From 37507b5d407b80bcaff3326acf1d5a8bdbcf504d Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Thu, 19 May 2022 11:04:02 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/mattermost/0.0.1/CHANGELOG.md | 10 + incubator/mattermost/0.0.1/Chart.lock | 9 + incubator/mattermost/0.0.1/Chart.yaml | 32 + incubator/mattermost/0.0.1/README.md | 39 + incubator/mattermost/0.0.1/app-readme.md | 3 + .../mattermost/0.0.1/charts/common-9.3.15.tgz | Bin 0 -> 44146 bytes .../0.0.1/charts/postgresql-7.0.73.tgz | Bin 0 -> 94230 bytes incubator/mattermost/0.0.1/ix_values.yaml | 49 + incubator/mattermost/0.0.1/questions.yaml | 3220 +++++++++++++++++ incubator/mattermost/0.0.1/security.md | 719 ++++ .../mattermost/0.0.1/templates/common.yaml | 1 + incubator/mattermost/0.0.1/values.yaml | 0 incubator/mattermost/item.yaml | 4 + 13 files changed, 4086 insertions(+) create mode 100644 incubator/mattermost/0.0.1/CHANGELOG.md create mode 100644 incubator/mattermost/0.0.1/Chart.lock create mode 100644 incubator/mattermost/0.0.1/Chart.yaml create mode 100644 incubator/mattermost/0.0.1/README.md create mode 100644 incubator/mattermost/0.0.1/app-readme.md create mode 100644 incubator/mattermost/0.0.1/charts/common-9.3.15.tgz create mode 100644 incubator/mattermost/0.0.1/charts/postgresql-7.0.73.tgz create mode 100644 incubator/mattermost/0.0.1/ix_values.yaml create mode 100644 incubator/mattermost/0.0.1/questions.yaml create mode 100644 incubator/mattermost/0.0.1/security.md create mode 100644 incubator/mattermost/0.0.1/templates/common.yaml create mode 100644 incubator/mattermost/0.0.1/values.yaml create mode 100644 incubator/mattermost/item.yaml diff --git a/incubator/mattermost/0.0.1/CHANGELOG.md b/incubator/mattermost/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..cad71268e44 --- /dev/null +++ b/incubator/mattermost/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### mattermost-0.0.1 (2022-05-19) + +#### Feat + +* Add mattermost ([#2705](https://github.com/truecharts/apps/issues/2705)) + diff --git a/incubator/mattermost/0.0.1/Chart.lock b/incubator/mattermost/0.0.1/Chart.lock new file mode 100644 index 00000000000..83dd9c08bd3 --- /dev/null +++ b/incubator/mattermost/0.0.1/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.15 +- name: postgresql + repository: https://charts.truecharts.org/ + version: 7.0.73 +digest: sha256:f1f987c0f5421a1864b691fd4c7484e2c9cc0f15ccfcd7aa90b5861247a5b275 +generated: "2022-05-19T10:52:09.957483077Z" diff --git a/incubator/mattermost/0.0.1/Chart.yaml b/incubator/mattermost/0.0.1/Chart.yaml new file mode 100644 index 00000000000..72a8f786a36 --- /dev/null +++ b/incubator/mattermost/0.0.1/Chart.yaml @@ -0,0 +1,32 @@ +apiVersion: v2 +appVersion: "6.3" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.15 +- condition: postgresql.enabled + name: postgresql + repository: https://charts.truecharts.org/ + version: 7.0.73 +description: Mattermost is an open source platform for secure collaboration across the entire software development lifecycle. +home: https://github.com/truecharts/apps/tree/master/charts/stable/mattermost +icon: https://truecharts.org/_static/img/appicons/mattermost.png +keywords: +- team +- mattermost +- development +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: mattermost +sources: +- https://github.com/mattermost/mattermost-server +- https://github.com/mattermost/docker +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - hosting + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/mattermost/0.0.1/README.md b/incubator/mattermost/0.0.1/README.md new file mode 100644 index 00000000000..1e2d5e985f0 --- /dev/null +++ b/incubator/mattermost/0.0.1/README.md @@ -0,0 +1,39 @@ +# Introduction + +Mattermost is an open source platform for secure collaboration across the entire software development lifecycle. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://charts.truecharts.org/ | postgresql | 7.0.73 | +| https://library-charts.truecharts.org | common | 9.3.15 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/mattermost/0.0.1/app-readme.md b/incubator/mattermost/0.0.1/app-readme.md new file mode 100644 index 00000000000..d1b1e51ad71 --- /dev/null +++ b/incubator/mattermost/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +Mattermost is an open source platform for secure collaboration across the entire software development lifecycle. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/mattermost/0.0.1/charts/common-9.3.15.tgz b/incubator/mattermost/0.0.1/charts/common-9.3.15.tgz new file mode 100644 index 0000000000000000000000000000000000000000..9b1f965606daa7518806862bd939d3be3b75fc7c GIT binary patch literal 44146 zcmV)sK$yQDiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{XC@+jd{;X<4?loBgfZNq75n9zL;?-rdgOs;daGw0- z{-18Q+Z_%D^51T^Tl}{>-0%IRH|P(#!~Mg9gWg}dz5d{^`xnrC09;DXf^kUy(!FzA z#m@af9+=^eh%!vl5m@#cFw5-E1aic9BStKuIOFo&_lqj1OQ+`lN|j*1yx*Q zz*iX>8T1-UgUfMyzuh}%Jkt2<`M-q80ZVE5K(6=mH>0FiJVVqF@66iZa45Cv-Ie(^*8@n7Hym*J`O+o5BSgiV4Z#)JU%X zWHZ=57>>r#K0FwX`%&-s01n232pvSj!^yZC^}END{iE*w@SxvA<9NR}j3<3~7!Qxe zgZ{zzI2s&{_q!WokS&q~WF*1SssZG$bNOQg&L(dOKc|R^4mBjSpD{&0EFg`yrTPt~ zXeugJ(>;g1A;~Sw4WPM%UiRAEcE8*2b&q=kOYcL729u+1?`Z$%;0VRT{lnw&aB?&` z98QkVWH9NC2Zw`kzuzApbq@|v_qaEP-SGe&OosjAR z$Q#nxlwS|aqjJA}(C!-Y9`?~BI*bp8z4!?358xOMhy8>7!*1N`_71yfKkCJ3GMS9g zVGs7>K`(;G{lkL@_4~)&{&8@K3vF*j-4t;)BZO~DT~n``x)$<=)HUVT!>Se*-N9gZ zG#JP6;OGd(2e8*aMhA!Saqj@3gJHA}i*%gWez-9~>UW`~BnoLGKVogM)am zLEF{TJxOlhifOt=Bt{I;C8FC>Hm_MtTT!N^!EZ=jr^-eUJr*9c2RRG(_Qywu-Qz(t z=^yWpCxe6j;Zcl^k5Du|+DGGq?qokc8crstdvJ6(9!%gQ9>!7s;5gnN9>PJ8h0D!v z#l)?1~6{=#pZ|K@TM)CgOs0+IY4fZF8a56mVO;CIg z4<=E+cW}@f!ttaR4SER1Xn4GTH0}@Mqv$y5M~4ST`)ixtPV5rKrxdYYwimp%W{v30 zp>HaDZH-Of`ODm(y`QshB*=E$9UOIs$GvEOzduIfaWpuD@#J`NcnG@($KCF*cW@XT zM7`dyH;9iR+~42t^Yhx>_}n4crYWtc$OOK5Xw> z+76?`eFTq&!)||o_R$bUy}|IH*YEcyz5Z}N?jG(B;88q?huz6=FouKUSKV30MGbP0TJ% zPhP(ofeB0)YBVB}a!Qf}Q41HPaGW5$z?iS?2GAekk+d}wvB--8vB_`C?;l};V?d-K zg#kzff>}aVbCmKu5JNO4DMK6(3K)kRO%@45LYGl?g1oRtxj2?Rgb9FYN;p)|NhvSBD9otp|xV2tm#z)|9e^>CeX@ikD(u98o0FZV9^;Z7r;&OKkM&QfWiryt~jFN4@ zstR}Q(=D5IJMwlhA0sLlIYtaq6oZV!OwIWON05y`uZDpZ*_6T<0mdohXu6U`zb6#D zw8*eM(FYu>o+#dWk0Od7M_@+_s9gZl7`!J*g45}TEQVb3rGRyzdvk$;z}}@VQGz%s zgUG=vU@s*p1Q>v)DWPKOU?