2R&>E@<*`nC+Yyr?sQZ-h0VlVG4+>+P{20dmUFnC8kAoCg zhq&YxJZD+zq%k@#u7y9qLCREt<&gAt(7lfm<7~m+m|88~_wq{Z=GsU1ajp2qaqt9; z_axAlQB6S$>@X>b3{R`j(KvNh>u5`#f+#EU@;)I1LA8bUaga{FJtGA;awNsjS0kgJ zH5_VK$@HqBI5=W|pusK+w5(dy{$24+U#wcz3pq>+t#|Z8G6Rg zt#ho=|4CoBC$#_HJKQVi|9XR?js9;P57qx&AwP}+n9g-4P{LA$B0r2_fKuBplu}Kp z%1?8XG%kbLWiy3??sJqzFg%NLln!b9dF>Xs^qR3)%>x~vt;ilQ96foUDM!d&JS@3? z*4^W2n$*BqH6O&6E&KlX2&*L05wsyIclOt4QfA5aTq9%zzIyM$y&L~b;^lY0aYH> z)o#i&-*kB{dPUP%m?yp;Povx_J9L>5x(3S7d|K&~fM*%?YSM#+j9#!X3apY#)mm)O za3iW{PnCO2b6R>R4^+2k6s>I208?&QY9qsJNlQ>|*%$4Ua0>KWz&gE!ei>aB3e(U% z4a;)sYg}Gx`%5{!MzcIxuwsFZ=9!T~5t?IFmoHf=EyA!AtKy}Rc@b9V{JQ1AI{9zr zKY9F*{-Aec$NxC&ZT$b&@)Z34FH{70o^X_Auv<170NsV$#(>GpuQdP^7GoFhPIdDd z8K&Mx)@DScR#IB-RXgYd*pUtb6dn4VF-7{K#ZCEWH6HhmcDkSp(%RK*2nlj+TN^+j z7RopF_Aj<%n|U$QvAQE~y|tItlILi*sqG&dS%aO~M{WCZ_~B1wN&R&`HT<7!|Bv1P z>iqu?1_PV_9}PDAe=W~K@gHFrYWu@GmEUxwj(|+$beITHVzexSbSohG9Zqu^rjmNL zXx2c?gotNYxQs*e1vw5<#7&pMhetRJmbI|3zh8k{7h%%mqvSLFLtMd?n<8<5L_U7p z^!eynt_6?e+Sb{eK+~-~SP~a-_-Un|S$FEwm_(%~c{#n!A2sq2cdlYp`qCF}fQKQ-BKBA&CO?^bo-aS!#NIAh~ zb4}Gms=8AKcC*(lPNmZGPuxpq2C>!=WtF$zl_1GFXTJ(sw4MEGh_T@8CvkWpUq21? zLX%alexjc4>Sqn<=X3RwJ=l2qE%P+n{~J3@nI$?5V$He1P!TxK4`O#NY@LOJM5_#w=<&H$9LfZ%k%G>~sq1MJcx%N6 zkh=A+j24zZ1Jtbl{k=iow*T8Z*!cgh)05gcRF*AuLmaBj^0PO<7 z=z0GHAUS~gcmbX%^mQB{!+C}}s4pd0+>)Y?8=CdZRGDg`o$w z3zn>Z7FGObd8*}qW+~s*JSVz0nj=KR6G5H)Kj>TW9|wDfdmI0swLDDz7ovY2i>z*z zvrHUqiL`HG33maGcvv8$wD=|I-$rI( zG#YjFK$}xuk8SB7AOu4Fvrl3C=StEW&mROZewcW5pzQ#j>%z{}Gq z@_;vqr%`?Z^RWlKHhE1m?Rx$+%j1a$yqSg@$Dma;WI=Ha2yMPLOqHvv>=wg)p;im0 zWWcH~uRNP4H~=hrU)Auos@Uo@a<;qJY>0pqO=qJlfaHTSylpLg(wDKabN+Kr9oTt2(-?#9DDib_IVJNrCUMYH2A zZF@k`>=n*xHXTvORz8c`Oob$W(L)m}+}6}ZMq$p6X;Jett8FM_9*i(FQf2L3(EAgr zcEZCsZK}(v593suGk~HQPUDCsu$jRW6G_A?yQp+|4mig|)Zs&Uw+pssbRdg;zjJhW zrgze<8sfoR1SE|Lfg*LX&l(i7sMJ7FOVT)x{Wv@Z*QXa-Fdbz&os@$nCF$iAi?!wM zQX6>fHkAy>pN~S-<1Li};9+%N;8fS~bv?r)q#&GWs$6zRc}>nWT}G=JlC;H0da&o2HiA{^KK{0#$6oT zq#0y-@aZl4%-=m!_}CP&k*Zqi&7tdU7c^UDQrF`9|KctIHT!?Re`Mu<9}JF;dYk=! z9gp1q-y|q{cX1B<6cMt)FwD4`C6l{93;Dgk?q5&}wb!tcmvu&v1`t(ufNg!Tug))_ z^2~1zM!{Wyv5}fR%Yz+!A(hH(Oy>|e(LItGJ-L$V3vXu|ilHn>A`DX%j1X5tcIH(I@~ z?PiY4PSv0I>QelPZ#8N^vse?Q zpIO6H`7NyT1Hgv~yu~5Tu`rl|K_IN8+Ti@<_07qP*JtNj3+M;6V3c2@c2H8!s&s?; zcs#vkkPtA80v4g7dyAuPHl}~Kefpm)L?{6`8sZ4&^LnILtfYCuXF>iid$@=*NDcq* z9UVCIKO6s#wLE3^UwT~KbsB%E5WD53UxmQEZo@Cxg(tE4a&2=@Z1bhYrqbeTAz{4H z`WGRYsr<(SpRQ2;+uyhSzxH|uoBZEvd8GU&V|=qIUQp*N!+dMOtjia$D=2uW%J!5( zd<~Q3{j}PmK|^P|kj7TDD^Z`rNq7wYU^hDS;4UP4LQuQZ^EZ}2C2cA<=_y;J`Bfkmdm%c+Y2C#x!NJm z%}oOH@y!iCYmguGz)<2s@NcHVSe*Z_{QN%{6wm*?qYeLG%Twh4k3IkETS4*sFFCQ} z{4c)Mod3;YP0s&jjYppU7dX^w``p)fsFx(Mszbd#9#4O$ud%w3$TYUOVcS)Q?99)* zDEAd#G^7HrVAvu$BZ_fI1#^*dn5N-K@l%Rm@Foi9$23#jqb+k9*y2>q@7JUM_;-I6 z-2deauTcNfKiae7{|t^c@&DHIl<9x;luzr_|ETOw3mhNa`XBv7yL$bPOU!v<{f`=( zg+2b{vAo>ZPZep@XO*(5&`}P?=%{+Vu(O}7nRvX{pX|r%sa*Z6o&L!k{+2$yF3A5E zH~wj$|KA%F^#A+)jsM45o=W>4M!YLB{BbV2Hobh~3cg3^^)~Y2l24=cKTD$S4NWZh z6!9PXy@4J7p?7#V*sT9`JZ179Per;;(T}Dh)ug^f(wsiXRFqzvponEQT{;c>wp7BKu4Z?695>gM&E z7jIv^T;SH2jNaFIVNB>}Rd>aF6rTQ?xa5+7w10=g@aiMZ{ju5FPiL1ee>-{gN^i}3 zbM9$HF5kSpetFY3O7xEgo&I5`*Xecp1J9l4nhjH>zGNWHkrEv;&T<8h5JIzo^mwT(aTmrM~W1I$TWKcBwDUB!0 zR)NWJJV_|1&&+A*WCf4ckT2RpXjTuposLpybh0r_QP7bE#V|5t*w+e5)f67a97#1v z!T5p*H=+GhfW%qWOW%s*_^P7{m*S{RIi0an1(uCzUW4C{R+rxbn`Co>a zQ{(k7mDG!C0BhI(VbTA0WB;?Br%eC%o0#sEXaG6OsOB5mHHcfgr*L|teow0G3g(d( zCWfxB^#mF|th>>%dG!JH9)ocA3Oi|V86G&+5gw_$o*d}uE%PCoU2FafaGVF z7D#@q(F0lKnrMQoDvRiX4i3M!v_b66qxC`RTypjD;^gw=`pu=GG5CwFQaHP~KKb$0 z%d49oPfmY*dH%vE84Yu9qh2bim%d8<(ywQ)US0imc76JbF~`(ouvFEuPgO0Zj_FDC zF8dAjF8gl1OR@U!1?Z{_V}>uU9u`7w`5952%AuY)w900d9p!blG4OS|G1g**posjsVv(l$d4vLbGk5A^%7B zIZ7iKo<%uIhtNmaD)oQ+w*BAUUTHY4aM-#`iA^wHe!)rgUKf7l-ohzRx;-ggbuZ4?8&S&iWqbSzI(e z$#dwB$$|3)qVeBw967iczHbvoW~U*iFJ(4akC?BL!vVVC`WI=( zmT~~8UjP06pkV*i?+-TiziW9GmjBLp;<%@f{$z@=RmgrE*n*Ouo)_=Ya-W@K?+cLn z^ie6weEQc05}$_Pc9P-=Oy^fT*WdATFw*WoL<+#dg^Ns3!>U`?EZcCJ$FFd7w_>n7 z-1U`80$)ZV_P|@+EKGp;y<#F9C=}$}ropmFi&BUa zuN{a!H*~wZfUe{JN0)M;tUY!G?7X|_ElMMlqs&hO54232)cr|AbR;T|ZCIU(%@eXU zjgzt&w5Mg_oRP_blQC&F50k1Xm^@AspJKk|YwnQPNGx;x09aT^^d3g%a5Z}o@ zD{3NV+BBZ#G|6I~&XX8NdFE+`$eH#*PxAK>-O_7ualhKM8Eu|h65*qa@m+C;_jJ_IgRh@Bz&FLC10?y#$c88&l(Mj}JnaVg8= zl$w`oC%Fv&%V^+-AAa~5d-jpEFi;#6V@w{{0ZiGg@eEHb+ff+b!q5ZTx`sp}8D>DK zh*JGFP}PdL{DfC_Mci=z7gG5X-2e8Dj{5fg-|r7L@juq`EWH1VJC&!