#p9{KeFwE(r0$>3&Y*LQ8Y_87xw`gg6mXPu6mNZv%!c z=u`oae-)}aLtChuLCTFl0r@X0E#9jU6+kFjVuncyW|#@F4iY@aT#mZ>@S}SFTD%^C z{YC?Oi-nS@`Lf`z5q_y$==<+0C9+=J(D1b>qZkQCn2(lH(aCD8+DS#lx zlL?}^p(Dl--vfA_5z1l8t<09<6#VevOm)UU9)YI(-E8QFjS$wnKA*!h-eJ2Ij#*R1 zG?0eahAt$hasURTQ&v-3e0Hjy#IdS@Q!8QsCkE0&&M6><^PPphs#r^kXr8q@D-3WO{`u0?a75|rJ+6)SEeaS zky1v?QmFwbMP&{%cd=3norYj3cnWS87 zgz-JaGoRr+OVCIVO#y=-S};!L;Ot!16=g@DcieCHhDYt;ussZdgbTvwkmCp@$qGy% zpCKVNaVqpWUHXoVLp52}O8OT-bK;}kJ)Ged&V`K(dXLsSKHkuq?D`3ziM{oZjPXQ?b=OhLv3r<)B6GRId_`k=PNm&2UfVvD$rC2OY z0S@UD@sVJpe67%0!5pXW?cxlc$@O^-Kl|^xT?^&({KE&16Z}s(*5`;uDCI($i-Jda zxi@G|=&H7;>h-BwyBVTO93dD*WRdd9-G(l9qKXyv8`v2PXdnU&60jLrBrzBxpwxx9 z0rX#X7&J78mxZi^aco3p0cJp@GcYb^S~b_As)!9IV8OInay9`e;Zh0u=-vjlQvkLsFDpTrQHCJV+9eNPgl-#EX&!)c7uX(i$57)F-d zuOx>tp}%V`WD=JR;Fs9b)dx??;>7_W#w-8jPVh=Cwz76fTy2bn>4*jEbVM5&QM@sIzskTn+&8O z_=eDHrG;4~LhkW_SmfGu#`3)8T9)%lS8$hFn(;q%m5jtz5i~lzC5+Gt)cHAJx=>3E zpVAQWx+6AIvf`!O0*kpDgpQ16 zkl+YQwMD&Ay4Z$QbkmOh_JOJG3y3jA5l>bCat@=JUdDtJ)EXd8IieF7$q_tH5M*ND z0K9<|jliXVF6?+~WnG!(#JUc&itzFDk0-yz&Mvv>Zd;M;wKPXgwPZk{cRbs?A zPNDK7X?EN4|2h^g`Ai{4H*hub;M(7Zid`Vu2^kQ8qrlICU&m*@2T}iu9H#~orrC%*u;rl=rhR%>1s^kl|leU zk>D&nbsWbEFu@6GHx#ngLU4X^aq;uJ_b*3azG?{;xgj*x-F*Y4cC^Hlq;e~3HS;#O z)GJ%AJv{>#tCYjf#>O;iJOd}Yz-%|3f$w%zYcEIOn=fBL`#qAJ+I}lm%CBF)X*>g` zwn#${2}+mWQ!=-|0cf||4U{gmgnI@)8l+VJHA%(7J)vZ7mtZl=)fPci`dN|+P=$ig z3PvDCbF!yQd8)8LK*0nzI7z@5sX{Fn&v7acxy%wv&C6GB&R?HgzPkE&^7_N85oiYb zscJTBaF=-RIGdVXiP1}PliolYgOl?!QCWy*y_HRXXMn93 zNAs5GODm#SZWPUKL76c0r1$oq7OKRxVSie%@a9?!ZYzfA6j8EZtsIdm=;*T;P|T&c zl|0N4=R$cgFO03_=NU@P9-A=!R;|!r4zCelLN}1Y3ULsp%q*4!e9|h(_n0y+rp%A3 z?x%(Wq__vm*Y2iUy$SHdYa26FQOdVwMN6StLIZC%ETWQnZgpd!$@C8Q<=YEG7q(|l zP>img#)LC1v%nm#07Z->O9WDu5OTf90A_5VG&`}=1wYxTCZH}dCUH?qm0*1<{?w|Y zSW~vrPy$SEo149+-WI51W3%)!1Zgxwt|p)qt&Uc*B-*~=B`BmNqno8($mhTPjiSll z|GrZrG$N8lDC4YS>b0~ohtsL}ma#!?B$S1&1CbwD1N~~ZDF)am!MWGQm7#=kM`0(cB z;-?YlcKb&2g{e@377R&kNwBx6drDG{KJ#`2GdRWx=3<{p7M$VOZV!L>a3%)bH-o9^ zeCkvaXvCCcdiY@MnhA5|TiWY%>p(Yeb?|d#Ai40dleX$bdcp)vOfTh&A1GO5=FP2jwtAz{qid6&K?gulUT4tX@&4(qwl4{|dnD`THgyu=Bbx|R=$ zVEiskR-)bSae|aQwI^B9418|tyJS5_>{X#OYMbUpz+ua)49DVUhrnCaZQs|FRZa zcF(OLv2{Q(mPdRGb)uj-UGA;g4Sm)V#K0W9!gM8D$_vS@qrf4?(l;B@6~G+LSsT0( zO?st`#b*YW2w)+2Z&GlLq=I}oLq!`1Y{zb^WTtGKUq!^_-G1DjoW_TAPS+rT>|_N~^Q@I`0#_M5);HiiwHkUyMV_ z7g;M4&9lyKor~hw?6O)d@LGccSpaWQCJY4tgM)Jv_9{R6PCT#;wJq?^zr6!YwL$wN zK7A7UgV1emFq_FmK#%^4ET|kL1N_{=Rw6!^HySoWoEdM$F_Jr1a3j zeQsW!o;Mr$#`p5{Ja6D^0wDPD^734_fSFplj6Fn(C-J=_{&QiM_FdKG4Dy+&6KcBC z)W?QG9XG$MT~yFT>Fb86nY))Q9&UM5Yim$v6Rk!jC=#34Pll3mB=!`Vs*M>*VrC#} zHwhz+g0QPN2T06ETD6jpVDb_raCLzqlE!QVdR_fBLlnzJw(wp^NV4Ge!-0N3fjC)E zbUCAl353O${H!&G_*T4br&*ZU?dJ#Kb_@N9-M3+PpKSNc?_uD-H-^7ZYr@v-uGf+< zvojayJ+r!o{lw_oFuF^$duHfR+o(hQ-Vy+w>VG4Q%%${T7mFG?*O;-75Sqsu@6pQ_?MnQqr zKT248zEaBOyqHYzX9eD@ZEEN+^9bQPKnFnDRY)J_s+GXH@u~Ckg0HISiCB2`S9`vD zf#+F*c3u-0k6{AS2+`d=Abx(Qf9@H}@!9zvcuQh*uH3uKLT&7)%k*<-YVr5v=s#{cHJEt`hlymD78L@JK>0bjg}&a|th<7-d%r zdp~uW>n#Ve*UAB4hJbToCBL-&(fyQz{v<|BU$;WB-rP9DU{^St+N%=E0_^N~aLPD> zF(4DC9Z~vICYz9>(H0}D-8lq>VmzyW{k#>GxsN1;Xt9jA8sjC`JwYq9t$u?J44GBDPYQ6PpWvTItzoWitUGc)Q)U@*8 z`l=;vox*yu;3UE6wM#qYkLL@6mVe*D#0v6Vn;0Ci{HBGye;d?me*7tb$j`>7(0^Qk-fz= zpNTuhn_$;NN8m^n97s1P?H@8Xt)nz$78P*cBAE&J`WH@peCU5&sLG`)I zR_2KP_qjPTi`Zt_dn#}=aA3ZU^A3}wf%Rz zcghAU*NRx^%R;4eg3f{ecmaCt-k{YjK~moC=kfx)_t7zfm0B{(q-Xw8E1fk?=Byx^ zDL_%)iW@_gD*0xRoefh#fxCQtQDm1k_)aX?%9T`l>#Kz`+8i{;t6vwGM9n0C%N3WKqEkcyziL|d zF>z7B%>=J7E+|~1dVkRVb^4AJOkJ@e`hb)>npox(_5#kFEK)8O*$)@rff%X#2zS!s z9c;_GylSCRmEWwV4~1Nz^&p1ULwbXqhEw*oTMY%`8$jfJqUybdz2_^~E3!_oYxWx! z!O)Jw)>b#S3fKMos$RSUu~#A*FWWF5&8(`pctA)~-GL&z6x9F&l7&+nnfm6?5FHrYUdu z`W$oq@l^BupU~WHJDu3sRp@V(o>v|u=gg&aJUbHXm?h}^a4wU#;I3{T8yK9jd`5{4AWDPE!!Fx4y7 zsdD{ADlNt+20IQKyL%udUR9}tN;e*PoGK>Ej9B|b2z}Lv3qx(5S}t#EubvyIF1}N= zkXLa4`iz-m$tZz%zL$@(cH^<%#Z2?|B+iMFDRe4e$i`P>L0b}}gTn`HGK@(24-?s2 znk+tf06w*yU;+@Z#ki%MqEcq~(C!4{e1;kuy!6MWDln(KA#LZ17`ql*jOC_5qormO zB^jLRdk3BzJdw9t-Virbn30IQz^iX^Qzp@hywr}>4b3@;k)1QSv45;x*!1wJag7oE zKN{#(MtB9IlVjLY7&3ERrzNmp$^;K>*GAwyg7ME3bM#Iqta%>AZC&3yAq$Yq!I;- zu?tS^Zp5rMhBL%q%pet73co=p1u${l{~HdKw;{5ntZXmFbhq9wQlJozd>zMb+tg}j zFfWSvj;b6m!^}~P7t&_gRM9?~`SJw;pJx*WcHW=7X^mlYEyl@Sz}Yo3Mgz58duoUc zU@_97F0*G#dJ&S}<*ZT-`=Ul3eqG>yBK7e*+4@ICu}@%vAQ#hQs$*IMa|sUU-smC7c}$150?$BCaoQh(HI|SjWXf*I8%sz#qWTkeJTiAEp@-%f zk*O&(ZE8nal)mLK^Lh3=9AG`Vf4;$eys1wY>8NVwyTR0_i}Z;vHs_0ma~L3%N=cNA zV5Jtz+o-v%QsCTKFxna86ii4GBdYvQ)ah(YqH9E3Vlzr~pu4-U%uM4{&oa-z<-3>f zfDVx<_gq9;Q2tALypIzi2~omLKyNJ=ZH;k};j9cwiQH$Fq>|aAyIW-(&6Gd8wquAg z!&RK83by7Z_-GB=ImZcqVEew)--omEzm&FVWrtTI@lk`! zP$VtAcd$nq*`n-@>X+z%cY!}TZ8p}b z@cMz)t#3HWMW|0BTqU65TtHbjXi1~Fdp6_H(-R$shlfE~r$bbfRlL5^v>8_aLb0odh-IcXfIr%_q;Efp-+hqeGBj z#+^{{V;Eg8vQjI~YkL&OXXrxxy+!-|AF%r6opVMr1hbZY*OKnNn(A)_U#L?!LGXyA zj8lkZVDqgOF%^~(r_&Z%DhHenWDHMJ8Dc3VG3q=^Wez-bado#LeqDIiSRKA&08Zr1 zp_PM^3K_k1(7sJjGp)5?8nqgiKc#nV6ENcf{1(OPANt)tz+H zK#R#1S~)RFtt=B_|LokjK&wI~aOk}RjD&IA(g?ITkvxca)RH)~gv677 zwxGhiv)gd`VaF9`PBi9TyVvb1DPS>GlB@-q#+fxD^QL)sb92-7-uqD}O;`kTbj?6V zrOIIy!2sJ08%bf*0MEeB2rSq_rV61bBJ(*)W9e|@grv!%2FGnGpC)c@Z)|7pd4nJ0U@Jbm0VZo*)6* zBC-eABASWD-{2IB;cXkokeFEC5YrE*+9FkbRaBgiBq294X#O*h2yw9oVEm5-VJb$a3Z-XTYewdBc67*sw(@BECMSN&$m0zFmYI7E(bbhj zKV_D>P=-3~#kFS>UK0x3WYIP|oi6C!`>RhXuF6&4OxF$Odrx(E7^9S9sN5!XI9y}b z5sh7V!8_!vYr$O$LnyM^24zC6tFtY#n3`J)Mpv|E7GTTf-ig;ZNiJ?Mk7kZx9(|U1 zB4QmXnO&WoF9+5;HS~2@jD(=2qUeef+R{+45a6|fhW@~VVy&V-RgyRni|xg06@$}6 zHBz3>#(tKifZ-TL&`Iy(SheJiz%ys*otWsAN+32->Bg*wp~P5k_m-X!!Y0f59V6^H zAp`Kt^+HDJGB=Tw^EH8zD{-EfBbJDlUB30UNOJht&SAA%Q>DMhiM`5GK2ZuDV%*9K z>>Xq*vsC=AEl|*3%V$>)U`pNIm|8NY3VJmgfwe))-N5SLrkhq$S?Ybtvrswa|Nd4D z2kA}Lj69EcId~vlq-mKFxy-_O;<11g$Cr38UDX6oci~&J=R=4IH{tqiq=i%eL4}4# zJEu{dBT?#qc^*S!krF#LELhLjn_AK;q7qZYn5ygZj=N|=bi58uKt@#~-e4F&k&I`q zIwmtMTJub+1s7Jnv_MKyM+y`XaK1FP4}GV-WTM4pMX(^f%>feq8RT|ch4LWQ{~1bs zl)0E68ko*7CVj<~n>EZb6YN?|3v&fqIwHWC%|?u=5Q>(k9DAIEt?_z^sR{_`Dn;s^ zNV3xY3|eA9@B`*fhEE~bh1Max>1EzLikFZhaB=aYkQ-~&rzz&1>hvDo$hroOfdTY& z7r8sP3XiPv9b{-YXrWY4FfP_^tCSWpxM=@R;rgvB4)eeh`Q?e?0?}T(BKyJ4q`+~w-Ci^(1d=jJsvF9wEWGnVBhc&b_j}IU z5Jtd@4`kx0YHahkH%>cFfoIPiBm#~EOwnXimv-kC5pcW)+#h*F9I!v^bq^IEIN@DN ze3063BwH{-ZdtDip8&QApisDzS-5=N)Gl*~EAiKCF^I$1)d%Iw2tI0GiINJ6gh7K&QEzGT|3)0Qlbo2p7+b4|&@4ysAF z)QT+7Tj@l$_TyT_QFk!Syr5(uSU|o`ZE7c( zXXys>nbbMXNqlc}!{AUiH!PkHv5m06?{jikptqVFw)Vr?7@j?A=t$fwKYCMv$mRVz zp_Hj61qKso!cDme=M3i58-oL)k$%UO2K@7pm?*#KMXyP2Wy+<)- z+jonKYMb>)7Jb}K%>`e_A+)<=IP|~ob0}u(r$d)`TDi-<%@MBYN`V5Sq7V+^;N9P;wzqj_D7{kI4S+x zdcx|0s_64s2IXb_(F>Ea+d@@G>LxFI6SV!BYDc?y<*#2GtyZf6Gpu(wBj8}yS@y?> z!(QVWr|}3>%&5j3ai~0jjPvA|FL@^dg zbY@rpJgl>fb(TGSs3oxd@};8xxo?!%v1uv*;NTt_C`DQDt2JM^w3YzoIDL;~cwklu z#VO-}>S+M*^LhYz83(|=27oxlkxS+<(<#hP&p&+NIKlsvtIIi}kx=ZW$dIF@tvT=Y z8M@Km_0N1at@G<<3;RYjaI!=cPLb2d8tSgYNOTFMvHP>Ohw4J$eRgu5Uq8G#F(D(vrsf{aXv&-_cWE|6!8cVXY56Yu5knLBH#-|GhzP__Y2%$|Ki*ooAlYmAY-2 zn=U=eg33|~&h$A8MbZi&wye?~kf>8yn`d(jg<7l)Bsz*pY|H|c%RfvKclqyp3w}_6 z>y1?(rm?H)>%jWoc3hpIuztxj(R#rOz@=!e&lHRrQwvS(UoTvUe`L{8p8xh@#Jx#@ zHS@pM@9h`n|H1yS_cZ?>f2yXj%C+Ex$b?QC z-pr#gog(mDRM-R0^BX&(7gkBgU;4^TUb?hZ&?>(zpdbmLP7|%KUmLb`=UWwQ%sGT} zBdL|5TdMmfl0bQb`c$OYZrg*D$Ff~BXk5`|3T2|O7=%qI8<}tJU|TU2 zq?aZI8Ul!S=s2G|5qrWPLZ~`#}h=e4oNrUu7gK4o(`7AxI~eP zc=;n{oY0ky?Bi_Vo%TXy6=0iRP$DshJes|BhNfN|1qB1tpAol?pFb@U^meKY~d#r z;7_0e(9rRXS5qI|STvq9P9aCrmDtakO?mS@QViG(0kJjQvqhN3U?)Wmyd21G=?h5` zoK8PvvHI)~Z31xucH~5vfaY7m0R&5VpUzh2t4ulhI1^~+uWYxOH?doyGqCj)m#R~j zFJBzAHeg5UA`XgX2}uL=OI=TQ2nB7npi>0eixe&)PT)8}mIPh{qku}`RLa|*!_Ob` z_iFHK^avlK!p4PlA>M2NC2$;;Q~OC7eNsmMg_O~<{%0J^@9zw7t^T)Pvj21s_n-8? z$9SZ1+qM6n>FW!%)_+i?#A)WKH~r^%csI2Cn=2KL-QT<_Sp5z2R@nUYXUF1i;Dqe` zu?gZ-w&W|df$#!I&zP^(2WgkzDT*0`sLq<(1kZPO>#YAi=4);Lt=k#@?eO{SZEE<> zs{_AfJ)A;}e%=GmdEyK~k%YV~;_(EuZEijHqwbe?gfe;oc7RdD{<>`ab=d?>o~Ta6 z=ri!?T;iQ|$1maVhsG#?hMlh#gh#BfIUw;IIDF0DLRc<=%1j$xp1VnjT zUDb2Weu7=9Q^LaMLk%sf_=2XTC~w7V*gD+X8ab6uzg+Y@*RtcxN-43!5QMpfcxr7Y zpYow8A))5D@3v^>cxlE1&E_V!m)k60FNNL=vY*f@uh=vs+|7Gu2BXkB zjnIpNyjt56b8@QddybnH<~3TeKo@@1mvzg)eE|QeE@EZwmrO zus0~^f5ZOa;7R{`j7Qr4zAM@I-nvX+V`t8wy$q%$e{61O$@ogu#y!ncnS|H0v(52B z_1VtIM{NjHMn4ZJ&p4Rh@NHio$?LJpo@W@mgQ0Ibo1)oXW+c9FObNA}b;?#4?bei6 zH3aT@GhAu8bHrf6to5X1=D3@Y!(Fr2c3u1h+7SAgc< z-R^D*8Px!OW#HZhutvF6*MPx%59Doawn$b?C1<0A?8Wt56IfrX1vtt1Lf7KN<-O;r z(jnyaDenW$#-$HA#yI;fA<=c^hjxTx3JROJYz$tgEOpiyT^D!4AK;iOQ(!eDw;l93 zLYcR>P;Y#zmhO9XrPk)w$MANo{3fvR1WNW~FtSli!7kWQT9P2oZmFY$2CKE5sV_lP z6?yeJ6AU4(g~jcl9Q@*ll;BuO8q(Jz_oq>Y)TAVz2MOE|Y#8dM+VKI65CU zMbw42J+`-C9e4HEh-sV(Wp*ij^ckfHQL>7CSy&`3`i`h*RTlF0$7ax~aNU%fs_Nf? zk7_Bj6$jNqx^Lbo@sg*Ps0ahPm=k%XQV$tc>LIsU)I9T_6OU!xvgXxmfe9t^(#j@Y zKCNv}YunS>wy|V-THBu1wmJ|$7}Aw{2~>zwW5`bkj1eu~3zbK~l_o#unxuCatPYzc9Q2tZn!@BP<%mvX z{CVdTxbm2>T&)S(z?qR<;9d08fu;f>d-0^={Mo%8FC)jd^EijDaS~Ly=ty&DUdMVI z2E^2M%p<&)KP+&|grk}=3>*YP0~$hC^r012^Fe&gHz<(7(WUdnZB-IjN~ zx0lmWGtlm)zJH3co;WLRwTp+tU;b2{)PKyUEdRxdf4>XBy8HhJ{eDsY@9#g!|3`VY zivI|c#91Fc=J`$U^&+5BIRh?2k~0gQL9Q2&{0kcEx59HLb=zEkP z$WZ&Od0kRHs)%cF&C3Mn+OO1P{&=3l<@I0fjPFweShN0j54ywR`hVCxd|Lk>yIf} zb-zk~c5F8W&TZm7nz|Ly9`ie*UbCCu5jCCJ^p2?Cy9bI7X$RPEZc{T+UOlJ-hsA3{ zbE&=gXU?UW$E@p^vhKFug<;8cm;GvZv3S{U4KtQ5`&k?w=&qlGda22}tA3`Qd)2Q% z(%#Pho$qM;b8C-|Laj6NB?*C*IVxcd{=_9?anXJ zRuI?h8$1(1aQ|Rd=hD(y+DPnHVUpfG*Gj;cP-vuNvkBUIHVV9T&l`}y{LlRq?r9IO zX8sTM`@N$6e>i-)|NAJ3O2*93$j4twgX;pPSwd@zFjC>|%lV|h`2^K$q zpwo%pkqP;}A_&$2zDHT~I}HNp#jd+cB*1s+OO&7oj0EUTr42#>E@X2TTLc8$EV|#i zh=J`4QjTTnPz^g6@6VR19Km{^Umh_KpI)HfZaLlS0C0a_)7ar6EeK$d_m zy@1XX`i8{FyF4Q=@A&xm2iy#`5^}>-(3E+o33fopCrJ!sbDEGbOq$?%$&>ZZVv7Gw zo|68roZ~yrWr@y}bNAskJA!rkf4^6V|Jd*K2T%8Z9_3N`zft`;Faaj4x8hf%f1BbZO4sLpE8Ut2cmY-4$1%3P&bQzs%Y-~o+mE~_d185O!iRAz zRS=k*nol;|;}@MJO4kVFg)QRSwx!kTHKAlKmq_m#iUZTLZ(4h>)6+6?P1$J6B~l4s z$*|h_7My9^)uBd~kkwCUr4N0z)fLS%zVdpnPe?cEdI4shVK=vi7ku(__+_WjP!F6j z)%DbpZpKpm@`q2C*s24{ukFIdQ?3|A4Z3~^T}Neo8Ri|u)L+$Lypxc2%8Xgb&o#!l@uw{oz%! zC=&tzZhKy};b~R5)kPX?ce~Lr0Vy^ejj8~WUxMLn*TShHW^K6H(r9Q1oo~TQ#1Wkf znJ#atsoc-rIqCnEcdGN_QpHBg$k=h5Fsg1dn^<^T1(4^Wp-p&F-T8JuNE}^wdT(*H z2cFLe<8JI=4PCrum1lfAYDXa}w=>9R40LxL?$q3>`eNzP6nHdkXLc(N(l(t7Ys352 z%>^g8?;Yks)!)Ch9`vvJY^eWh{o-~90_*&L4iAS#{lC|J(*GajvFCrDihyGj!GgLh zgMKnZYYzhJG-5H$b;^7Dy@BV_n9%eLhUV*;_}Hc>BMfswSK#Z{QB6S(r{L??rh<9C zND>wFsbG!t>twc=G-#t}K`~zmeH(q20g~t-is#aZ=YCRtw~nuEJ1~wa zY*RI|Q_S;i+@|HegA5G^o0h(?KEpXn+I^im6fj%35$I4tc&E+Stb^k#%Am4?FUIP# ze)py3j!hXGYpRvEIb6H#mTt>R>)L4jzvGpFHS2$`cUZ{(-tX=o4xiTl$9U}e|1Lx6 z$Md%!qDZg}h6&SV7G_s}74mzF)xTsEYCXbCzU^fM>i|)A2H0{Z`~BTZsNM7X#3)@? zP-0}wn&rbNt}9v_h;I#1lYZ?I{Iuo!ojn`Lf3;9Qoc!M}?*F=j-qZb$M|rIL*XHaU ziYADnG{Wf=Ofk=uo87`D5a5&(=Kw{S&9^w+30vGBV};mS*Ha5&Ad$ls+MuJU76FdtdTncgYqYZZsxoh8ArKl3$Y_%q+unEm`>n;8B48otSI zYnvYc5zOEiCzxa7Fa_h-cuBRu+gF!YCokWey=`n^A9R9I{t>N%mV55YHt5ph;VpxL zfnge}2o;?%PCINS|87O{AC@4L0h~^7iur0i()VnndBA7A{I{LD^<|JX^1pj{P?GE)^(&lT!d^^Fct0!;e|IS;@BghN4($KUw>A5J zzt|@Gf4{~Z_y1dL>Ya7&kGQF~EOB3(dY2v#zo}p2bz_m)*ylzqS8cH}zvv(yc6>`z;4AH((^cSn2w_MecN^T76>oHkqE__N#c z>brhrVrAA>*fC)oqsm4 z|L^xp`@e4g>Hf!~JhlEmih1wJ@h3RxTJrEs8~E;E*L%_zZ~0Ws|7DhTu4FFB2ao^Q z>-M|F_>cX=?$i8#jHgQf)2T=wQ}vVSNFA+jn>43iY%0no$xx~?o8CGxY7PQ~6%^ap z4W?+ifb>pzSY0521{)h`9Lp>ReJsFmSs_NK$2gp5XO| z3sy3RxBSFhVtR-jzi#^xH~hA@TkrST9RvHAzOwrc=JT}H{Jx%zT@E!e{rj^F0Z#eZL1y?OWY z!|PXDoEi)2{V@-W1^?XFS+SPB10AR-n81`>}T{eT| z+F-ZX$9p0EFhKlaf%?7MP`{c>2?aYL^o-bDFhu2a->ol~LB?(fjTL23y8ND!x$;#| zdYn!Y3f5=lEZAg?jCYVP`$ITh53Zk1ZqR768Kfv~+k%FS3K{jahEpAbhc`ynOj2^b z5SosuxrwubD4XCVN)cn{l#FFV-iuBB9a?Kzc}Q=Hjr6~VjsMXd_WC9N@2B{`kMlf0 z{Ey<^vGq{dL7%(gW>e4Z=T)BFAJ5-joqV|baik)u7nYSxMDAwd_E#_-4p18XKHQw@ z=D)Q|-_ZiNcK#2`{=ZNDKacZN+5dhvV}CCeKrJ%r<%V+%61MK;INi~{XH9k`_s9Y! zo~>{90W5q@pEthKb+6;U;rzdo1!%4PrFWhkAz?|-_uIy?V3D6vx+eu4IXew)>Xv>O&^ zw=q@LGxHz9l!JKWC@(kD?!TB(XN#w#|LJi5_i^vvJnQ^F4)+fV{(pzv{?q>NQJ&iT zudtB)6(+_B{|(IUHTSDYGEoR0pvCB9kt8NR$a))et9Ym34a`jK9F$Y4lw-E-Ut-90 zB%Kkz9nN#%UdeaAx65}T{FYzT#_MZH|ALZFf{=d>J0W42cF9HjO)2YfAetPoy z75L%9*?RF`=DFM>yl_^FW%G{A#-Cr6YAdm`pmJh@kc4VpAF+0n;&zlqlQt%uWv{7a zmR5~VIET?pY&c&c8UGEFG$6(B=avv;#WdvdrOhU5Qo1T}Hv-?tud*j!zkc&uT!5~g z|0dJe-7kRD&;MSpU-bX#4G;F8{C^+i*;@ZQ(~09ALi@8R#_mJ+)4;aW{M@{Fch>ug zN%npRTAxdmvd-sz-9Y1W5PY6dJco33p>zF>UVy1{24YeGmJVEOf*Mu5aLn=?E;xCO z)9ZT%tHWJi^N zBc@I$WXY?qH!te@* z>{ozFZF(YGv}lz$^E!a&3(vN@2jo2dPdSxKWs9^cVb{D~j1f%{M=YXo6YTmp<>x0G zqGM6HYs2}j*xw-+hH+jsg2iE(2S;SSdeo_2{ygdDtV-MrEl*0pQ?1nFiIb?iTor&8 zkSV3}FsBX>TUn=_&KU{FFm^l>)OzkyJ0MP6nVQ375lql2GRZ6fC}o=|h&T8D3)_e$ zPgKHbA+VeHbA)6@>ri94@#H;PVliQZQWsA^J4dGyMM(muoFztBum(od{-BE_Kbq4c zundr2jac5g%oH9Ngc;{qKCChuxEsvYIdoQ;!ky8xcP;IHD5Ryf$~7{r^9Qt4Kij#- z6s4^FK`dTap#x61h#}30Am|Tibunjbjg2alcLzi02Pt4bGNMI>3Ob)(wB-gbk{<)mB()i?BeYt=9MN z@mzhLXUk|iQ}z9rb~TigaIk}Z372fPngt`7LAGplG+%0)ED|B_jWwwd>Zv1zR>Q?