{@i~=M?)v(H z^f5cWeXw078+nb`;6Rq!68)QMmc#yFrcZ~7vBx#(-ejJ)p(E{Et z*Vh+UQbk*>p%uf<5>{oIKSpGn#(AD(B|1%piJ%L+@mDbneuN>6e3VKY$V7zUZD$%` z(hBP2!!8WN_+y*d`nPe?IGltFt9pTHDTVP)oHF@Ybk;i!r&*5DvkR{Uc32QK@v+5s z_naz=WWgel_~H{QFMk@ly;bPpK@U3` zTRXe(YDzi?q69B{F=-XWIGFDYDPQ`-g`NUSC1U8fdw+^w>^Dz!$#!->&As_3cK1xh9PMf{UxvT+>-Q`z|co` zbfq-QI%q1aJL;vj>22$-u10Hedp1APa7~0knuX}5?a>SRl8;xVU$0LuH1h!Q{uo@J zUTnE^_^O2JyaQSLBFqWFXhT&{(w1X>1~FDGb)rUQ~KO8vmm#r z;y0{m7tc}5ij?V3i&?=d;7hO{%0Kz)&E?g ze40i)*%Cc+QqpBQAD+X()cZ8n<=7{DO?|-^%mrOh$IqEoReg7_!;Y~I+f@tEvbvXX zdCZ2{ax1sQFUkDS13Mv#Ojs>_nbLq3J3=XQ9y2yWHDv-pGQ2_!^$+ix>>u9$@uUF+ z;f&=bvMI_43t?uJbz^3B*cvm_x}DVU#ALOkxWH(_8c>eIb3TNN3?SL`MSVj7Ct=>9 zd1fL02N>cs%gc@2HGnJ8jsH75HT+*VE@xfJ`r%@UANf~Zj! zTdE;_4tCh?!wR*Sona}=sw0&i7m9A3ZZ{lbGF&#u#rj3(8+YZF;{dVEZw}b<9mnw< zff&Z|-82E-tnUF&266E8c0E~2WI(*vlsjmU z^~LbKs*Y$xI5!l>M_)5LoCOq%u}BVjj|@4{LTCv%739TF?{qELD?$5iG0ogm(iqrs zG>xk%Qx{WmiR5m?d4E*eP~vXH)y#!U-)73M@+;?}UfC(z2vjE#)90;m9+yS=q|a2N*E zvSnK2&bDB}mBwMnRV^uuf|D>A!}I9`9O#BN0tribYUoX+tv?%Q!%WB2{8--n}9JUM(E?ojrB- zzx_cW{=;GaU?cyp<8jIVD9w%F?ZVncy3#Z@c9Gn~42Ol%{FgWkj7Z0t9Zy+d(>}(P ze2kmIIK7iRqfl8Rmes8AS1K*8yq8+e`_^XYnYb<2s$r*OZdpq8Wt&Lxla2x{Bi*-5 zOQXd`*P{rsPN?1#9KKpkyDDyUQaG~_vV=2;L*~*>wiup8y)Cy)f!RNzZ?bPvn z_$p6vG*bBmjE#jryhHOUh$)`I95n^`u#V{Do9C&YMfU$C!#~x=fA1gI@!xx!{I6?z z#Qjf-(F_5?PP;?MkGy2g@eunkM*wF$XxTJHLHXs6#iKQY*9Lo;!|Hd3u+GUe%U>Xr zoW{vq)0(MWP1w&eEC{SO36=Pb4enPoXSe&}F1HpV)tEGn)_Z!Bq$opCuB`vt`jJum zVB=}?N#kN<%bW(r+`%21gV>mc>VenxgfDI=fu~_d$V~42uFXh|Xx&J$O>6O?(l)y< zZmgCZngy1!T%rI+0Nw7rG%=)AyKeMe z4%2udGXzkvuCiw}J=*3dQQ}x0adpV49vj)5(Y|eC->|N3j9kE2u1Z03w0cJ$$s$kV zh4>;OYp;U2ZG^)w`Dq~kk#F4_O^>!>`=8$7z>fb;o{jvsj)&&hI%R%Zx+?|q)Bw;= zV=dTcY2qJ^I6lVdT^PfllO>2da5qx9T8ih|aK1E-7O8mmeb$-vjUc`vj|Oe>_ZUaO z+XdbduuF8OO~+ut?tcb0*?9dMp|uuc0JZjigI>Y@ueZtnwU&qF*bBq>BlvZCi@1)A zXZ(tp9yCBvr*!E%L$2K^P`Y`Vuzc;D>Xo#1JEDEDQZ+!9-=Zb>0?mdICP^A6DJH^; z()&?!J3D&uLcP)h$*E2;_gIg!92|{0gdwp=;--E(Lz5XwPvc2KBmVuh-|7G0Ika)L zBib=TIdBYaQ4WnJokvZ^@W;r%lY^1vtiAbS!=a*!wynF~W?eGk^0lf*kXy;8Q&)i0 zjfA=U)0qErcY_nF<$Q`knjt zmR_4UJXdr!(>WzTIwwgY_&dGjNi2`&nHDXySfwnqMiI^gMsS3J_AO5;Dei)RkGh&cdC42IJ%oP!Tj7~&x&8%2`P3F&P8h8T2OJ|}IE$;rSi^5HZ?Ad4r6 z9^e>PXVW;uC=8g(QHUovM*&Nhjx(@xJEv3p;{1w~#nFf+-EDQY&W0dmI{*X1b2w+5 z8t6OBbHU#tFwF>_8Gsadj%_u`C?g?_Y@$lLB1d``HU&TNj2$bYwF0;zy%maBG$(pj zPj}2cTvWH~m9}S~9Wj#}n_3qHW~lcyds;d7+)2(54J>akj)}WWp#ig!iUd!s)=d~q zz02egk*z^it=UQhd?jimPWU009SM0;GUscCm7>yF4RhpjuB9u`I;wFT{F;N5tO^B2)8o2_$^^~Cq%X_OO|KsZQsPcoyP- z6Ne&2%SXz~al82dC1E_D$g5aO74)L;`N0g>Qw|uSNgQRU1TOu0g%$>zmZDM81gNU8%l_y1CRE|zH!c*f$zG?5W%8z;a}MST2m*}JRYG4rDWwL zah8u#lzj+60<-L6oCX>7A4e!aK^5!(B`69||E1qQ-01(;@=)pa zQS99<_sj}0c(p?U2W6aOIYgBbDd47;m9?fBN*z^p;t9^xiJ#T91K>|cuLD(kGR<;2 z66AFJF~vEuvC^9}KuMd>4)By~jljle$t8JiQ8?Z204)fTI5<(pB(HFmvjAe|dp7jS zT~`100{giPsiR8qq(ahPv(StNP?@70G-e#+0T-haxF{JEOVKmw6MgysxEkXsqY%DdvjfXLWx5ZH`G;4#e7(=Zx@Wd6K zIgBB^b&jH{=_FF;XLEF&MHU@t*o1V;TWU7+s=k|$-S||s+jLG~34NOw)l860?e>?l zX?YsjcfwzE9-6KMXJeI2#jy&EX8BmNC{~K6s3Z_-oN2-mmQ03^Fk8qdEsp6!F*6{} z(WE5N4Q->S0XAZPggDEodT~dj-P2t8T4wYK8m}NnlTKu$($kf*#qSTr;0rp74LeR(ArfvIB}+9 zTDntMjY;9Rh`S6rQc45`vC00lwyAHhH8C)?l9&_b5_4^2fw0jvwyVM{*KAFEf?eX7 z(L#f%H71rDV5;d9k;(MU3P+=*HY*+Ym%UMm9yVaZ1fc>O7NaHsRk2`R*qBA>8fLFN zUf9Wci{BPmdjjWX>#o?=s@QD_IBXv5)AsV3o(4clWpOcdUy3fJKF^Y6~7IV`9jk6k; z<*fE8tKHE67j9P_a&9@lu_4o#z8th?o6$F@O|$o02oNtbABJ=}6kutzPDd<*GX%0} zl7wi2q8x@lr|~q&Kpq2ncR6N}eT1K`xdjdJJqmb*_NfPpg zCQ2lo8p)|}09lNXRYBM2i>U+s9vJk%pqO@Gc@(MB{LdF}>sFd5=ArO%p|NejNEQH%Z)>bZz)FOe@xGkv4!=M9$OkXcr_y zZXTm{BN3O^P-Dbt?$|OKY*9LR<6^+IO?{zKqw0OV+-M4sSvo5Ukz#-~xK(1L%#f(< zWLY|EIp&fA)HU5{o-LqHG4msq&(k6#G2rbCNHGpfp;>Hcuq;Uo8qma`jwl9?rHVlr zB^W}FmA{CADjXWCsDleRw2Y<2r&$RK+jIF3Nked&#}k-iABN$awsLxMadZCi`sT;8 z^A|T)FE8JnoxUt?*QYQ!2?EE4>rb;ho|Jy3ysz|YFpuB_`=#GS(=XCEscO6AyJ)=R zvufR4phBWE93Np2l=S%d5&-NNyNw_Oqyr@#Z-|5mq6`Z;-q+XkliGDa=^hUzvhcuOiA)3cc zfo*9)na6RKpEK8G0|%35ah~DX9JCk)x?0}UmtvWuso10;X7bktJ+|G20J^*12 zjVDQnF5aDbPE>)HQ)_T9nfXQfD24aSMGZJYsTVLGn*rcE8OkqEI>9uNW_Cqkl>jn} zdUbUR%vxYj*@!~3wER-b*qk?(VE;6PcycZ5-PSpQjS($uBQ?0Ov8qAL5qG~4h7TJX z&p+4G!2VMjL3D4(sUT77y`eQ|js5@L-jN;ueSgs3f(y5ftn$eNn=`I zMyeV!Zjy`o&|yZETdI=SLS7TB%{+renVfd5?5?_P3+Sx4)KT!C=9XCLuDQeB7`h4$ zrQr0a9rvv+ag77Rz1*$o)2FRA4{vS_@fHAh0!KXl1MfKu6C9y4^1hRzB+hUir*rV> z({V|m9LoIN#+2}^8`J0{dz+#381(21bs=%gj#2b&*+qk1Mi<#cnpYwsioXG9gOgXU zwg5;`MiZsWOwv>nCXkn3b)8Pb{M3YOVHB_?