| zXkxpkc4|SEEBYCPw{fO9mrjJ*wkhHer(2%tJ6+WE&Gu-9l6jlWI>w!=l}QKV<_KIP zl!X#4+egE_7)6M&HzY;Q09X2iz=fNlS#%pp;;0f*qiY-Hyy?=F@hX zkTFb};JIrdaacw=;%{E?>JG{x}Rf2^~dgRt#6^`$O;X>CBt0}xdl;PTolckSomJIK$cXDFE+O1 zjz`~iMhPboN&KPM1FN%%7CNTaE zCNPZRY;w_2g`G8nf zmDNhEtrEFZf85=*oiwkUE|^!&njf}-geHV?m`G9Odb(TnSuB9NT1q7-;)ISuvQ2%e zm?i#aElsNLcT`CgcZ90-Slim`dbPId)Mbq(P^px^N@L||aNlZqi8O36X2@Jdg;r$R zJNH`IEK7IG-bU7JDQ)WHjcPh1b8=yF)O8QPs^?Jni29yR$JW|^uGALoE>@s*_doZG z`9FJyhlAmh{pT?rY5#eT_=2W7*^=CHO4e02ADzR&xBF~t%PH>g9rJ~rFz0ecjb13L zYW_Vu58K{6Y}HM~g4ex`%i}k!rdzcqensYoF4##>>ciS~r>P8Rv15!fZ;28!(o$v+ z6y!B#sQ+#LmHlt?|1_-wgpiEYF0vFcAwrZ}MT$btEB!lV z`7n&ax8hc)P}(PHh3lC?zT|D0lk^4HQLB$Cw5$9KD`D1csoc0wa_J0T!|?_qk{9^Q zmUMMP`|?GwT#=Av0i=5^rGo?6oeVGP>X=5%<%TkS+&QzOML@Zjisaz-$kP)G2;Bls z4SVU`yPONfnc#dc2ucrZ;PooL<%<&JU^;zC<`|dYUVs-Z}at6`&CQP zX4Nj+3sh$jbH}YLJ-P2KQ)-M=2CV}&Kby5w6}VImr?Cze$JSwrg47KFd0r9)6_Y8m zVY@t$7y_&vuuFhjtyW|E;4lhk!Ix>9Gux627bQueO)V6r@kx@+;M>I<9Jr1)28n|4 z)U%sfUw=hs&rQd-{1mLFYXrkT|Mjke|!C6{D;GSfB#AUe~c%j|0Bx1;O)lS#a^Y^*xAKO z6F(dlqWnja#9pLh$B(C~uhrF|LfyC=KP0Zv_wFN)6N9yEw5kzJi!s<2wV4O(K%l*{t}_=lw>Q%YL>5R#(!2}Az;1Bq{i12-yJDI z)4@)#nO*xsi&0L|b(B(z*7l@w7Q5dat!_!0EvB-aq5!7=e?HB>vRb<393S$~w=aFa z_B=qN+YZ>V&aXxCwH>lKYRK-|dE@qSLdo1_2#{)BZO_*9=($EoGRN%^&o?>sw6V>3 z?H7IQH>~SABbP9?v(oUKtloAhS(a(Kke){Dk$t859bjV>)|C|DW!# zUyA=e+<%Jy`zVjhv308MX}MP^)J+WlBTAfLpOuM!98S3*^g1ChZnF&O3)~x-TnmQh zwc&ha94%4t`iQlcJuir_$)h2g{0G4)XzqdLEnrvJPB*2&mfimi#AMz4_o8XtK>)1v z|Lb>4{(rrv{9ljqs2qDqLTr)?pS zR3vfVzRl2liRdYrXENg7zxUd`<7U7bx0a%9Ka_*UV2n8Qnhb6=mB62&=-Lv4an;^x zJ96aFMO%fl-p#t?#pTVeqSKdzbGiMxP@|pN2l7DKh_{#74esATmN#N#+D`wiK0!aHL%Zz-Nr#xBV#`DsN z7Fw=S6s>^k8$~a6T zVGkcP*f7Yi?{wvmb@c1u-!^5KfKOA(Q{68M$k#g$Q=M3r`+wv+0nW*qBf(hwX%*uZ0XBY7BHkZ`ABs+?KdBzEFr78J&G-uf?k$B zfAItMR0D=+PEv*{;L5KTXlt;HLyjhkL;?;$zR(3iuv<0PYB_*l2@@QHVw*dEWxLHP zj6zbma)B1(+EhIG|3I@X|7-8RG{NMTI9<2o{Sv47EX}1rTS$S8CW0#x)xDd$NeH9= z)#?8X@x|S~*%fPpt+!3L`=jMK88#qm!EI65>6j3qrGQ#+jBKAuHGRW8sp)r&9#}SHATn9Tw z8A@Z6Mp)iVF<{y_{fD%s)U`@cjM<$Uln^#*YYr)f@%T=yX&9TeN75;|YkLYtvAril z(I4=slm8|F=)>Co`}^I)V*Hok!Qqqr|4|;P-QG#OhxMLiDF&~zNzkCYovenKr$mai z>t$`N1w%AYWrxf$&v*Q)W-$Q%T=Y85YtI*qOG=2{@eRcs6|r)g^FUdj&^Bo1S8EJ5 zUP~d(vmxPhz6G)%$VhyWJCnS|jH>`*{(D9G{JO0B?In)54XKlt(n*Evea%uc4#3>a zH2_*|oYWvYmGT?81}B)NMABAvEZlOig%BooJpJ+>sdbyX6?9dHC>}}Gs}eQU>x~HM z>@AWUeibbpz#Ee>f#Wh2OU)L+*U-?Z44UQ$&nII7$3ZIQHG@nV{OnUVSY%sD!%bMX zx~0uXpVtpFau}bwb~hapSi#>uMr#JB$nC{1Rm1WyydQ+W?Ko^Y6M~J^3YEYt@S4@M zR#B{SnUW`g$muK-mZ)Shn!;)#BU+~EmvUx6%+b6e(T!}QYytLSeQXWym)u4*2!~q6YeAB8ty58EdcDWJMSJ^+eXL!y$;Xq-o_!QE1F6zh&HQ(2+_eD5*`wPmebA z8!Sx<%vwz>2=f+W?PY-|qU$YJrBPn9H0c2jsb^jb8w{;Cu-XALA5IgQ%w4Q-I=$6m zZsS;`5cH zqr7yC6EsCJkU{M*Ux}Rp`pm)245h93BU!z}a#j0O)owe0OQ)*=J-1rk6d}u) zz8ZA1=tjRmZJE92+<=%Mvt4DTm1qlq@m^I05qPa;75t zn0vbZ5;Vb|QLHPBUI4LNfP>+Y({IUKQ@=$1HAc%Hs=iILMfsb-I$LltY_x?^j;I)B zrw6(@oCbSPG13`{FA9Slph~!7FK!E^z`Z9~Cf>+IiK0_eI}`yR+c9!pFhqSbbfDJ- z{VwR2(+=DoMR{rdhw~5XW|}D$;sA}`U;ujE!%EyDG9Tkqc?K!#FiesP-Zsm=%gt<& z#w)RIlDEsYo(z@Nak_N!R|UinP-IYx9aM$hl4M(w9IH0 zC1^PebiKamPQ@xsGZ&MdnyFuVf~SC`2g3-vA`toB7ac_r>8<3Ymuokip1=W3F&&#Z zoQma4H|2L@%a&jqH!YO%t~NBwOV(^7n0PVMDf$H%Z)iNv5_JCYv>8MdG`aK!Z)VG= z%paBTemq|TPH^fuWBVu+>?{R1rlX0uE`qcI8ylx=LBYyrZMj%xoi)eFlpS%E14za zjlkN^Gg#KiW!I|Cs#`?`T@|-B3jNbx5^Jw(?x;7OtwKX7U3zr3`-LuPi-W?w`dZW1 zuZ@-tZ(bmA0{}dSQyu?7_Z%h}PSKfo-=-)d40A$P;Oo~>MIjDt{%&tbbk>bUdcr<1 zL`R@2U*rc8Beji^Z>tU(+%m4pX41S0718_+Knt9_e%%0oA|?~1+f35Z5@wLMUtOEd zhWV)l+rl(fO}0R@GsbC$&6?(SE3$v0Xhy&{C!ReeB9x+tixGEaYrFl;zkT^q&iex6 zSbSb)COO;pI6;>0WU^wyRX&(N6@9S}Gg-U|WM1WHMs8BjdJhhUN27z`5$G(lv}0QM zHxSL{Bo^PN|L?~C27dh&s6MGO6NpVR%Vn18DA9ZJ*7=Go#K5PbpKrgvSPsC+>1+1? z$xbR#s*reM243xf=d( zmyS(-W{a`^QNPFmlu87!f6`v7p0)a)jsbw^?e78A>wmr8!LShjtKZ!pJjH)}l;?}O zBX}wFI*3zXhud5Mi~&xIH`|?yg4KGQ0C#GjDJ{+s4D0g;$?2QxCB+KzOCBA|uW`Oe zl5>*aXyxfN@>@HzAM=IXQw;Rt9$4wMWHNS4CY3hZw2*wFHBa(*sVTpFsZlW2ZNZHh z(x8bxa|%!BlzHYzs9wlg;_sm9BMbRwVz=zmoqFWqly~R1N6h}<+~*+9HPbL2h1VyXJ7|QI=yF=zeNln!rZjKleQ_QZp&c`?Tw~;eC+XHu| zX8^o2vqLsClrBe}B69xW?4_Q8(roRIn;wR?DCI{4%prWZc=i73&Oq)A;LXX!PwPR* zVzn@?E?!;U5zhG!HNC0Xm{)-N;r+W0=XDgm1<3n=781P0GX#oY{4Pya?+M{TZD%XS z(cF{Dr7B`O{FbDm3MeV-7sIRfuTEZGy?gumzpviEdsi5%X0I7`SJavHcgk*0r6%5f zJbQU|a`o}-;_SQEudZIc`gnHw>Y~ujlHfRR$`P&wC@h$FN6UGOG-J6L2BPGsI1rjiRW`?;(CR&!xa4); zkDRfw?c_c3V5pf{?4y26qQ$DZ0`*{3cjD-Zkx7nRK-_)54so~awupOm*CSpOirAz53=rf6PC&4q$>rcAB=9f2FTz2w`2ROR`p+JN3?n8$vYo4oEnk+*R zo~&ep9R*@SC2 zv{k{Sek*Ia(sP?UoQi?; z&rc^rbyAcppTUULy8%2uru?HhwQI^aw$jnJq~iW+kJV&R*A*)VWW8$hR~5%W;j^RX zw?8!ceHx$F+J9$+@eJ~4_E7fUZtvirc>dqrf6D**IL{-W|6jg)`ECSalpu~kOrmQ< zK}6;mVMx7|p;Xfd0sLQL>j2D|7QlQH=K;&DzQNhP{>_iNIbEQw&X0EhTd{~IpmhT# ztc_E`@nqGW!_QX>hUnFe=oVrx4*G-s(UCpoY$8et1q^X{%B-t3cftStziUC7d=Tu# zL9f3dM19u!8FU1#I}1i-m(&oq%n%n~B_z5Qu>4XLAa4&YxIVVLBTyIVhN~Kg53L2G zE%PBzFIY#s{C$di?^!GVGZNo50^pkSzwV%0jQ@Jr+aEs3|HpXL`CsF5Cc~pC$%>^E zu0H>3H#Rx|%t-9U|MQG?_LS~I>f}9{VbKi5iv&>v%X_go9QS_1*RKud=XNm6#@hT{Tid-` zoU;5l$o}vaaIc8JF|Fu@1LrhZFplW=m@@t|=CdDF$-=&~qC#24_p>_0sZK1~CMw}_ z;EUu)p>xsDSB4-J3%o``y$v4fmfMol&_C{e2pGm#mUUi?z~BCUk4?GV7y6d^wS6Pb zpUSD~!rVnpb(+}Rep39r!MWv>!U&xsilwX|X)G%_C4MLssNjDgey!Vt-F(*V)JqPt z6{4pOhNCxcTDv;JHs-g4k_WQBJqR0{x(0-h3nrlc89P%ul%Vj@yO(@G+-?8!@>lO} zsAs%1_pGmV68USiVl~bD3Kl8;1^fyapAib^ncrSWjx!dqHva&GvLO(~2~ zkQ)~2TLm|izuuA?%7E^|4P|J*88?(s$+;nb=GNR$f^kc3u=B_j#f6#geY*9u_n_Qu z&U>JK!wK)<;m&p+!COpq7r?rajY>;s&FWWhRjgPwd=I)fmfIv)wKfC`RP%{;to8=D zeg7j^>rYUJc|MTA&)W}Y2+U^Fb;FaA;vtECo9n@OI~(s|P7(~6QbwJhci;P^Bt|w_ z?ANai_xIhQ!-?F~%eia*zB^P-GLn$#>LQ~E#-}7@oI9Yqx_CJK-QiA91e>4Uk?xZPx)UT<&oz<=Q93?HTao4hn~T219P7|<#yr< z+DJx;AKoc^zrB!q(%yaYQ%3sBWv1h>=m;t`OQ9_3t%9Y(3Wmx9q65+CcdB-)YTc|- zC{^k}^jXyI(Ep#kcWrOm#u`QY*}no?>FkMTTQVu?>UTPOJ9e7-Oq%%EPI}(y^l2ax zk}#$SmVoSNnx5ajAKXX~BqWh`(sZ8aLt=^G!dkej8`fIjHmW>8)8T(cNiIe7*99F0 zv4V=P^CB_!0F@Ifi~yEji)a|Lu*=g*M1AqlI5jWdwD)?Q$pbwKA|mtb1KvQAXuv5>{be1Pk{+LCgprVxO?wf_ zi+(YlcD}p0x$KB|-Rkexbq{XNM0*(pqJBLAH)ofXXqDnAN4$zqwS0~nXi02Y0?hUI zuKmB8|BE<~2MK^(`TwJF-{$|L;g|cLKFLS&e=)~E=2BsjfS4?BxF6S7VM2MneVXAF z%r?q@s_j&p*;mwe^`NI-7nfezFm=_fPSKsX@M_-F&;c<9ayNSORqkFSS<-OK|>*UumD&ZiSyi($j|6M9yASc#j zf3i_Ux?0_tz3IoDj-gI_pz@+RXA+C4lrE>bl!eypE1=~wnxe2SO0-{+u~sf!5$kC! zfzrgAa^6NsxAGOZ9xMI(`ypmZl_}Fke24$P)}-l%f~>dGm3!Pmv>Ur9D2GNZrxJSP(^G2jL%UF zH~BG^F^zm1_i7q}?Zc|UbCq+Qp_^rf=#s=y6}H`CPrwYX5Lq)P%H`*K0!_=Oc{a?_ z<9djD+7b1CK92m~ssEXgQ!TZ?9r|BC@P>B%CvPJL;eqj+psIF0Y&hJrLhbCdy?fO2y@&l71VV)^Y~Hk#jT>#}QmOu9A_uh|l1 z_n0Ce(O^W(_T}3%>8iK7wJGFnUf-cC!%=M^0g)yzoCvO$gsM{Y%NX?K8r`3$yx3!p zS#kDvSS?PF*ylBAs?2|1%E} z&wDH%QfU8}wYNYAtx~o*$60xQ>0e9bSIe5732KERysmf(i^IGeTt~L-)M(G!d!YE= z=p|lZ`&6&Cle}?VKjN!ydt#AWdH0b8{`#X0D?Oh;|Nqxcq&e>Ycz}fJa>=o#CyP}R{u96>W_a`QTZ1MX6>wi z#_>OW-y3|X|NconHTmBtq3aA$kdlbXJ*`#%$k)XNEa4pj5JV`38x#RPi0%aKElD26 zL9Vt3bb}hDUp?ybcZ*c+j*-2i7ps-bUC!k$HIm8Pow~Y#-=AJxoSr}X`McNGr4nrA zLPOh22&ulp3`NvEy?%Z3^X2LF^$)MF&Ob)?dNeaaST}`~-jghH zWwn1!RoB6fof)Ld&JpNzQP}y(D0Rxw_?tp$oiH5d=&d&Nml#GXoPh3{lMK4c&ey-1 zbNpKebW`KE(hU680Vz%v;Ga3f|M@>311M#Xt?7T|P$L3pj8F>t`nQNAsIIc@#rzdv zml>icVRiDQb^MQm|Nl$GBR7`;JNW-_=-d7ufBfbCk5BWd;s3gB4+RipFp0EsP-#}u)(IX;a{q%a}f%&;Ea-+Gr1*x*ZtF7r^wwB z%6vzG=l~rjvqQ3Uy9Y4EZ#f|(IRSV6!7b)2Mkb*jtPq0{WRUX~d5gFa+G4o?^ey8x zY^;VE3#y`7nxQ*P)-q0(klS?%I(L2tbR+^6eKdt(L8JiG(OdrOXm$xHRS{D9N6wVW zKTC47l_XIOM7vXA zM>NB+1gF&Bp1>+NYK~i~P*w~f-$Ejp>(zP%hF<;9)HbT6Rs$9zgOadZD$Pw;(Ocb{ zB{93sVl@_dxXmx|$?@@@?oR%6_kaF$*Hyio1c5gaN3Qk;Q~$rAD3b-<6w>9r>UirM zGB|@20X_c}D%V+@5K5b2`M)WRS0qB;sFFgT9BZNNr6gmVky)q4$9yf`vU8&vlw*5s^lOVEyxyq@Rk25`r$jb zrk_1FZOhIaggttPAz7s{VyN8L@5u6-q0cvE8TF6Ft_-}|np>aUXCM1dmelxo{=ea{ z8vi%`lK=5ZKKuFqOP&8uHK_Cd$w%A#e`>LA_y3uVw)y{Fzk2cdq5ePF zR}=rA>h=8e=JeU=^>ef5T4Lq@Ij@q${AW7xWVy#^*2~t(nFRFopPdvZi+^?wJK%#H zZqV%tXTjIMnltzt=ypZ?dw=ZtW8o4*pCS3mhW7qH38LQrS0h}qf< z!D;0GbK&^${C{=S?(qLP344(LPk}8Ngz6_DOv@Ibsg>++5tiTD%L!O@0q%k5|E4tl zhGlE?dtl6B+5%%1)87YUmoLynx^5*rPVWsJo0{>r_rD4XngZU(S*PqL4XUlP&I0o= zXPugjhR!;3EL!xjx3lhn{kWWUd(3dl-dx_gNAI!TUH5x)=w>uHe0Gn|R{j%Rc8~hm z!~WB?eOo&KclrPNql*78@W0gm`Xryd{C`Dt=f`mYR;ooew(<%H9Z>Zk8t`kJh{e+_ ze#D~Dc2}a^uJ9&)_6|7ZXzSEoJJS(osK)0(8+wIWWclYwXbrVtvE7Kr8Z_Mk$ z9rqn|ci`jiK+8@i+*WS>IG)0NAi6xC)}YrfmB$;fJ)Db%ab{4~(#2Q@EHy#pOrim( zhCW7ndfN50ucz^GdUN?3`I`8MUAml(AE(=T&*Nvu{9Dr{#6vxCe^k;Oj@FOL#lHAl z|3IHT?Eef!xV`beNBwW#4{ZPM!2eSJ@soT$FZ*9CwTGDg0zj?RFG2ra2EXY2;WmE( zW{24y%`Sw|dh$(vKSIarSc4({HNr+8$vGgvZZqJ^4R#pWRcLL@>Y6UMnaexuT>;Hh z3FHr>U_32p1I94#&;jxZYahJ8dw1=J$FZBX0^7q<5$`K7E$tIIqRs3H1MSA}_q8G( z(ud1-*fpW8I&xVI4LbXx)cps2YW2T0!!bSnS=|+fA9(%C&hwv9zjFWA;LH6lpXMX# zf8XKNiL3#KW5gNxH!D6Y;S!z5Vvyn{tAi`V)>#4|pk&TKLLzjkZx$3vow(2Opytkf zV^)%O@;T$1y#qROw|tZt zG;ab>b=6hjO3|lT5OP1R(K7%Vg#vY%L$O|(K$UNlpw`@@R>uKT66x_j=6@#)H=mD` zL>4~`$tooYN?1M@=snBe_k7X5)P|-~@$4s}dL~2fSzf1jk9jgs$PMlsiING~0lnfu z-nN2-@rt175L6Lu&zg%-=bKt@JYj;D@665Fw(L?CXRQ?Om9~3tRT^G3iid_h?|Yz9 zu{f`Gyh_=|7_>vXX|8Rk9b2yjLTTzj%Sch1H7x@&Pb%Ew0GUTNal2LLEiIyn zmh?u>#S+rLqfHK~c(>YXxzkEZ!{V)(!UE2gDKr{=%o$Y6|D1%kC<7w#16-j6rYzg2 z<3k_>Gk6-IG(#a|C^`Xaia>dio}HgQGgT55R4ADtb?>@Zf&bvhB|kaf8>7F zKP>j0ZY00&vk6OBJ>m!=t{p(e=TNy)U~yJWw+vHdY#)8FOyz#}0M+30dkg;^@?UA` zA6x!=!@$1(eKZ_@ssHjxJ`Lpm-*Y1ZPzIBT8{Kk=IG4U!LAtq7?#mfKQOh}$UB!st zp(FtjN@KE-7wu|EXPT2DP=(%wXECI;vRE&nkT)mjR&n zUqGkZDL1NIL#*)m26X<}`Ddq7z2;9tx;{I7`Mmp&Z?7$g!0?fkAr`S9_Ten zi_}R=LGSK2YWmF0toLV2m@$T$w!K=n9@O1<4lveG z9l9G*u_u6gPd&yCux}|YGl0_CZMoWO+=UNTIJU`umd4WLdY}fdOaC8vV>|vQ7=F?J zKgp+&{O1NNmDl2}k-Vvv+rSVfg-PB!ctha=oz!Uq#e$N?aG?;0pX*ft@zdVMcC`zO zp>XmpDBpD%P8J;%pkbfHur$_B^pOj2io4>Kr#*eXBWrOS*1!E3#ZGS9|MxIUaI$!? z2Vlqk_q||X?|*+d{IdT)#izmk|3NMX0B2;)l=6r}4kB^jfDE>RoHwCqrcL- zHu6|#>W{G~_l(}TbCX7KjlFFm&6f0GO^4*v50A3OnXVJ7n7F3z9RgI=1E zf1!{a^l*gWv231^e;xGhXhV``*wG?EH^@ z@FoA_(|n$Qvn5OxC?<=)&a%H9931==ir9p2l(yBK_WYhd==|-k$MA0lPo6vhKb9W+ z^i*pj3(S`5nb1R6wnifDmmb43r6TAKX6V>_GwAhtB}j+hY2WMjyI#=kj}8xbUmQEW zV-NnKQj0+(PmE=batsoZbXV|SBvZ}5#qW7zmTfpYo8$MO6X8fGgmbR=q4%lO<~rRD zz)6Hd$VdjB{`jQd9}oAU1yj04^q99lJUnm>Sl}A4p!IiSVEQ4oaN3OI;q>sZ{c4{&#$-PvYKCM|9+Ig! zBAzwxKS0dDoMZqem`UpUqh{3iNA3xqIB1)+rEOHEZBk2HJBAIT2&}VM=z?U;z%Ma? z6i~840H!I32%>_C$M_ZjJy=1*-4Sfr9V5qJ?KdAagEcG<*2owve_R=?ImtpD93~59 zfDC2ww84e)(1G%PVyp(`K^f)Yc9i$o&Hi-1#ipmopHBAK%?ft2z2Z-|>=l=O(^|c; zv>Q{o@rUikvY~$BZ_`g)>Pai@gdxhhK`*eGU+@S-dkq(m#}|<7=$wR9^Ok2gi=M#@ zajpWzp+$ygYp(in{ySSQL~q_?KT)WA^CsS*#nUsiB6kS9BiTD?MiXt+!fdf#p+xd7 zf7EdCj zYo9;6dVc!%i&rmz^qhe2`K}lG3QF#}cQB)XtQo}-0%XpA0~ASrz8Hu-b?$s1e6M~W zB;GY6As@6J3d7cvkhYBlH?wd40cHp%3vjQFJLH*7#O)fT*6>B6*dt~XX_`_wR$eo?=XnmfCkbUN%PQJA0f#y6f(XjBzpj&n485q1l^eRMy4dofC)it&~Wkt_vDXUlRs)b`9sq_l8{Vd{feFtMF6fDiE(nvsU|7s z{)_;eEHXr?q`BY7k;U6PX&%;EG4ercnu8L}L&K2icl}l_9)B`z#L#*BEi^lX->|jt z8(P9|Xb8W4*Kh3TkTj1Q>A$@F7MdMGY}i_e4K2ntED15Moe-Oh8Y#WJ{T7-X%xl=1 zc?~V*H7qf&c6N?G88y;ydHa1G9{yz5aNi8K?HdPw9Jc0<1JmUtA(`XZ_(Vt2JZQLv z2Ghe@Mw|%gieU_JLKvQJl>H(Hwwd6W4BdifQ0tbH4_XgwS?~-D&s^Wo#+wan(2yYo zZiX~)37$b~!85P~&%h8oemC$N)2tqd2rEHQGmq6UVD@>`xZ`Qu5mT`-<(+XW60HE1oO29}5#7$VB=_H8>{ z*;!zPDTB92gc9O}G8o6g;8>@N3`R&EHx&VZPI??7V$fPd1eS;x7$TxXkHNV$(wqQI z3{6pp=QtFUob4hcaIxf|HA@aGmK+!?**6TIW{a_*@jKpP{01(T9JFT1fyI)85=-tk zXUT%*VKW1FJaiklfr||Xt=Vv3vEiV^hW%+fnga9F8_E(0<70?0eWujrtjKx{nneVZ*97MdDB(KQ08C98@}MzDG(Ltx-eVh z!MTd)h6~4YFPy$>v-DeUmcF%F`sK~iw-`V~LV18H63|J;V9d3cIbN)wJdzSOQey^E zm{BAWviKU4ZNz|#_6%av12Xd6?zX;bC-qzJB)>8sUj2X=JL%@;zmLH6&H2SEF$5Qv z-@+B<3!}6S8ty62eVkB#{wN=`B-=A1izFnQ>{?X3+Nd4*pfxIG4b?LOcl@@_ztN>QJLHu;6 z#-JJd9gW@W*K;YiUTfvnv*fl{Qf|Fz%_(n87Q*V1$*!ElQ9}|(+embXRj;*J^(?XK zmBgyo&S@|jG^Ba3jb?{b^;%0+&k`bDNvgJV7mk|6@9_3pXm&`D*0CGYUVm)StRx5* zAKm`6PH<`g$yEe+1TvJ6J3bBqI>WOV9jQ`{y3~^#iGD-I)^{>Cj&|)x@CU6&q9jW> zBy%L%86YFSp#bxp0*oW*qPeBep7#1fi{_C@bIV=sHJoQ}y!T1Yu;B^l(0u~RiFb`> zONC(C>kq8)9Gc_VP9YdJRDyG*4_PlAMPTl>=cheGNtZ(A&bMeV0n-w^r$VOQrKo zmCm!-G|M)stOx`Yi94%Mq1`SrvQEVW<`?g70LvgwoCLY_HNUmK=3DxjKdL3jJ$ZcA z29su+ZZO%l>0Cc)Jwg78rzz_Q4ZNM60)-PeE=BmWM#VU+YN=0E3zU&su zQ0A#6rqC zU2DzGQtYNS8s*7p&VD{VOMFD`;TUw60@_OdS{*duX2RIhun&m&Vyz;j{#L zp>F!!!0G*Y3@+;+(50NU*3B%{Y-kYJx6eIbd=EENMOZ?vNy8OV$!scxhs;5UGS;Q) z5*L!_L6Jkz?9h4O&heN!PQs>b55lHB%k4EVhr%{3WXQDACbR(<-1QZ*Jdzj7HAhtoPl;z$C=f%?UB{g7A^f+0@Z{lhHh7o1`8w-ERzUjC^GWz zB=yZS?O>ZD)~R%~rQY&L`6l&F=ZrnQ&7vIwck<-aaa1*Jdr~#Ar`M|`P@hv>tkM{X zm>1!Up?Hr$d}$b|t= zE3eeeBkL36WC3sjD9Y||Xk41+prC&8CT%CrO7)$TC$E|Sm}4KVDI=@m98q2&!^MQ6 zg!a_*HDpX;WXV*%vs$+X9-2hio%HK{uQ^G*>m`xgosRm0M7XS)L}Mh<;y)K;Gw zmG!AnS)a0(22PaLlxAecZMqn4#0W6FLS!uu?nt~|p)iJcmDm24 zWnJ#VKP#5gFdsi~=i|H5@mpu(56edQsKkklaWL4ewpaA=Rtz^Tvt{TosfTS%>S5WW z9+ph%nlyUh^#$t`h#PM5x|e>?(3A{>Dd}404Ndewn&>&EtRmv-$FlzXXxKJJcUTs} z!