+raDI;;5UAJ@LEk%RiAnj={GlhCaoQ z(-iqRnQ@(+b~@kw<>8^2_XP$4`8-QRa<-pvh$P+7WW{mL^1(Q&aK}EJ(c&JUd6oTf z{4oOUOK@=b{qe!!_n3?UZDEN4l?qeSmg zuk(34B@-W!exCnyHQNU#r?0aAOFPMil7+-0EAVC)Y>yMFg0u--!Eh%Qzi%CRm&`Sht8|C)wn?+6VrIg|C|SXV+m`4n>kWJ`XQL<}xpBogyu zb9T#gohF|wohYMCJDIW3s%zA@jC5@Db2hy-Kk^p}K%s;K`;GKk_ADm<@qhp*UC0lp zTK?h0y1c!l@Je+Klg>AO#Xa42fosdt0bX0#E*%<*X2*sga`E=;1z&+wZEemQpN0-8Wkv*4 z5Z+$Byu5idkVgY}eRB0{JqTK?62{Hd%j-wNx%j!FHx&o-5^z6XzIl65HNs1PTm>{2 zShD&#nP9!I1KCwGI;Wg^hI)H3vvB@ z9pZY~MG-gZ)+27S#nL7CeL0aANR|@{ie}VM&?FMgC&5t8^H03L;+L^lbaFC^J1E_r?69d0hcG0cu3l z2J)4nAA@>S9VgM~#0s2r+Ag6|vz1!vGzZto&`M$v67-w(x1m15Xq=jDiAgA=JW!et zZkXBOQQ6#wFDla%6DKGrx*}Nt<9m-w%dE9hb`GmTI*o6U8*6FT+Wl?|u;4N5uJAgY zqVtn0aCLg}>Lm~{rvgCj^P^$RI!Q_v?_kL8y#)+ACiPL=+IcjNEj9Elh`4{qYc*O_ zH^owbq*bkYRdOBVzB}4p{?h2nR6Z}J{~gC!p1|B6uTcNn>mMB0_y2>VP5#&QJZrxH zzkc)L%`pg2h;jsi*uO(5@Z(7mXNbL}p;RLu0sP7QlHE;{i#arovgi{_I!X zc{)W4-5>9OY@Ydf2-+XPFzetb&hc>GnZWy-X@=69kEB~Ddwww3AAJA4yyo;!n#L)} zP)=`|c{Q&E{_{U;L5h43+4F<`pdmzl*Ln}SWURZ>ETvsyQ`{C)Y{3d+|Bk>iOO=3J z9-MQ3Y#UdgI?`LZXh1%+r&-z-9~||Zb;!#vljR%FV*EdegC!yW*4+Q~_Iri+uLpa* z4gX)q!|wmKuE#Vy8sn^(a^dp(zs^>p3&11}^!R^<(oWveT~V2wN>lc`%4>_FZ&fiw zd4*u_if7&_Q7}3@D`|7hZ*R&R!OUh-98-WH%rcRDr|`1*wMyoXQ7{crDqtBen#0lk z8$Ny7(ta)mLmaHd-<7p>-{L4!*Fo}!v4I;!%!6r3FElu(;WW!p`V&sG{5PDBe__INIYBGAI6iDQJG1IU6rIKF9ZxKyBgxhEmm5m!Y8 z7%i$itlM}CdyS%ox5+4l0di8qlzl6qhT_*Hsi6qyG1O3m_SvYRh>D^H2bv30LjlH; z)F9W9&Wf#-Z+u#M*&9$Ex8@B{pK-w(c<8I$L~x0vt^=r>S--G_R_uP3sba~lVOr1y z0X-(cvc17spqx&)VYM;Aoz>4^r9D9v=4v9HpBJA_7no+twc$;PeM!RKDmhrS)A$T? z5@MJ!VO0D1__JRW2S_H1{q$)||NVIAa7YjJbnS}29}hK;lQ@h=^Q$C9FgT5)EKeck zZUChpSJ7^WQWfw|`?(ysZ}Pvc<)QaK7c~Be zRQQQJhlawhfx3_0a%*t~WhA4}4DaOjZ?|$!O5Z0lWu&=XCOi%ckDyYq71EN%E?6kc zV6Z$OJP;j!$7;9B_RTVZlBEtr_oQ|=C1+H2fhNrVw2)l9)7z>aT4!l5wq=kQdw@*G z3eAA!L0QA-fn9bA7WL|*c57~C+Iuri*@a#Pf|$x7*)*ZULfQ*>U+5K~1l9pNvIO`h z+toe+mYk1;2z55Exmt4ZfD~X|)ZnOFe-;PEkmHjy&SO6|kM`7*7k$vadcRy>UwG7B zxA^|b_2K%ImSuvTmK94e`*x6=mt>d z|9^Niu=)RBf0O@dEf3@WbXo!PrNVIp!gz%JW?Y|}2}ytZB*hb$&bj_noKtOPUl8B< zhYqh!lU~{|Mbs@%HAi`-*`mGyY4!Md*(}WWjpAV@-_?qh61xN<-TbT3H4gFC%VOun4yd(ZZFTk+^1+R#H_r3q zXOtg%u35873uz*u))U{%Jkhg+`Op{K^vVEa{umK~M}eTomO>~UZQ6(2Pp)GBuDTbM zLu$;qCZ0H2lVd=|8QuYB<=WmX4n3)d>mnrqmD&ct@C6FtTwY^o(@2(a$59AW532xA zM9yi7uE#0L#&H-FVcR7d0?zRS#nZeLW%GMOpow{#XTvl;yCF6_N4Wo7&Hlfb{HL2y zHJ1Ww)S&Tl`ke(Ud(UOSRET9-IC@%y}XUWPd2o<0^ z1!yMvRL(KNZ|_7%2jR877Sjb-QC6%7E6U}CMNc#9IBGdXR*8x#MZJvHKPl0Dld;4e4Q8dZy;dM~D)^H@pGAw5^Okl}x!S9pT$TRmqZvaqWi`csrWwz})kXzmwB zGER%@g^i|kjrLk)MVM2wXQa53`!!YSSvv9@(^?H(^)Y+rx8*YWNb99 z0F<`OV_Il$wn5=YR@rHJ0myzc`c&*+gY482v!P+N*x%=Mbxp~$NH=_Mc^wC`p7!dv z7?G?FAQ@$O44^-bHF9*=u^g6*#+3`x3jQyCveptIqpR>W@{r5v!`eyZ=gQuRQr9wE zJpcrqih-){3A;xy7>qC~(+e|c5t00k6w=P^~xlLbgqY!iE z_FQoTU!Po_oxJ$*=9f2DMhG@D&`@;Njsq9D^g(nvc=2ysMsq_fq_H*c5nl zetUEI;whRJqnXBW-cDeaeT>tf%&YxNin7NIsW8MJG&d8Jato_Z*Q@&eNnD;mc4+uM%nw_QH-hv5!M>-Nm$6(gqy2FIUFemh_ z3Cdvrb4Yj#%Ob9swpc0vk!9S$#vII;_A0ndQZ&Qyl-bF~@!d25-mLEdk0D_7FH4}W zI!OU}V##j@w-+$WxP_E>NtlxPnsrAg9yAP;;S`7T9P9w5W7CRtNPUTd+&4VX0)K$p z!~FpHS~5S?eiLBEPUL`SH%iYDi{WU%G1_Ygtbn87xJHCBHH2gdQD?66=>#0~+(Y9m zGy8wv%-Xz_g`U^Sye+Gv(-R`WR3vW__+g5+9-MhB#gR`D`?UId^bZq4f`tc+QQI5>EJ|oLt41KaFP1K)?U1@kN zd))fso`uhUEWXA{^?wHk4*S22|HoRMX8J!i=_}Iz84+4s`afR4rT=4}s`P)HKCAVA zdZ8-)-<$KF-#k|T$J$y%|HoT>adLg~ zXy+eZf}_ztyp{+4V8adCZK^ETe$Z#|6KJ=o{rljk*FVxeih(8tK1?ynKbJD@GdxT4 z{}t;0_ItMf-~Qg-#{O$9&ljfulY7JR`acH3t^afEENj*O>3hMW^nV(l&!zw4Tk&f2 ze;in?{?BT(PG#r7(SWm%{;v$jr_=wrdRwFaEA7~$^nVPWjNVKuEUsMr*Ye|h~Y?ZKje zn<(q}`AL9UR#|6(d7QG2&&GnvI(;mbXrr;R?vd@3DeD@{@RF^SY3o+rqFY_}xjFP= zeJIh{t)8v?8C7;GeHK0ci9o-LC;;p9e}lt<{_m)_iT|~hr;+|oMR#6}3a}6@df`)^ zg5ZIo22q3WP$H_Y6?#Nfs9Ke1ms8rrFJ1x16>Xj~?TknDZXg-m;4DQjm;kLnQon=t zTj1=s_NUxPK79i1F>@bb6Z+}XUo>4B_zP8|d4D23+SmFl&;Oe%0BiXFVgK;Z*8d$G zZtVZo@_bqPKVxH9S_Nor4h?sQbt(c^p#yBD{!2zrq5RXf&^rAeN1!P*{$~|fN8>fB zyApH@(Co$+0PDhgX~m!%GiQ;q{#R=TYx^l$T|zymVC&~k?d`$--oQA4R*MhS=TK+e zM%uS_6c^0O1c)yibC_*HTkW<7!$f(>D^Dc)}*jl#Wl+tXuQ=#WDY-`$e}0 zcjvy=u9YZSpOlMjbgo~~v*`JsmS4#Fr#}97zrSan|9kyS{KvICU)K4bQrBaS{uF@o z)XzYFt^+@9{qbjh1*YcMAKaeNL+kN#nIFOHdDdXie>Jnw6)6WO*s24(S)k^SU4*vG zvD(pO)p5Dzyi1|!A_04GxOen}Aq{B5Tq6U>30vNHfwW$>9#(U1ssz^Hq(bX+FiW0K z*oZE6p3u-<7=F`J#ADhhJ3G`(=u!=pofsBqY$MeDiJp4-Z<^yU>)!Chad`3cFSYkS zhl4`?uihsA%X%If|9gff$1DaM4iRDG&nIM9{4qLa!60cStF23vPtyoMkj29sL~(#l zL}o!M)X{v7TaKLj8tsr;S%(0SX;kje+ymZEZ{Bz+Kgtfxk>&k(a_NzO|JUOgQp%*r zk`~%Dg+3ahG)2LSX^NxK70ZH;qtV$YiskE<_sE~pFw$E9w0VF|6!}Qp%uitMk6+#= zDPn21^&5NY%=7R7I!1z2^27-drQ`G%oJHDe)=k}6NRJ@hVV_M%q#YVG&Dg-r>RPn9 zj|h*(`7!7lEZUmKF-(I;%_9NuwDZVXAXP+Yy5`fUXVJVy=|uV#eMNIwF?)}gI5}rz zv3tN{tK~^%P|pOwJu^r5xr|fXV4gG-`*#Z(;722m3C?dK%YgVI97PVM-^ayU|%$01LHOYdr76SLOvwLS^3@;zW zmUf=+_dp?Hv5a;+N%FZiXf3;_l(u1#bnd3ND2-5#vJQ^BveGe&wyFlW(3~?j4-c|^ zhvvIro32`#3!pIIHby*~HxJEE>p9s`q2WmABMiPt_!%EHhvuRHStJPlm9SfLK*$k= zw6Wkmwz}15>}sE9HL7iIeXDWt4YuuGb*o!*--EL7;#CXo@ypGz*p^&sjTf5LWO0!# zxWt+)u!<$MvemR6QG>O#0!c&L3s)y-XiK_I&RF;Pukrbx8tN{7_WzFt`M(bPw*7y< ze>B*f|JU&}JOAsvAs-`UBw zMyxdOMqzvlL%MBNFaWa!xdSR&eGvh_BU{xB`BjA+j;vDT%^x6-uV{*FSyCl|IHsG2 z)e;3%d2%3wr$!A-GXkBw%=jK!F_5B&$0DcK42mi(yGg&iz$`75mX()Jin={wby1*a zX`w~LPOte~jA8aGnoCfsZn0If(Lzb>#Os(s1*c*PwL(uhgPiV!xX#LIbN6jvyk^0nEu9a#adcchyb!m4-p{CVHA)+8F#p^$+w5t){P>oLts0~=loZ~(Q=!vM*VE|O_ zvsPPeVXCmrKTsrzC zeE?qDGYb{c5OaK<1MeT+KRmCP=1)MnIz4&yvi-k5U0D!;rXw>UDq9eI-{w`?bQEc- zJHVwt(>SD6#GnLxdFSmsZ8G+(R)MALqOv-NXlZ3!07!8M6t7JA!pDzy6zEeYI?su; zv@fc^^)(!A%4633DdEN3X&g8kc+`AVw9R{O)2FkPdmw6tqN=Kk9(ZoN5-`?KwaN=- zbWMQrHMNQrU}q^d8Gu2%OH#W-UHE8$qw)TqCm}n3EiM7n$^VBvJO4}nXn!OBujN^2 z|0f67jHSh!B9^I^oPi;Z)RDZi^)`bebnKD_6b-S%uo4L9YquysUo}2#7n`sc3hCZi zMpj*lqmjoAH0+z0JPE}YapeL^w>wp3rz7rnSS*f~yY?4kJK1>se}rj-qtP-NfSUE+ z@9pi|>;GW?XtVy;@hq_Ze`6E?;B7q3x#~KN!;q@5;iziiOXA_>ui>ad{eKz9dDR+s zLeoWbdPQt&fd2p~8ln52a1;Qqo&Mt=!GCT4k&WTt;P9BG&;9M>^8D=l=VNfGdIbWM zGcEPb!voM&&pZwg3;5I81ql@mNZXt>VwT4{PvdA5&OwR@`h+P3Addl@#W*OAVg@k1 zeofgPC)0E%WfjiU*Q^3K+O;b<6xah@mHakm@9e%86gc?2i8Xi{nIJ&b~_XCOi&NZHy>lA)gV-t?xSdg!~<+c(nE1|F`uFyn`wAhdX=mGTZ7TY5Y6# z^Q{gJ5bUzzY5eJkP-C7)B!$#-qR9rhnVo+WIS`wh7O{6y}$jn3;(wD?AbH$cjLo9 zcZ4)D!ufc5OXZL}ogz+CFi9w3B``%@z2;u0(=i~mz|NpI7_@tP?ZIJdi?l_sBP(|6 zJMLNx0(N7}e3U~F#Zh|#e~(jM{3m=*3g_vZu(Kh)2VQ^!Di98d;D_!LCe3+m58x=k zKFs6v|7Y)Qn;W;0Md5t*ufU_!Q;APmGT%f=uCrU$V^3y$cV^;idy>1GO2rTfNjRnm zE=S{{3;X*mz5PmA!A0Hpt z7RhjFpZm{9xmV|>EMP-q?oL4~Hf2TjL@rqdVASp!SwvnW!c zJf3w!c|1El?oaJA%bFYpM9Y#)>q{~-SHx-T`}dd@Xu)zsQ(8#uy|5ehUTEL&sRg%b zU);hvZqruW`Y~)A$7qu$pbN51f&Q5w%n@g6f^e3hm=O+4JfRN+>BaIpo(_M{=?E>0 zb=ZEiEY`TbSfR04?qp}N7A%i+aF{HZfpU_|+XfrRV++WKiLn-tgF49L{U9H5n%&u9 z#HP2%olOrp&1&p!XT_cEIV(2(rnh?2&~8lS#vS)t%Z~bqyH7u{sVBX(lY;PK=#Ts+ z^YdQ-X{RFrIf8)XM3*e$nzy{7dHf3JL~s=hmliplZ-nY6`0sqPgxQ?wVWLpa=1iUA z22an)nmrP9&+>a|Ml)^H;(WPTlT`99H|$8f;U40(X>9!!w)#Gr>YCG!5ja6Ne4Stq zzE*v$FTPD}&BV8~M7|-o0CGwa_Jr0fC+Pa))#d5Ot4p|40tX7;rjc}Lyb<5tTwO}^ z{cc)~!DeI5M9Ie&HY`uuNKAKoD8EJ5$ZsRw<9q>sZ#oO8rB z1*b7VY$5)JIFbH*Scn64?s6eqr+pzL+$}31KlEM-!`74|?OO|BX5ak-%?VAH=t*67 z$UB=@*fmP65k#ZdBP}>8D=cud$k|#hUQX7S!Y$KzmT|dOPB*#dI2O4l5wopTFJ=in z-Nsr~?9v;0(?0CdoplpLqWvD6+xVsY&>Lr`fwODkJZ{iO#PXa(g&+#a9uO3BYp@Q$ zJ3LI`D)A13J$Scq2>GEW-r>$(J0{-24zEmD^w5f|I15ou1R;pel9viIu)LR3>(R-? z5$&z(5!&b=>`ez@gAT$v9eB<4IOlNPdG`-^Hb$l-%YX?$*6+CazJ2pU+vbP8H-Bu} zM{*<+S$9WIh+~8|1xsl9Ah2ec;Qj?eG+pL|bBVLp$&n@6TX7z@S~2oNZ=C%a&SS%n z@rG_M7mqugbzCLFZ)^xZZ|HV*bV!^ho%CPPeh;Q>DVrKf>yVj z{Lp)0>w+gRJae9*jdxpEzavBP?F=cf37(+0;0YRnColw$JM`VoII9m3VFmbm9S^E! zF-0Y?HvIbvp`amz0z(Ly_-h)M{^R=(-(6i^o&WUR)$P@*cdviCeEr?k#p~NMG@wj2(^N z$sXg^x3OfuH%s;#EZMKIWUo6*2As#;4BW}sZs7VhHthFi!+wJe`!zP~&idgTbi_H> zhqHyz`n?&g-(a+UjnVeS+3O};Cf=-hvjS=yS`g)X=cFiTy5vZgErXjJ^;fjX(8t?X zC?=0IB6h}L;n;p}j_o%%wqN7e{ccg+iPz~8OtjxaFcz-v_vY%}&LJ_my4%Xt-+a7+ z{Ypvk#PSFE_^U*=n`>OO2Mdb)430JPfn6d0#6&Qx(~$rjyLRK*4xQKg(0PqR=hYA0 z&Kk=6>trhkev=`nKsUtsvJB2uNOvS0$4)q&?XY;g4~y40EMEPvcnt;+vq)Z`LIOI= z3!DfoWCMQU204CkCcLYAO0*#;IQJTQn&FG%Rx-EE%jBze70lDo4YPWyrw zC+Y6)?h|DNRHG*yA>3tHEKtG z=nYC;Lv@V69k;LZFPwIB+=NrR8;#44Y}>qlv`)ka?6{rC0JcD*;Swz zc0@7UhoVKSI=#iJ(-5mpO{_ZooCaag5$9kZ&K9Za^p>hlLx?yvsoK+B7^f0aZ_>b7Nf04EhTg1AaB2Z5R0Mp2a+0z~u?{eLLFWlMQKcGnsVBJ-UPs2} zSs9xEyLBbRhu$kulci!Lb0zv2Afek)fVoxyCIGbI+*4@JM&7uAb7@+4_f!aGBhPQ(92hwF z^m>fLZZtFw_wkB$1wef0jkDLl**9^Xwm4vP)J8m)@AV1hDW7$d_;$Ng8Hd(O6#<+L z-=5mQY~;BOe7#nD`=u}l{YWlFX?Kk~hVP8+;X49&+j{iW6lNpOX{?89u17yjVcab% zL$u$6bGxP>KJ>-eoi%VaH3hey=YH&V(+J0|RU;GtT5vw_ey$DYX&q;G){3(tWUUxM zKxRxA5T;qci}+}hCtqD=Bbo!e09TvMfUnrynrx2miNMx4N#Rix5xmpR*Huz}^nyIWM`n5I^QZ2Fqp zTVHb<`kEWIB4pn@v1`G!+o21l`wpE=i8@g8Z9}r5M7gFCWe+cEAUWygwhks%xAm+& zi(7v9tfSZ@&!88g-PFUtmfZvpn5t6k?*?GI2}ux|j+3Oi8#ja03x@74E^Z{W9bEuH zAoJSf)7kCggtjf{mXjpfn-))Fu#SOSK``4lSU0^g2>d;Rbu{1uZ?bQ&j*xjZ$kbld z_%~2tOfn9INd(y~SCPz9OWD)NO7k}LuwNE?dAJ)Uf@`XXEobNjDeFa6#il^^OL{L? zrC~_8rVXx% z?9b6G2--Bx-U??!pjYaqJM^vIpO@gW76fg|S#RB}p_+{i1ij|H2Tq>wma7O$EHr7n zCMuatrSPx?ib!4zxq8HfrFv21Qgpj?4(vG|Gs{ibtnWqGY}9aj1?EyTO$!