`{do%i0)ec`SdLrjqW4sQ`gH6=3KPrNg$O)G9JDEQwNgSgJL#Uc*)5ZCNG#W@Ywx zd)s#_BO~O^Ny2#|+sbTImD7ilg=>iGrF`q67FJD*VM)pxr>VIXPl;fks(cYz%}@qX zLfIli^p_Z9gfNgoO7BS)xoD^t4wA@_49h`aKsTc=Y8RxHzC$9SAZk)D3# zcHnf%ikL46jGn<5CLzkeDIXU_elr!Y@Ai}iuE3_CbzoCq1vUj{V3XhV_VgF_N6j3f z{gKll8o0upf|lV<;?1!|i(zW zLM1s7g(Ey2;uhfrqKuEwXdH~^gOMDKh9{8ya!kec%%^_Pa7zW-wp6{29khLk>Hq_RZ3L37bVB31C*K&i0#%6gIp#zgpyCD6VqTF-KrDf@&R-vuSz(Pa&71F~9 zB_s)um#vBsYM5@@cc&R_){w35GtBA4i$IbSeKi(3<sV`3m4(J!4?qJ4widq)ZqG1_=s~9H;L^H6?VhZ5G8PXj% zBBFw}5m8n!eqcmIDJtsGaA}dPl}Jm69M=wJzU8#bz>sF^ELJHVI^EN6nE2|u6JG;| zCp2j53AM^;1wB(?bf@pQi{kkWJ^sGiTaNFChD%_! zl$U*bQoMc8aMdYlU8cyYQq(U`%D{<6{iL)m9AwoE>X#?QjYj>Xv@h3VkA}Ao8uizg zOxj*wGU?exgUX}fibZ#p@o766Ug<{1NpX+Jc04?nUFWs7>paV@^9;Mro5}!R2P*aZ z#cOTUc$QJ)8Ai`58zheo{~)Vem4Rhr2w z^dOFg%bIZ2M`~FfDPO09GA_Y>xVZR8dp1%=qrV>-^^&G_X(6k!kXJ~W?P$1I*+WvW ze0!C6yKxzFl&z{(b!Uq9OX&HTMjf@ zdBFIKgEAV!ZNsK`4@?rmM7q#ROqpEaBK<^umD`weqckHSqEywV8TWJ!PMd`XOl5RHxhgYGwkAuT*K#5 zOWJEC<>4#oB%ZxUiS$Y)$Bf~IOMgbRz|4yc z$!$itVnA_(LQaI7k4E7kQ`bdSV~341ZfoO=%Qnu~vT>?|DJqV0LCQ5DD8ec)AzS8k zTBLlP;~0rRX9OdWES^heF&ND_!7!+;jghUBQ~HV|SA>YUD0q+^?#gsxrHEX%CZ?Hz z;kpQG?6CUAZLPkMbs5gsviOQ>#pW`-LX>6ekjbJKVzG<6Z#b_s0%VJ!DwcADwbW~t z&oyWo_7s527xOBkDfWL&9Z4NESfNX9trdHV3}gmxk8E{O`4ki*0YZ&uJ_ z>Z)?Au&k%NZHR?@)hm%6lz2`&r|4!&I{G7d1tvkYb%p~>82Yjma}=yo-@#v;uI#6&oRxDr%6 zmAATc@vFYiiO@tKpm>F2n1K{BhO*=cuqCE>ANP=g*&4?}G-pU8b*vyx7)l`TE+mwJ z8DjScB~tH_;Dxt}t7b~*vup!kxWwp=qqrb2<~YiW>(8(LyT^GaxRMu2ab`&m4*tHL zp)5fR(G&3QZ{PUh;^(gSPBc9?q{qR*2XKW_LNO!R27CY_SnmUPi!yEvfDZ>By2j^2 z=|BFLfOwIo!wEXXFdZD+@WH?oK=2)kSKy@@7MUG-@WbiVtBY4JPQcA~7uVqIyVI*1 zaB&S@y}kk8KRkfV8i%)CzC{>VtZ{^BAqooq-y_-Lcmg?Q)K^Sh@} zgp)uGR~NDmhM}z1P%_2^^7S< zGrWQsjyHk{N1O=@g>oa-{j1Y!6_3ohd+*>oa*ys%b_DK`%AS>NVH_*|PXT2xiC`AV zUS&@`aFIy1pWpPwA>fs;$IQ#WbZE3(umC55BgnG{%@hU86nmOeAbj|n9pF8UMjr7LBfp$M##2xW2s z351GHdm)J=zs~IbO?PPt3$1$Oct9b*00bOZS3#3V371M3B1*v=$B3_Fwg-aWl1#cW zaWW@Ix!7gkN4`2E5-MTKWg7`;&oI@6)FSJwD;T#DUCJs{n0M8H9X~M;KCB;=p13;j z1Bfvd3+TsAw+q*7**WSYBte~@^oleFlJ_R|2u=`y*+Ohj+T)9s;s_OYadx|Fin4A5 z8SF+l6N6Qx+cFRnSm;d8 zVX?GvqOKNhfb0Nl^DVj`=#1<~k$F?U+xK^6wdBYGq5aR5|!cS2y02-d%A$Qmk)U)GW82fCXl* z{rx(XoJ7h2uJX(M0>KN+Kvw9@vyCXGpbCRQE_;M8`TF`hzH8h)_hibyyoB8#J?843}% zC6I%4l~KEvXS!9?p1;RbY!`Lvt0tcRVvoR$wv+&RpNeBXEG(=Uk{dB$InP4i9gcp^ zD15htx%P0f$PlG_>_wOW)!6Wr+kDm4jY?my>4q!vW-ocEz~-IYlk65Ji*uZn2l=>T z3RezOwFH8>iTDV$CrOGD6sb%llc6!8SzXLQLYU0jlB)uyseD;$IBGwy$U0#uTkROSY=Y2KgXnsRU`^JX0e}0NGoZIyb9qnpnlm9k(wfWrYPja| z_ZqIbo>&w%-h8d4kS(cPAPbS;$-9xv&H?Ba*N8+8>dn!lmg^M;~f;PCCbTX>zRJ?G%r= zG2A)na9F}*5Ryp0&*Z}#j9BrP%I1cuI4=G-lJP5g*yPF*C+AWl(Iz}!0&g#0_1xt2 z@?-e2;4UH0k@#VW!=+ecdTsGHwTU}Za<^>2y82T70HZ%K8iuYQ7fY!asj)0yKk{L1AqSN^tCzx$&cELHCb5_J<2q2njIuP#iY zE=(Bi>R%L-j#HeV3$YX(t4lW7y0{7;y>uPNmn6oaWgB12UlDdGO})yPpUN)ej^GeL zsz6xKGxOBTfWBCU86P3@bVaYy-=pKY&Z=u@(Cha+y@V!x)Q=`!9}TCo{%ATJ zc+=6aKZVenph+-8v#9TRg9wgBgE>M|I2(mi-$#S_kpDTD?17bDN7@qEx|CF-r}S{g zf+`{j9ZTR$YoSHueZ%7-6k0Ardwkg$&VJoe>9SI?&NhY4YaAKeqD_8$uY}Q`C5S&O zoO)$kmHN~xV$A1_ z2%e|=Agiu|sG|E)KG;Dy%SarfY{yV?F%8TnO4}`pq#o;ZZ+wVJvm!n!-!_fvc`Sw2J@UVU|Bx24v5nLzv0N(k$k5_9^ zh?vYlgec}#W=bMjefbVkOp@;~<(&2xP*T#5`<)Hu$0X~EZbW!iHJ{m zBZ4V=Da;s_vc%x836AwZ7({|A^HpHHx~&Jg&KAf8y%dkGy*9p9XI2LQE zO&6v2%N=nolA*=M1-HC(!8%=JFhU@I?OT$8^Sp0*#C2~RX=8+IzE}DJvZqQq917Q3 z2}|j1xK@*JjcNhCPR>z`7^=QrfbM~Fu|zotfES6dRhO7n_FRoxpHtCs5bxCOjWW)~ z4k1}-Rf+zE7vT)1aE4>dFtRp%2S!onSCh-%>LwQRKXLK7xg zGj3FBi}A&q3%;$(Q4ky*8Btqi4nO`>lE+5DVbQKmD8Es7scD9Z$yRvhNL>$wb=gI6 zH8)u&;sof;^|L&-*O2exjNdKVWIbHIqCSF-+nskPz1AZiD*7A`nV9Bzq;1vzw{_qUUhh!toR0IsE_v_odXDCZxe33Ae&0&bD_T?LjR74b3ImwVQ z5t<_o7(^t6-1k@m>FFp=zPImThE9M8g_>H;#~%A#VrWB$zNN}E^r!J&j@SpIs9Sa{4^ zQqTn}n5G=9i%Z@*LsY%Wp9>!Q@VyJ8sH?i~G9p}4h=pB&LH8cBrTDW8CEmw}Ii;Fu z)r|8GMM8<$vM6}5A!}K=JLk5HfOify`7ZCW;to}FbsERyUOR(@&m6tyoCvexH61#{ zVc~7w4F$8_b%D1zEJ|;hZSogw=R@fY?H3T=uJsLpCG|->5}K3r_T;Ug909&a5u_WC z;_z0R=W~&Gtj~YBxqbxjDkT|%33KdB9g(rqm%v|DjnPhbLea3TH(>>F@@EaFXQJBU zk9JtU`B787WqL0Tfw=N8HchShd zk*^sW*1U>n5ndQBAx^q8NO35G3xx_y<`O&gf;viP8ANk@Yd+yJOmM;!hDdW&K0zzU za44e8&VR$SHFQ`)gkwk6A{vWOrQ@!2zbJ`BAZ2x=1=s%3`$_y!W*uTncF}vdN@LWENeE-X zNH~+#!o_xhsa-16g}RN9cPCEg^&fRXQkUY`@=?H7k5?~+NS16-tn!E})(K&N3qzfC z^S5t+-}47uZ=a5IT$xMaXw5;ce7&_r>%7o|;)a;YbL9rTiqzb_dljws?p1v$iimGf zw#>FNo=peP=bhwCO65vX)36drQqw99PG4LNgH~<#<;|;lHlvkT4fPMqWGW=@(qv2L z2~rnY&$$k}V@4|-$>fhsjhy+OYj)yosUpjES|G?nXq?D>aAatX0%wxMo8qx}3ud<{;*wK!UV}c1t4pF#WNuzw=juy71kbpH zmeI4X^j-f_H|M-d70S`Mc$%-3y58#eG284?of>*-%EB14z4Jq?#yb*2O0C@)Ava58 zLlEknig0BpTj4}5P?AL`+nqzAE(_dBmP!vPn&|M5Y@Hm5s}*Dwh`hy-NIy*$Tw}s~ zx|!}rEIHY8jOQragm$ddZ|^F4anVvwE?)cS$9%z zu9e_7IA&Jw?dYx2L-lOg_j==ApbwWv!FUkNd=G}hQGYg>j{-Q0f@lu=gHeAv2}h&x zB%Gt!6pe?&X*e48N5lEh8;yd=a30P_JMhs4q>lLAIy*%;v3q(-fSmJl8sEbWt>9+G z9oth=hTULp^ozSXtaehF9>H6fo}HmLjDkVnp=ccX(IA+k$e%>B$oI$N*?5G)*=QaH zA5G_Z9bGcEbMagIx$fJ+C$oUFH1YFwvbGh zuu_f0oM5F`SYVnPffjKUkcDI6VW`QKRJ8>e zBr-iQHfMcBBCdwV>cS)=UhL5W#S#(5A~BIZI2Gcyb(8NAd1!)Z$AWdNT^QrS&17%) zQa25DyLzuHf$!IMrN12;e-;LCIGXiCe>#MN*&sy2a5SFJys+<0=fT7aM#H|3W>Mge zqIn;VqtRqG=nrSpa4?w#-hNo=?O!@W+qL=4#t+jF_YBj?Gb@aqRfLKQTb=l9<64d1 zrY_JusbYLjEDNS{g<$kUh8cRDgwpYOTC~hv@UYO~P&N+BwmxSKcj@~i^BN5qNv%EE1#&eUXN?r%xFuH}2SJMl{|F)LY zbUJ;3^Ryx;Cx*;({-KG<&@XF5Sx!+c$8z;*Uc6c7s#AT*2IXRtIqZwMIBnw#q5JL# zM4JSza47j3#UxRe2I|=3(hK=rgzt_@(Wm*#D64UFt0^=gQL;kvenJ#eB!P*9*Yf3} z=9}w89Py$EJT#-2f^{gu#vslzdkQw0GcN-O3I%e)ope-8IFiIM|Vm1e7rY};MIv}$)6QnVOHHRdvfPP4t; z7<_EzDi%#wP4YeqL#{H%sxYAaM=S`Fo=-RvJqdtAbtX#53LU=P=xOG;s*J!NPHe=;#?THCLuz1k1+{m4-UuH?~^}Vi>YI| zeCkzF#})Odq{S2k3XND|-U&tQ(zu_=5%(ibgN0^lUgjj@;KC)jPvosK;-c!>uB7I* z_u{`6%|GEDDDcY{s>0!;Y>1lfKJR^DApALO4+EW#zDtb0%9|x$ARlMTtZDX0n!%c8 ze@N{>jetuyDY718KkA;gY6|84KKeqJHfbZ%QdL8%w;;;!ddgRz9MdXUZaf}~;L1V` z&Lb)X%$4b!R=w@$M>_9~L$O~ww`kKj>F6pDouf`FE3d3JT~W9Hc(v)~Pk;N#Qp{Di z67F`J&qC!tz-+Q8avRaI;Z_4$4dhgIq!e_*?3znnX2zSA{3V|3*4Tw(dxS19*3h|BWP$&jc>g z45shE96@o_%z{sWD6pdHl5EIYoMliQaRr21S>);oKtNHYMzo3_Lo0WRf9p9H+zPEy zA}hJ6ajWaQZU*&4eMZwLQ2lHt@eXFH(%Bzk?<#aZ|IMor{hTL0TRXMY&v4$eb@B(< z@e0|`b?P6S0se?-+bM}oca{mMso9}RS(e{#SpdWU_HzH)9F@14m)$TxT)Ru0z5BH@ zr!Tmo-8mVKCP(_)nJ7IjgQPkqo!8=;z3(wyK^87MM;&qdp81~m;SEKZ`fgspCE69a z?&a`djU3R}=~Z!