+^t+WYk z046kjAXf9w=CtbXv#P`EoA6pa7IoV6r`-bW{HZn2Zf3c&n)SW1nl(j>*NULp5XI1& z6{OLUK!Rl&lbpmx{+-0Wo2KpWbHrMej=tD8JW{TSz12C>+}>`{4!%8ka%Q=zn)SV@ znl`uBX+==qQ(djIgh0#-IAb_nX9-=<2ukRwyxCW>{-;E}ROW zo!0l(-Ql{NsT^{!d1Ogqnl2Gd5hwX0jf_XrEEu$J-n8%LHBx=2_08K&04$-8HoRc# z>K;)(AtS_u!i101_H|@T6Dwn~W&QR}`fcR=PWEq~4n+sDHRI7`FxGpVp%qT!L~W=N zDX<0|v&MXT)|f2=xOW0@SdR{xSO}nGPo_P-djVaKU6Z;4GT#(o^Zz1I!PT;KJlXa@ zi_oG^g?;s@u&z&qb$zNy8Z=c}Q;jz^cxM z7VRnQt35Rm^uwC=WG_L~K(J$KoNrH!v*q0PPPuPn+=n$T?Ai-2a8l^ITX}u+$db*P zL+%?VrC3hKe0<-Yk8exI@12c5t{dTDjT0N|V6aI*A%${i9^xewH2>EgnI8S6-nT@J)`e?eeEpfY)?_JcQQPW~vlk&!GYN^F@2JBOn zFCyzX$x+65vCIkoXM%FZ3Y1~apI9E-aA+6gy^B;dYE+DCg8a}cH*eBSQ}HHNO~qD{ zqIX4#MnQ^kO^~)+BR%4=fiHV@O z4o>Sj=#xv+0$x#3eiL&2-G$tK@!R(8b$wyXg^=a^Jcy*yQ&PZ1Nj{O}-h}3wQE+hC4yeNdw8LiR6J7PF}~*OwS&g>DywQ{N6E6ej~=oH)EVk zBz1^dWzL{9W(8bDx^TLMvJt18Wzt1zq=0&1H?_zMt%j>_i;D7lM@9LKs3_lzigNb6 zh@jqoI;~WaGbkM4=n%J&%O?|7vAeMhQY$M$>2 zX8DcSEZ>aH+PBn=BjtCbCx0J3wQITl=f-9^4MYPI(PlyV4JW1NR!Ga*L#?2#%fLcI z`vvJ?gc7n8$;VbQ4ZVcJ4t7hN2ZsVp&q(;z#yvu~UA} z*eU4QJa}$9GD0_5a@R0%bXSq%lG2^+$<(v|6(mEijeWX?RnxjO1&|IY@t4 ziE%fJ#vNNN8s8GY<@XKX@<$B?c4jWauD@DXc8@q0JVlX(v}lT);B`V%g5o*aW6>?0Gv4x!KWw z?%G4KY!$Y87uagl*YZcEss`Ek?O@o{qTX6jLn-nP1H+~d^j8P!V0edtVU^^4!D!0y z!@#f!%%1YnYi^2j2pG0HMZL=uHL4VO^-T$^V6<;a@4`Wix4(Q#V6BeEY3$7a_#z3n=uVb?i^UFXbX zfUgCV_VeQOHfo%PQR5g!%`>31Z;#Vk<#y^Sw_~W>`ypvpd7XYLukuT{bQsuW03)=5(XO~UeHGV6{VS(ZT=#>~u1@wYe&sYbB|Hp_c0H(f zZKg(PCa2Pa1Q<4J!d4%tXL+QOPJ=ou{$a4#_(*>?QU}9342*V3)4Q}#qq2}wNt*p& z*jU-;q+q#CDsi5NWgXg8+>;|2pt#M)Uf1}6Ac)#;Ix9FSI3#z<9BuZL zLh7awyFZ(Cvd?BSi+MJ&iQP$Wu{&vq-APmI+8+z4nP{_a_s=ui_4C9g&L_Ra`J^Gv zCrxqgTGBI~Xik*YSm(P6K-L0Poa+NH-5M_wT#w z4=P?z&?hd?6G1UczbfFu;Oi|ZjuG1wh%MBU`c{-zC3Xxg~zIDEfy>n>tVyNO<9`sRhA}o1!dCElXlQkII+YMTW-F% zCecvsPI;8mtld98vFJOKzWUCjuJ245`cBKH$%~4|ENw>a*x+qbj3#{*qe)#cnluz6 zOLR^obEt}#!I89jr=|b-)FC>LS`icBi9%I3cvYbVPb5%!MJ=7MP zIS8|EuaVDekC9I-I^(3T&N!*-jFX1Wc%XA|)-60>CZhxDRhenJH(6TV#LLC(7LPHL z;TSO6)jG@BBSbjCzX*y`xv}Dim`~;NZCc=;soK3x(S9>qu;0X@YESyA+M;7aaj5AH zy8$l1<)8?>bYQPGbK^M+vCwbcUfiHH&2zQ2<4(ylv+>mOtZ%%@5*i88(VQq!F@%tc z*U;!}%V$$d`fDZi<*Vr=PLoKhmr7-q#?rA(E>zFj`ykN&hAgm5w)+otwXMoyCU`5P zf5EiCEQ<}vW5$JIz-de(frQ+TPT?Ul+e20pi;XksYvWAnHqNABsEPWW-C0R0JLJ= zf5T@@q%9j>uMn`wR3z^aK?v%F8*PFh}zZO+Yl~1d=+| zn5G3uv6wDmyg+kOJQ0#gy-N-c-YTJ*DWPBFTZE$(C65BcCBun;Q9fLMdGq&?;GO73 zJ}4!aB|kd)+h$JkloW)Yq5Hr7#f68Tht54Ty)>l9(a|S#Lo&u`!SXHogdkY&6Z($i z!WuxIjy?^IpHH>_iGRU}S7kaJ-~r2YbaW>cgK~t?Tav8NJGCq_JM`%L^P3M>AKsjy zySG=j=;H19%^kYBMIXMsL+@Xof4D<;-=bHq(bb3ByYqMNUSFcitDDysckliVGv3O4 z*rTH%x`rG*6s<_~0EWO1|J=~%VJMDBftDK@6JCjeivN#TzC2yybc2)A{{ua4MUVgA zbKXFoQ^y^i$1zQp!-^J8kI{nWycit~(Jdi>?hoJ72Wp$)_-KeOD$p(|k60d8tz-Fz z(QXJYDw}( z5~CrytCP4268?ioz&8HBBFTEF{0J{01orZO*9qM5q{08k6W9Hd|Nj<0f``dCW5HR5 z-@&dQ9U1gYIm&Xn#yL&4z=UJLgh8R)0^NT&zg6+bg1e87-m)k1Nb(c(L{#>yY>Sgb z@qdnZfzuf0v7A-TG(uOYWc%eyUt$Eh27AnW{7Z*MOBzKq1&$!^9yC(~mI-t%FaRI^ zd|SyS(E)%dSQ%N&aZ0Kx3E(MZOBzY3pjYM-`Wq44{cf8H?ygr){7ZV#O^|4$gZ;$yx=v>DG-Y;;%iGcjI z@=I>gbax9Y(x$0;S}?Xw@z{3Gpg6!5k@S(~ECnw0h;u6D_N_QI_L)aA(KBuiJwo5FNQ&mHSQ#6K<*T(Pu+F&xNB|;> zqh&dXh_EGyg>}_IyOnpkyP&=PnQ}NT>eg3ny!cCV1@5$^gviesT=P+|u;xS_#Iz`R z7D4wk{we49eh+gU(R7&;&JQ??I7OT;g!iJAiA_ohzG7_WQ1%dd}O!X9XMGSL(5XfLI@Qi9U1th5f+h31U$_tTs)dOw;gXKK=%Ir0n9 zTsc=qnk)Ntq`46gMH6m8YZ)$9ToT9<5y8epiZr8F)B+%+liq+9L_zH#8x2iX5mDFgO#^^kkqfwFhT|)5k15 z)qMxmCt(Z^&IV#EFd0A+>HdZMSPlaef30k8tcv5(e-RnKqL)ol7TlamjYOO9f&{+1 z{xGtmGb*p)>w>!mya3|+6^&LvWSX`_Pi^APmE5fxu(r9BKfss|R>RO0B(c=m<2V*7 zuq1#vSqPdaa%fpFIlDYrxLA#VI4gH_;|z+^riz~IfZNV=x-$j{!Ry8o#MwBI9Vkd& zh>89BunO(2g?&^O4@t#{3fQPY+3kakgsGg$i-RT?yU2xkP*9w372uJISrxuws#~S( zehp^@9`P9BWAtsB=qJH+ojOE0A}QM}S4}{g(IR`9qmWyAa>GTWG2R)gK2@=EWOUf! zj*2ZN5Y0#EJDkv1Q##mGy3+~LJHm1!<{BnlENDuLZObXRBnz4f>r6L^Sjyo+v;yTD zaOV8*LrxYyRu=~kaZXi3MGzRNOET(zePBG1CI#7)<_yH5QO}0xz!N?mqnuMkv@#3lDk@0Nq zg|l(s%)+rZ!`PXUsXr(4*mIm9#$gyN2$|t|7|mRl1dFlwXD~egDosb)64^^is?pc{ z_!)w#A_*-daG|x(s`9?!aRG%^$k34>JHy$pTPj^vO4j+d(s_+5g9oxLukV#G`brM* zm4azhhgGRhqbfGN?fT-}_$utj*zj)ZHw0RTjd6in#;bZk0|?wri^jc$3So^c5I<`h za#RJ+^Fx4DPeJU0`%Zp%2J<3kNkZ~xmQsjmWHwRSZdD}pRM&jsq&ST+S+kUrV$UqC zS{j(KM&Z%VpV98&Q?bTsRdoAif9vuJP^)J+`hX^TAF>XgH&0F==3F2lbdpc#-W79v z*gzp-wm>oAR9KlAi}`NnN6INn-%>6(?K`>#7rh$D2iLe9{}vL2WNWmN%~2xTH^yWT zpYjocDMuO33o2!a!CzCF=!GzlL^ozvWOUs(1K;FJVjI0$&Bows{4-KL_YJ;D@gt@Q z&{Cf%YW?dI2`#c9%dKtPI_aWKw#;!