=6Ob_&yGk|+Rr5D7aa4tCs_=c8(&Abc zdmMu?NNUyQt!Kr<}iFiK8NZ!xR=b9EC zuWISQ(s1>3M4b$4L=ku==jKEd4|%69Oq0-;B#x+trHdsfc5Okeqr(m^>D-)M^6{g2 zXo(m;(M;5~PY6@q+x(=yGB^1Gc8$;#iXh%+apsU7cXj4qE6cO!aIf`QQ0g9pPrE{k zZXbDxmdEVT)~F4(mXwdON)>Z;4bioFykmtbD37~770}A+)Sd0MHff1~8YrK1UFuFB zc~zPt^=NCd477%bM_-Skr2TgNGcVM?Mf)@XwbVV!b^R-vXQ_uKdZ&7ESBKS3sv2j% zHz+Cs`(qz@lPHWLKN^MJbT*$)2h%VZhiEV#jEAGy6d}(K`twON8H@sdIvLF&?DvD= zs1IvWJ1m5>x|z+ObKPpM4p8-Nu1G91iH+~ia1!b2G#pkhES~K))ywv+*-afh)z<^S zZo^hR+iKFER=ojxLVp0*0$z)3h$d4fYK1#cyb{m0AxGEZHCH}C{#c!nRuSm|oP_aO zSBZc#a);EBTBO-A48#2NGeZ&Hrix*@-7FXHe?p5qLzJwuuu|4hR4ApLlV3Ywy6&8G z2A=1wI!7Jpp6i@+CNFU3x1)}V#y48}<#t2wd))c0QH_Pj%7tu>PYRDsOF}k z%K)twuF3^KVP@v_#q?2fWtj8gaEySIr0ZDn8`VB9LZO7Dkb$zt9(bl|!$}`26B+YH zIZ!T{P!eXFR3%6$$$BK?GQ?@6DBU0eYwj?`s@xDvHZu}!WaoMojbnXvaljnMN`~rU zo7SvezPUJ8j{Yufum88h<(#*BSmiEV;l@Pt<5un}b+St{t}_07Fl|sc{T8lp zjBD!5a77iTV6LBwtyLWD%k-8!5BcKqZg9l^9XUJM)G2D$qEN*(gW+vOOTnp9%Zz@E z_DA4S>De@{iLjrBP zEtZU>+qQ*(-gfcII#OFeCL}_aj$%`#fEe9QhGc18@shyk8H`~PqD%;cSGt{^0+n?C z&?1$2Em;mvWW;kK4!6?gDx!6x2PTnq)3?HCSn)`}-BIqyS?x$6;i`5dSE94jk(&g< zNGOmum%s z;zJZEhNHE!B7HsQf5L^~S{3E<(s~AHaPl2|u-Zq%9YaeORkf%Qwqw_5_~>Mr(? z3!&V(l()5^RC6+wnRanmikL9Dq$#LZX^ft7<~mc%_3)^~YmYz<@2KFp1{$Z@zT4`N zs4)i1@3+2}CExXK(5jHVGc=MbPWMa1=iDrwssI++l(uYZx^Uc{c2kM)EW?)8XHQ?s zOGPY1q$}^M8tq2_N+6hOriCKq#A9Y*=)BscfndWuxK&3NU|A$W;44FUu1l*GV`&5p z$y>Ea1hRD^OO7f?rK@iw1ToFMMFvB3i83rgCrA>RcaeDS@)OT(fg4wCf=s!_4;1l_on_JuWvPmXfU66{v?PU-kW8_W!8T4iYG@Ot6)9G|4X7Uu|;53fG z6<#bE1y}O=mk4x)xV_2N=uFTHE;GU>^5Cm4pU>+fuZ}*}F4EpAdi*{-&+|ruf%xC^ zJo|rdFdBd55BdXd6pV*M|0~b$j|ah5zwx3G9UMG)B5MD31-sy1pFDX2u0xn`p0bV^JvcZx z_yArJ@I9s_X3u5GI*Ih%J)B>jba#C|h#m_Wtb63*T?7f3kLs}by{GNV=ga5I=ga58 SpZ^;G0RR6SO$(|3Bm@B3Jy^v6 literal 0 HcmV?d00001 diff --git a/incubator/mattermost/0.0.1/charts/postgresql-7.0.73.tgz b/incubator/mattermost/0.0.1/charts/postgresql-7.0.73.tgz new file mode 100644 index 0000000000000000000000000000000000000000..96de11cc45edc5bcf59b80702edad6191991b93a GIT binary patch literal 94230 zcmYhC1CVC15~#YN+r|!etR367ZQI;`Y;(tYbMJjs@13etol55&%WkwT8Id)kuE;eHpbw*PaHY;rvE_MZVb#^%oTWceGQ!iB| z2R=zNTRV`8?sIn_X9FX5?*qo#%v4U12PG;oY(maej+5>2Li^e+;MDb+i;oyq>W2zh zSkZ+i_eb?T-togsqHh$4)E~6#q-;}d?aIZ5a4@*v!fN@7YX7696NIOIeD3A^zdhZ|nTa^X5zwCbj1pa-M%Jis;&ookdF2T;Fif zk;oSh6eIwI77aBx#I^B(mKbXjI`!us@Y)jPZ%!w2&3yRtuSbfc(FM&PT1%xhVtOoB z-ee%Dv?u(G-NOSe5+D#uPr^KRK|nvoI8uR)T-hH$7)eJOGH|R>LQuzSr2M#IrX&e0 z#Oc1rpN~MR2K<@r9=z#p&#ES1I>B`6$l5=wM731(y|-O5ILd5VNt}7Zg!i0XKOQZ+ zx<7U!CPjSOHwK>6XlK3{ehfI7v8_!dfyd$|sp9AYH&w;Bu(2HX1GdUm78l3$*E8Z8 z{~kx+X~nbuSzX!iR)JKRQbC}6`8Bgzik}Ghe-Zo;;l+Zyoh^i{-wa=)N7VFp6|%J; zTDw|$140qJDCj`=GkEFr$c-O7J%j~?@rRq+)XH6agh z3Bhfxim7QVl}lpCmKIo_N-~Q{)5&Gytt{nvTH~&%x}pn1if9d-VHnM`)|J~NSP#rc zcd!zpHb3?gqM@RRiUpkgF1wbw>j@u$5g{2wjRX)`^>X z>}TWH{!F>>RAE6`5z|7iN0O5ghGIidQIB9-F0GIj6~h)oz+6_9g<(pf%SMq(ASNTl z{KJozo`VmWvp+{H{s4*s;VAzTWtvKp53IhL(R_9rb+jd5w5kIoJ^(E0HP)ju&;B2d zW(YkmM-l1`7>YPq!D2DGawtCwM`UmP?iMXJ6k-4eBo^XjfOg+gRs13yyWD^uh>fDo z>(m*f5r$07I-Sky5`3RhsKzsnE=$u3zo}-f5=$Og!A`zdsp+X`9EcO0;}KWv5I1505cKWGCq3)B_k?K|8_7tn&L)6v2?|*jM)~ z5-2W{`j7#>hY){Iu}n?GCCXqv0`(I|sTDAGz>INUug<}S^I*jlafL$2lx2|_YV31@ z^D?^DaYIV5_ENJo@Vh@9NY2NBSRCvd=-HR++P&PTKvulpOS(|*u0AL2s2@1D+2U2` ztL=RET_@$2b2seKC&omw5$Fpzq-`y7p}%b7?yZK7YvcW=zq0uMLPyf(UzCPJu;69a z5JnU7f?!ifP`vGwfBd;E5t^zjX7H?uuO}BV5#3C?OMM@us8S2fxYjxb+-r3}?>6>D z;YSwEHy_ht|C=Lu+zX=j4HHc=vd8^l!5`2(8~ghr^>?dlp$gjcQ~%ab-Op6oi>$tN z{FpWFEU27*_T{AGIV3%|U z*e}>Er_4Kj5J{&orW>Y0TpiBRIXg%(7vnJ`p@TsGp}0@b3#ztyc@0f$3NFRHFmBmCl|t6)1!fb~oC1MP^eNax{xG$ctImgx@uzQW^}L{3LE= zxJvNvKLs`f2wncY;JD1z4>U;t&2(6?M!hmHUTa7h4AV;A!hY%cK~G%)YMNg`K|n+9 z2Xce7o?RSH#aqDN*BRV#Sf=Sv==+KM`S`ecJ>A`XKPL}gZr2?I)4)erB3PaVP8j;` z1Wy#tz#;YobUQe-VezBZy4T3}*PMIC3AbVQO}n>2k1^i1n9q|uKHYBRJ8X3o-ORH@ z`;r^w(yp6=tlXLRa!iM$DRL4RyKaM?VSdar-bvwH9TFOZvhGlLJ#v1XP~J}3^WH`2 zLFHgy#+*p-MB93}6XF+qJ98j@OqtIIy?$?LU~71Jyxji3o%i>T@pV)RxiLZg1t1Hz zT*R=`>wRr+P#EzY0pqXH*{orsKBE4gH&pwPVSVm$7FJ4iqaSGdZJCa|dff8wcF57+ zLZE}cJXCu@>zknin+Zwwx<1l+YwfR>yIcA0?n>C9q28NpuyvEGb!ea7&y4)$ahRRf z?YqXW!xJe?(Fr1iJt4ks=}yT%bf*ZMQq`~fec6aR22`v}i;V4G_@Fx|!Q2s#Uk@5a;L!qcnf_ok zm)c7)0aHS&Rbe=%&?PT*DU(Wv~+Ptc7%ndX<%kZi!S^Id6s4@Q0drsNC+Uxp7p#e7V%0zg@Nh)V3+o$c3^24Eb6Sf zBtoa>X_$t&@YjG$Yx2$>D}ea%&g4XLv37E|%EhW5M@yGX((O%Rt$)SRD5$^iM(NK6FmF3}&whpKFB&Fw2x=Gw zmB+EDpqLO!JcjyYhcxdSA7LK`LNf&rt=Y3e`uKNjeJwt0MI!G(?W<`H{0$DDLfg%K zaL<6386)WRd{dhO8|znk>NpuYTpY_DaaI6*(z#~&onYMk>qidMmhiI*rKtY9gEs^1 z`}kiP$M-cCTJf?Fp(tcMZxzqyIrpEm*uZC@4w2aep=bV$EV+IaP5xZ&Rig=$yq^0) zit5gp*nYZBd4jM^@FM<`_tL4r&R0|4*Sd));BxR=S=m)ouC|41N2WAA#$#G*@cj}4 zB=jg;{B~3CW6BjZJF!A<$WJd{m%Rcll->Z7tE+D3AuvI_?)c8DahP6KPldy|bdo2> z?21akbf;hP8{E-gKDT9(e+~Sn(>?d!8?(w&OO+Jv(#nad#>8QLx*lmekVVxnBr*|J zM&wrhP^$e4@01)5ygL{}{rN#%p<*8hWxI9dq3V{9KrJPr*j#90~(ZXRn9AZDw-es#eF zQzk~ zeDa=pKL&qt0?KLn2HwTP3!Op`Qg}NROMYPx`)O(W&XZQ>zese{DD|%JYTER5b(UecwQcFydC&^hSU5; zG?5U!^ZF^#`TX_v!V41SvNuzadR}9RcwV!lRFNHCTactHOa)M&TFO@TzBE1P7#|BJ|CuZ+PRNN{?au7R4oYZ> zzJn$g2G0(9!H>&kG#5*%+waww7x)64_FisX>U(#K#6VUqY7_ml7etELnTSJSY8kd3 ziBK1a;HHg+ypRy7FAU{GjEnL86Dy=l!WYdiSdAC5Ds`wFQ#7Wf^rm4}y$t`GzC?AO zf>&fs4w%p#r*Tobwji4%NY}PEv@V{3P=rbcfuqkC+JZo7{>2*4jpwEutW>(gjn{;} zq{d3g6pWEoDs()kd?|Z2g<%$-UXYYV73u83Qr@VPB*Y%6Y+Oj`g)esDMD~Z%X29K= z*hG$!z0N$_ZBcnv<4^w3e*Qr!fjbdQE7Cs1oRrLq_^OvZ z=FI^~dX5MuTGL2%D8yc@YpgQi{H-%acvb87LIiIQgmQx_<{isRl0lHxnpn(RI0PPt z5U-~Hz9Vi_q-TOZ?9y7>jEWe+Gnk9zKyzM<3DLE{ZTW|#`fX6=BqJK;C6?yD(*Qsv zB0W|64095+R;Y4>8RaqEU{36h_ToXtLQs27DrvVABbhiUOhjo~5h@2<`==9z<@DbR z-$PI{!54oI@i7H-?>3SULc)h=SG5321>5qJ549xTwPdfoTpB(J%n)ldxfGv9@TU}Yg#j6zG)#`VwcCSQUte)@EZe<`ulWXfhsks~sXE2b|^ zWSWvz9nz{&gw7E&g-8#fEUYL2GX%xl3cwK2Fv~<$^ODQrAS#fF>lImVv_11gZM2^1?A%^c(Dg8>}~ z73XD4CBLlwqqVr<>`h+w7zVk5IkQeg-7P=VwCeB_u&HFO^rOT)k2=Cza8pX=qe-)|V!U%Iaug)vDrv%|aT9>PB(q z$biB+l{n7D9BRB=BQxxDSydKJ=e*G*4~P(SdcfCVyD)jqFvpDO*V2cZCXO3 zo&BdVGHfs>EcZyZV14q4)azB7&oFsZ?@SAx@D^Gvl&#p--kLn5BgoEOv+lX_UXcTM-W1{P+kQmvN&7euzTbB_e6gF6Nu0ZejD=b**J11GGYeixkYnNA!Bc@*Jv84JYF}?74(G8duqPEz%4!!NsOCTXn-U{=v!?MS8c`SNC>`3>lTN@cL=P9k!X>_ogJ(O7? zC{(*u_omIy2d`DObNn?W^U*o`5-6}qm|6tfH}2r8sP{X!n!B`SvELR9=I(6uui>K~ zZyp`i^-)FlRU5QOUQTn=o8To(VvdthK5}9*BYcGIlO_~3#kyM-BLJ{j$1f#EJb5ba z@zG0ljSdg_Q0DO~7cs{mt`^Vj3sL=RBl}H=t#V>CJBeB5&YN27tX~89!lC z$G0j^PE2k@k6e{9?MoDe-9z@6!o1=jCx3;uS1Bozi{S!-y@-B1vtv@&m zFesD83_WBs3}lf(@z~Z-IgA(>8m1P&F$@c-0iRzF=v{odjjjHce`f6|%0C z#4a7N)HXkG#Ivc<&tfn~sd5lqT1*g|20fb=B3l`%rRh0!rQm!