%P}%JpmZQsZZhj(kZyIZ3L}20`Gn{Z272l_U>Bnc_VZue^F5xN8t6+D)Hy^LWv93o!2ykRXZJjy%@MBFL8wH1s@zW?PXrShu7<7DkuISpFlEy@XJ z$s<82PZ)dHWcogWr84EkaG!8eY%)c?amrgXUUgP4bwo(P(BLB3@Pg#u(3}?oL>J)C z`A}YdAkYWk7}c77Pm9%C*|M#d5NZ+6g;qFYMrAMf9JK6^?E0sP~wr?QoCK-Hv*8 z3#o0ISDc~qV|4eAGxYK90=+s$*XOsl-(Q}gum1gSG`dkw4?sNTFTZ?+E~*CbL(<1@ za<*2#Av7B4y@0>(h$&H>On?2ic_5JC!CWr1ffv#Z6=GIKTLT^1R9PUpSPK}V2X+lv|>D3 z6|F8&1k;>vwSh81*JZSrW@!>c!LP)8%Y@BwGFohsL@rd#&U{I0Zl^&T8ai=4{8o{}Ou z6)ia$qBYJk0oK*EXq^+Tx{B|>V?Y1w;y50v>4yaa*AywDAwV#EqQwgSIm8m~)8i6T z&9qw9`THuN#B5m=yx6jhtlV94+k&Bc3!A(zr`&Oes=Yc-685B>!Qe9|KMPJoi>jLr z9TH>FeclZM;Dtl#pgsogStf=eKwJj})ZLF|9rHp!-7LLj%1{`sb0iTGwLjO5Nb{sf-ZVtH{Q zqk_OU4-feZDwQt^bF+5~08;jSLw_dmdm6_H5!{`(n8u}Az_gx@(~>`pFLF#4^uhchWEgP53`azBRk1;9 zT+j%j%q~D>=Abi|yIrljIU1ycW*JFiIkLwmNbNnOLW<%HK)+sBH5QaMI z=C6N2?#K;>&LI=&xH6l>(VBy#e0{W`by?^^aYM@Gy>f?HAvO2lS)uj8v#MXJBI0|L zEwinRXVU@nDOQn^yxG^`*=YPJi5)fd;opjF#LdGorR&1fZ7kNO8@GCL?gr^(jt z6QnM*SqL5WnH}AkNG5-5Tjb1pq1i!isUpjES|G?vXqw7*UipbQn&N+?h(@E)@d#ak zGMy6v%vySraEe?#z=@$b0?aH;w$*3oh4Tjz3(2V_ZvnqZc1faAWbWSGmg-Bn1h0gI zmeI2x^jrT@Hy6B170S`Mc$%-(rrzuLG21++I(78a)P*rE4$cp0G=3&Aq}JM=5puU8 z%@IJoQxUEO$=5WM1j_Q5d6>^h^#$k&(4p+5=yx$EF)9D4KVBJ}Y*_TvTig3y~yqcEII zqXn7I$Yea8Md8>B$BVHOhW>QCh!){9@Mr^4NBr*HohqEzzCE>ptow7GJmD?hfvpjD z+}xV_*d6vpcYJQb-AQ(~2Y5@NcW3O3V?Xd65>FyG4*Ug)-Dy0JU3W5>PeKyS!$ssz zLf7@@QQ*dY5M$4GqQLQRFddJd1IXB(Czd~yOZkk2U2ondCUyoL5pBKKrJYb)SguQ0 zsYb9TR4EpXVY(ZE4dix)tQ-rU2b!d$U0YzVJDBz`Z8O40>OO&=RmufX|5tw)l1g%> zEH*tcP0sp(#X=2F)PqSzyx5Beilq?7A|a7JI2Gcy_mCeDd1wyPj|J;kyC|WRo2hx+ zYtwW%?W*5U4u06&JM%qr@aK__$Kl+I+}Rih^B^MQD4Z zFFZVn!|6Qm#`9SeOy|CH7*zWB*Y41sJN#zj&(jbO4AUtyD~y>{go+JXo%q~@bvJ&S z+lC%V72`c?STKVdg5&RVT99wkNIE{xtCpopzRDn#837|{kVu1psS^sOnbc&~EGDJ( zqoVlba&6frFCSD=+2HyA*X=mV-lr8*Lsc?XUxf|D{QTIu7W;#tgy~rih`RpnqHNYa zWDiDe?k4E#wxLy$;YEV!y3PE&T7bL%38$)N3lzvpk?x2h(etFTPSw>)`CXt_a}^n4 zuLYn5%OkSm*^q((zUjC+C;$wj!?fQE;~p)_RVP)jC%);rv8YDHF z&EC*5tq9AFVT+P~Xk>Eo&kf;4iBT)ZvdwBfyxHceQ*+4%^%fFf14&+DW)QVX8 zU%C<&`1|f_Eb)G%Xi(^}81c<~2##3_wGm_nxc1$~)sZeMgwle`@|+e3cVn!w$4CcP z?Xq%cz7t(_Ry~YoS*l@2LNCxTlGfT&P`Xw%*FN!!^!!?M_3AR_mzNT&B=zw)Z>) zzczCPq8X}9K7=qNm076580~)qL74dbhC4Bm1Bg+riBgihm){~4O$%xa16}(6q7~+7o`@;q=FB$CZHcUNn)b+FZJnY0xC|f`$(U#7*eGfC z?4bd=#K{KE@x8|9z8#>LJRZai%4L!8yv)YgAhK;jOdeli6U-Sbj;;Tm{NYweE#&fB zQ%M_F)VGoirU)Q(Vu|G>oD|o_`%IR&AGi$$&D4C%NyfoNEB2JiS7qR#>ei{G=5;Xf z-$L`>@C;P&m4vEb_*D)>%XGi*b727ddpI5jIKTQSG3KftmXbhzog=g1`3q?V8=n6m zwF9*RHsPeudWrL>XWFYN)aU!v30>NxolHwr4XxdRsE;>Nz5?Z#R>^Xc$pnHcD>b-` zsDv@srgK`&_RKued2d{b{d@30wu7^Qt^zSQ8Dz5Z%6dD5y8Wl??Xdj%%a0AkTum#- z-EZ?XK=~hFHZ?G^8_}}iUISV!#ou7AnC80*goJjqCNbT#-V^AcL)D^SXz-q_S-u@q^oCKf&K4YfeRKYPILE*v z;bLja3$i{o{bsOt$~mfsT;T$VUh1lv#VvkU1t+KfB05L5?Mg!oaDPkxMI?-`02XNm z^Lw-)7@nG0iY)q{bM!b+{^E_?-9+f)2|?>TTQvd);S z z0`~X1^`D&q{(@=S8H>-KEfdmGvqP7%toQF(0K^#V-Ql%4c6xO$yI~A*YcFwj|L?(q zzY&V|;A|XDPxNmWPG)6C_xhK}HF<8HFJ7cQ$P`lI$WMGc9zaheHWCv<;s$6yd_NWcxh<gW@6g>cKQQ`idnn*JJ5o35s1eMs35R8C){BySNtX$IH+X zSUzY5we3?@DDQ1~Q@^t}B>~%3=!V3Y9zvYuNH0sB<*+;CSxtBleO8#-7vZ<1&}!Nj zCeiwuy%>!)hiygWSD{kHTy0Bqt3E$Np=y+urB5~J4t46u4x&w7L!f1p-;^%(q%TaB z=1RR7P1Xl(LE^>f5lY(c*FVcb{d=@ebD*BOXT7ffj^{7FQDMKBqM^BEzI>wAl7JPktMolV09#-8VoLl3v4 zb~FIe>SjL2R=U+*9i-~p+^|Gu5*xq2qG_zF(}=M~QT6S4Q@w8An$xt6r{?;MVfR6+ zzU?*X&v(562af(3!&c+<$cE^$bx7E;$4W@7C;FptuipDouy7hKr=RF<#QuCbXIdv#MN2jtPDz~I|OHfNw(Pn_| z7OpAJ?`!cvTpj`F*;T}f^nZIcVw-0q=2whJCc-WEp=o^ffXzQ z;0@*>jB{C-O^mABjL@x2hBj4zd(rm(ME?I){NwK8`X09X{^RBK{Rl}*U;IJY{26{q z5k_|x*R`sLOHx!P70T3#^YiiM9ejmzZContL#n{}k`&KTZdG&9Xy0(INJoE-)x!cT za<-QGb5+wAzJMFyz8dfzk_`1TRLY59(wAmWDnPE1)rM!Gas7Rt!N9NyP&`TLS7M1` z#c;HCR;90({103hHma!Km$oxNgOfkQ2Y2V_cw%_%p{gD=!k#%bdi(EERA$=MbuD7TIC!3Bqy^$~Ds>v2x-SW?|^E+NA+t$1}KBM~7jH7((E8mhw`UR;$+12pW>F zYO@&Sn^cw@RU_4&zL6uqHjkD$j>t91DTGe2G&bKNaqi0-&wYZv%yu?D4sk|Lg|JT; zj)$d%f10s)_~@Q~Syoaz{&5GUHQ^jDi7jIJR|aV4?g7bKT>3WyiX}>%w!Dg~^*bz+ zBC3|3Tf7KHgct3qQPu5q!7`Sx<@PocM)5^iFliS&{TiRGN1rG8^xDCa$#v7i4>^oK ztZF#v3-zLC4dCv4wC?WyUO!msnU`O^gdxGv3Xzz?YbhJ~mW$2~7mP$gBjeVfWWilo zcCn?3y`|a6p5wXB%ni!=RufEu#nf@9{&YMg zap+HG^Kda;Ov1&KEP{nQ4<^Cf^St@g8Bd5abLZHZ2V}emz1eK`EM)Q)k=dX5+3*7AUpSvVR};BE$j@*%JX+D1oE;%F zLFDS`;faG)P8NR|Xu(_Yv=Pgfr#}e+K%>(lr;poF#Q6Zs zoWBeT@^f(tzvm?R%YYZ#gzyz1#Q>fD_2}r!FQNAD5ZHzI^~*26M7I%61y9)|1wT4E zI{Jh@F!Y}C8nYL&WRu4F?H<7aGXTv0FVBY0{d|HMD;cb36yhC%1k6uu(EN9A+n+yw a{`~p#=g(*V{J#JI0RR6!Mc&~6xCsC|m}PSS literal 0 HcmV?d00001 diff --git a/stable/grist/1.0.25/helm-values.md b/stable/grist/1.0.26/helm-values.md similarity index 100% rename from stable/grist/1.0.25/helm-values.md rename to stable/grist/1.0.26/helm-values.md diff --git a/stable/grist/1.0.25/ix_values.yaml b/stable/grist/1.0.26/ix_values.yaml similarity index 77% rename from stable/grist/1.0.25/ix_values.yaml rename to stable/grist/1.0.26/ix_values.yaml index f209ffe4036..db48b8213b7 100644 --- a/stable/grist/1.0.25/ix_values.yaml +++ b/stable/grist/1.0.26/ix_values.yaml @@ -16,12 +16,11 @@ env: HOME_PORT: "{{ .Values.service.api.ports.api.port }}" GRIST_DEFAULT_EMAIL: "user@mydomain.com" -# https://github.com/gristlabs/grist-core/issues/128 -# envValueFrom: -# REDIS_URL: -# secretKeyRef: -# name: rediscreds -# key: url +envValueFrom: + REDIS_URL: + secretKeyRef: + name: rediscreds + key: url service: main: @@ -42,6 +41,6 @@ persistence: enabled: true mountPath: "/persist" -# redis: -# enabled: true -# existingSecret: "rediscreds" +redis: + enabled: true + existingSecret: "rediscreds" diff --git a/stable/grist/1.0.25/questions.yaml b/stable/grist/1.0.26/questions.yaml similarity index 100% rename from stable/grist/1.0.25/questions.yaml rename to stable/grist/1.0.26/questions.yaml diff --git a/stable/grist/1.0.25/security.md b/stable/grist/1.0.26/security.md similarity index 58% rename from stable/grist/1.0.25/security.md rename to stable/grist/1.0.26/security.md index 62fe95ddd5d..6dd3b617b0b 100644 --- a/stable/grist/1.0.25/security.md +++ b/stable/grist/1.0.26/security.md @@ -11,10 +11,35 @@ hide: ##### Scan Results -#### Chart Object: grist/templates/common.yaml +#### Chart Object: grist/charts/redis/templates/common.yaml +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.allowPrivilegeEscalation' to false
|
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-redis' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + | Type | Misconfiguration ID | Check | Severity | Explaination | Links | |:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| | Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-grist' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| @@ -44,6 +69,9 @@ hide: ##### Detected Containers + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/redis:v6.2.7@sha256:43e732707e89138e7e18f5b03ded42dd7263fa02f42c597a5c531af402adbf4e tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/grist:v0.7.9@sha256:2992e73543345888c4495bf000bdfdd4584fc2048de38a98649c6205e79bb63c @@ -61,13 +89,13 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| @@ -82,13 +110,248 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/redis:v6.2.7@sha256:43e732707e89138e7e18f5b03ded42dd7263fa02f42c597a5c531af402adbf4e (debian 10.12) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| @@ -256,7 +519,6 @@ hide: | ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| | ansi-regex | CVE-2021-3807 | HIGH | 4.1.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| | ansi-regex | CVE-2021-3807 | HIGH | 5.0.0 | 3.0.1, 4.1.1, 5.0.1, 6.0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| async | CVE-2021-43138 | HIGH | 1.0.0 | 2.6.4, 3.2.2 |
Expand...https://github.com/advisories/GHSA-fwr7-v2mv-hh25
https://github.com/caolan/async/blob/master/lib/internal/iterator.js
https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js
https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264
https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2
https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d
https://github.com/caolan/async/compare/v2.6.3...v2.6.4
https://github.com/caolan/async/pull/1828
https://jsfiddle.net/oz5twjd9/
https://nvd.nist.gov/vuln/detail/CVE-2021-43138
| | async | CVE-2021-43138 | HIGH | 2.6.3 | 2.6.4, 3.2.2 |
Expand...https://github.com/advisories/GHSA-fwr7-v2mv-hh25
https://github.com/caolan/async/blob/master/lib/internal/iterator.js
https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js
https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264
https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2
https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d
https://github.com/caolan/async/compare/v2.6.3...v2.6.4
https://github.com/caolan/async/pull/1828
https://jsfiddle.net/oz5twjd9/
https://nvd.nist.gov/vuln/detail/CVE-2021-43138
| | async | CVE-2021-43138 | HIGH | 3.2.0 | 2.6.4, 3.2.2 |
Expand...https://github.com/advisories/GHSA-fwr7-v2mv-hh25
https://github.com/caolan/async/blob/master/lib/internal/iterator.js
https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js
https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264
https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2
https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d
https://github.com/caolan/async/compare/v2.6.3...v2.6.4
https://github.com/caolan/async/pull/1828
https://jsfiddle.net/oz5twjd9/
https://nvd.nist.gov/vuln/detail/CVE-2021-43138
| | axios | CVE-2019-10742 | HIGH | 0.18.0 | 0.18.1 |
Expand...https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505
https://github.com/advisories/GHSA-42xw-2xvc-qx8m
https://github.com/axios/axios/issues/1098
https://github.com/axios/axios/pull/1485
https://nvd.nist.gov/vuln/detail/CVE-2019-10742
https://snyk.io/vuln/SNYK-JS-AXIOS-174505
https://www.npmjs.com/advisories/880
| @@ -329,7 +591,7 @@ hide: | node-forge | GHSA-wxgw-qj99-44c2 | LOW | 0.7.6 | 0.10.0 |
Expand...https://github.com/advisories/GHSA-wxgw-qj99-44c2
https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2
| | normalize-url | CVE-2021-33502 | HIGH | 4.5.0 | 4.5.1, 6.0.1, 5.3.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-33502
https://github.com/advisories/GHSA-px4h-xg32-q955
https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
https://linux.oracle.com/cve/CVE-2021-33502.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-33502
https://security.netapp.com/advisory/ntap-20210706-0001/
https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539
| | path-parse | CVE-2021-23343 | MEDIUM | 1.0.6 | 1.0.7 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json
https://access.redhat.com/security/cve/CVE-2021-23343
https://errata.almalinux.org/8/ALSA-2021-3666.html
https://github.com/advisories/GHSA-hj48-42vr-x3v9
https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7
https://github.com/jbgutierrez/path-parse/issues/8
https://github.com/jbgutierrez/path-parse/pull/10
https://linux.oracle.com/cve/CVE-2021-23343.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-23343
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
| -| redis | CVE-2021-29469 | LOW | 2.8.0 | 3.1.1 |
Expand...https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e
https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1
https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3
https://github.com/advisories/GHSA-35q2-47q7-3pc3
https://nvd.nist.gov/vuln/detail/CVE-2021-29469
https://security.netapp.com/advisory/ntap-20210611-0010/
| +| redis | CVE-2021-29469 | HIGH | 2.8.0 | 3.1.1 |
Expand...https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e
https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1
https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3
https://github.com/advisories/GHSA-35q2-47q7-3pc3
https://nvd.nist.gov/vuln/detail/CVE-2021-29469
https://security.netapp.com/advisory/ntap-20210611-0010/
| | saml2-js | GHSA-mfcp-34xw-p57x | MEDIUM | 2.0.3 | 2.0.5 |
Expand...https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0
https://github.com/Clever/saml2/pull/190
https://github.com/advisories/GHSA-mfcp-34xw-p57x
https://snyk.io/vuln/SNYK-JS-SAML2JS-474637
https://www.npmjs.com/advisories/1222
| | shell-quote | CVE-2016-10541 | CRITICAL | 1.4.3 | 1.6.1 |
Expand...https://access.redhat.com/security/cve/CVE-2016-10541
https://github.com/advisories/GHSA-qg8p-v9q4-gh34
https://nodesecurity.io/advisories/117
https://nvd.nist.gov/vuln/detail/CVE-2016-10541
https://www.npmjs.com/advisories/117
| | shell-quote | NSWG-ECO-117 | HIGH | 1.4.3 | >=1.6.1 |
Expand...
| diff --git a/stable/grist/1.0.25/templates/common.yaml b/stable/grist/1.0.26/templates/common.yaml similarity index 100% rename from stable/grist/1.0.25/templates/common.yaml rename to stable/grist/1.0.26/templates/common.yaml diff --git a/stable/grist/1.0.25/values.yaml b/stable/grist/1.0.26/values.yaml similarity index 100% rename from stable/grist/1.0.25/values.yaml rename to stable/grist/1.0.26/values.yaml
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001