$EkzJyYRUi^IJg~S zA<(sZESw5DbYykboiMS*{2|ELR83dw$>#+%4n+Lg26|9J)l`twB|zVB2Sl9H58VBJ44$zxLi$Z<68y$0GUYq9b>2999K!r8l4|98$E$YZY3UHXHacL9ia5; z90A$z#MUO1u}+t^X9y>sZg7rL*uyl4U)+#wMe?BZD^w>6 z!S=(y_8z|j2$r0;RjNL~_c!(OpjA>}HM`co+5>sCo7%<;s;is>pw+ng0BT5%^%Ft_ z1ZQ6PI>S<$I!V^y$V~j$(M<=J5BtT=bEVEq{oj=eU*{hPp{q;`dJISA zi1#lE)>z_$xT2cDFv-4FGaSe<*E-X1VW16~nxx*>z5tiilTAnM7o8M>wE38!`~(K6 zt6>F#T)`S3LyfqjTMYW$xqJA+JeEp^EmQdnpzupkE*gWE9EU^H>nYXFIu`w zPO`~dIkuvsdw2jU%4!z;mTN~O+dFjgMK})9Az_<82wIS(eOO=Ymx6{vdX&^E6Tg^M zq(XVsWdQWDyWt$b+*TWyAL%*`l$1Z2n+{P~fKZshLawNu~WIF9RD!GX9vh@X0n#^@}Z+-!yLoxS%Fs^wI0h5WG#+Np%ohHdi~8Z92c>#T1%_bF038!Iv2_!J_){#qOc9dUdHxERZ6#R*v}7b{^_Ht=v&f{?$Kp zm1&@ltq*V7)n4}+JRt5p?t|7h5Jp;3iM*DX_Dw0{jP^>;HBT_9<rP<+N@U#xwgf;sE5&XAMy0$-jAp5p4kZw-1Rs$y7 zjBPxhY!-_BpUGB@snsI}@MYj&2s{(GMD5;8#k%9UTS1h>Et3>W)t+h_{0^Zt)xM*3 zYFaBc+&1a<@ou5;wT;xk7y<=iX7%%)b6?vn5|s7X|>uO^!85>d8%O z?B`3tG^w*gSQ%a<-J^onsYT z?JW1|{-CGA4s$u&dlqiu^n6%da!ah?ae81t3X_Q(+|_mBq!iRtfncepJiDpkVST7Q z36-Jl*wqzlh3aZGdRda|n337&y~3q0_X%}zn_VlagvV>qtm0lQGYdDu+ya!KhIn<+ z#619lw(RGY+(PBQBJDgIjqzvHZ1)$-=G3PMNg6eI#0X&=^b+BZj>O6vxuI|g0FfFF zOo;`>+Rde8)jI5xUNqsXlIF;j&ARte?xde+oj};?3*=;f@4zvts*b5 z8mgVPSPX6z)@dcwT&OE1x;>(F!QhR6gv^U)?oCG10W-WB*8!U#vOhoi-1|ERqqvvO zm$V(KOQMxeArD(Y;?z8Cuf@mvUR-IqDRX!MKMe3Ekwvk?B&5$6bgK8+@{=X=?1$2oetc8Zo&pG?o!kiq=eVKa#eSUzwHw5V#F*0foltPzE?i=gkQ3gh%-N=OTGf?}?;}r9 zk}0RYkNpm)sC0$PyMAk+kq^KMfjOLNPZ?n8c!Fl5u}DA3%Secb6OTE-q4gk;3L+fE z)z?JWDAVLx1Kg@w03=y5u{y6ijP^rkSAY*U)%>!fo??@Bm$W1vhN6|%Sc1Uf;dTaQ zKk@ja+m7Frl4az&zZv`qEFM}qaGR6|w7fbyxrg*kazuf?>W^!qiz>g+F=kcIJKD}iIAzFHzGj&T& z`(F8Zv~z}{{${%dOLd@G#BsB01-I^PSnvs1@*I_a4;sf-vS8L6c)2p-Nf12(-T|iL zE*)I+eFeA3ccY`<(no;g85#`?wh`ub&G6opJ$<{@0nk_hsBWY7fr9;7h^N&|aTHLJ zhZnW^*Ji29p$a=K&OVm0JdP?Y&3_0j5uipv3|?|EB2sB-Ol2n0kQFlJJ7X*JM)5I~ zsqsP=l2Gi&u}<4%^jDcA>MVy_NMksjgJofm&SR7r)b5BJalckjjGR) zXoF{H0Hew8R${hBRBF|3ql~bs*yR0+)%pE-iIU?&qL-53{JXKj)irDAgO%n3!3YOv zZ=4QE@^QC2fS`QPTzqi8@UGw#TC4ZLdH zfyO?a*Lq#OHKQ?SEne&_BEl~28Q3ip&&4b;6^?#x7Uy_OEn`vXV)TodWjc5f(5a($bKr0N-A=$3H*PqqizFbvl+^_3Y)1b;g2~ zDs_iK9eM*gC%@*2`2?G}gs{9~TYbQ|ndPC`$sm^r^Z z!$ei_^%{AEW!qh3t*>jPYqRHyZO-r{`&mP2d!q01w9aGX;8+w7i&cZrIi&^w?vMn# zz!?`iN=!*psC`*aM}Pj9ssX{uoIR_D2g2w8(o`Io04;RKTwbpZ!6fnkMqF6%jxcVj z#qh48*oHh&qfT6ZoDC>N*pOY6fUQ1x{#G7TvU=;p)>2N248h98jWaq_Fv!l=%A5f0 zPAdlDMFkc*J;8>Kv`lCE8^k>R%)fG(}HkUHzTIt{g%kOHu@-*?E?!Rmp z7Ez2FQV0&IuvWcz>qkZKLL&S!{?;Xu>4dF+!8@GhBv{Ub*}cpJ+G-Xbx$9NPLt?}y*lv%GNV4Xpk=}pWQb4Y1-Hkbh1%W%`?zNo_%&q|R! zMm0h1CuXD7-}yj=jzab_n&dI2%1qbmM!sNiK;lg9m6o6+qO}^5x|L!b z45dn*mw&zWsnX6~MaJ|BEY@z1I$tubRxErH)FsEP#_AT{hz(uR2n^kP+HThV@hc2U zuU^^P>{dD#kMd7#ejh2dji^xRFaWHe4*p&1rZd-L;$^J@E|y`cGd3A0p-s+2n_zGha+PUVCV=k??SvUJH|tWw!g54cFTYm6jo-nj)7 zQ4Af?89mph)A(*nOlXo;>IYYYoY=3hx2IWjAujhn$7DQKkqCbkZDkL{?6f! z_GQ$eg<2ybddp1WX#On<-1r0KJ3#Q;P|r;;RAV~C2VSTty#bkEU8M>%V zJAqE${&)Xt`RxG5)5eXAF_Y9hXnuy`A`hR+F#RWGWYxsu(9nbS{OLNpBn1~5lzivu z)o@osrva472@BKTTS3XO>3L>)c(Nk ziW~G=%hsO(vBL|U)oe3&cC9UGC>$MJGHy|NOSk59oX%pPl^zE^D=*q*%>*R~Qw=8w z3>g&IOiaB3aml{2G<%#sGVSTr^u_^KkTOrizWePKIin#{)_3Q(+qz(09Pi?^O?1`? zWTSEpFIRI2f!g?mf8Rw!rUW=g&cn=_%s-RKWa=mDF!9NKs^GlX#Ubx5)=>^tZ8cU5 z`0ii_M+JqLL0g6{G^-nM#9F+wYkJ+x?&W;y6_HM&e?hDc)zkeNoB?AIcEBBaJHGjs zz;wOdZ{tpZ;=r0f-Dv;EyQ8S;x+LIr2&wO0Cl|`S04q&gb1nZGB~e?pTsiD69_Tq| zFRz#V;`(*-_FC0u=j?fRbQ)!`|GW8;>HlZGP(|LMDSv7W;Y7iF3WZ1}&l3f-*@;f@ zPcoAB6Aks7R4ZK3{3oq6RiI7I#6oc~z^YxxXZ=u!t>So27bsJn ze3H~g;NLqQcwMW_;v27XBGBWFZ4A*cBZL8tg=0Blm~+9L^Y?BnZ^nu*{md+sRl% zic*)Il3~anfKT0ARY+B;8d*Qkyp-aBU|}GUE|3RxTBIbi1|3BzTpN?(1|!4oKhh(g z$VT-OrsDxiWf;j7dOmpk`aU?EKi_}b{*p{tj`?8N{ZI0FHrO*4GN+l<>+I2L0QuO# zAV&N)$Baa~i@Q`z#OLS^(ZQ5fmQHY>xz1wmt*e()yIQ~G7ajM(Jlf?KpU+Q;;Pxe;`<&FP~*DW+tTK1PN6}&_It7i>m zejcjx>c^&xu`%vq#?$jWov8lT-vI@3l$D{OdvScgVYtwl+b1yqM-bRH5O}RX$b^eb z|3L+&|GO=Z)*6D35Ivn$Spk`dnF%LZ`u~mGm0lSllF#6kwi>v z$FoZAU)EcK_)pL*XT;1wGZE0xkNCiWKumNM&GE4DpN!4HjCgSnjx+9@kOIA}wHFnr zgfS3~ZNishNOBBy>eY0ggP!b}qSph9QODN|1;kL?x8?9K&*_&vId86HFasxjPJQX$ zNq!Q}LK4K9a!3eArcz>x#{`s)uMHI;`L9t@4aot}R%?i*bAL)>G2O*4<{+LAe}-Jm z!kbkT{*KK=MUcl*HlCW4Z$!QyM4RvTxA7T{>%@fKotNxzAsNFp3f zm)+3@If=#t*-j39U>qyd)JBVlq1O?!dT152Pd~5Aslp2fg|m5#+?i(h!B4Hy7WB-g z+U_9)19E88(74m~swIQ>b3zSUpN+$j{rUYtxlgeea@bRo&&eP(j?X`$w%jiy=%&UZ zR7F#%BZlo;2P5J=?M|8UCJ1SIjj{Y~^#oyBO6#aUaf1*Y=4~=XlPYr`{)`kNZzZ_h z;7lzZGEy2+#1~a;zb`+|CkGINnlG{2r&n*ASzk@dIP9vdz-n zc&&FzXwZ4L!_3Rhpw48ERAe*~&&6Rf21o`w32KFE!|;OwV>;iV-z99J=(Grk942U2 z{)^k8*n$`U>(l>jAer2sCU@5rs!1qs%;R2vWr-8pAs%&cIeNZ*^QBHs<5|uoxe$M* zOH(~B_H*=r5pS_Pa`11%@6IXEkX&;esNbYqp;~t>+T1F)L3|u>VAZ+rX^nif7#PQ+ zJ_ubbsyJxG$wf=RgMNNgw=2R-1eK+AY+zMXsXhw+kX6Qq$yLVG^$?3S6zj;DQNuc+ z6SkRAK~?U(Dcy{fmBcs6*ZRiZr=b_ukD3oZ8`BB$P4c1T_IqYSp>D&qzZ`SsTR$?* zac-%#G&|GOsjOG@MGcR{t&hXQZD9WFLuW?kVP^MF<$s1im~}D6C>esa;&okkd>!x@ zDWy2Zo}G!E_2=?d9(r0e=udOF*@!p_7aa<>o7w&ath_kAdw;GHGe{*t)I_Xo?$I3l zCa%W3ec#SftL_(r@9&=|EF|_B^`A}v-F$_Mx0rhSEm=`~AJj!^Jy3B+cOsfjLC8V} zJnO8d|Kqo2cK%CYSv_#?{4<7mcPPlxOx^YDaLsxKeq9AJc`nJO@h@3QgfLhg4I{x9 z)@s*>WY+h(W~t29PqTsjKYnw?DCqr#8(QU!d-6e^l$l1@K*TG0WN-Vwz$vyGtgu#) zs%QiAuu3G^a1(;eqFJ&eIT|ABcqlI*d`z*V00}dawL(+05N^bgZR<#GKTYq8&%{ld znTq}hgmd9^0{b@F5(n}dJhN+>y?jIrZ&)c!{uuq4DrAb5SM$}!Vp;Xc7yRPQUq4tX zL~sq|8;R^7ezqX@0Sp59A3Rta8>^At3(!}bWEqqa9jJ6n5LWJgq9y5MpZ>U7TU{zP z8e>+ndyFBdP3`GZ%H*Bc<&w|TAbF?uyGk|GUzlCf4gJ$PCUqO$ZOOY##NN3i|EsBe z^z)kxoC&4sfNs~%Wova+a-&3x`=0?^oR)}B}vXYp5pQU#XZ%*^?hcXg^&r18R$<2JS1tq=nBn2ZTi=AUNoUhh4kdu_uo}6AIvz3 zT|Rq_jo-0G%bvbSw8SSmz7&*`v%jwSzX2S0dzY^X>Gj{eG0g01M4-e0HfU?Nv1=9& zGZ8FcAU6#jZ-&>5@BklF{0^Usd=Z4Ro3IU8uu=pxUM=xI$9LlST&3_0vpwMMEt}9O zcH-m6F2IJeNr3VldPD)SENEmJz=z$ZWgrlKvwI^^S1Z7;PC`RCT>%+~i|nN|+#2xf zU4)KjPm*a~-E+hOHwsgFV<1sfu~e{K%!xOcv$wi>Xo9A$9`F5lPdG^_OA`zIXz1lP zI=et}%wbu+-z$9p+FtH#H@;(h4~^k(J=>)riie zcXW}3SjX7=b&sCe5eb#qB@$lTdK<5<=q1t0 zUfzKI{>(U*0?Z9L03!G=BD>`H82_?P-6WDesbktx{%=zkPlT=&?J0@8sm&s;Ik@|6 zLBtPoKjbxwc2s!f{8r|01IJJ9sAk!*-r|zh&Q)u%-NOOKoUK8+oBeq|P_ek|zRDkB z@yUtyqwpy^Y3QlcOX98r)|>qGChBS;pm2%3eM1hG?+yT4A^n^$=IC>=g6*x!pJSaz zN|O<%3<@XUvw+e*2yMFJs~gpD853Z|7||ezKrurpwx4EJ!_58uC;3 z_F!*CdPjxSj?sv#qP(#hyMpNkL^T!H)5cZB!I;5SWoL%cLwMmjkaTixjosVk8326* zrtM&f0sprtM^C%HcOpw6M*x9nv)l|fcVDJzVs*$}1)~D-?HR{!VgSp&QDe!IzAYU{ zj{KFWvM1_7NPtPZdBb#5f_m7x&9T(xJ8zn`GSg_>@|&wxR61yf%Vo^7-yu1uE{OF- z0XKaOv?}_RU0^w~{-H`oF)sv9EskS0k4;WvG0sAlP2yAQ7@Oyymb36X=`XwYL%m%2 z;?L;%&kfU_X$5qWm(rO}YSPRLXR#DT5ukYI&kxog`|JXT(4BP$tgSDn!f_4g+ef8G z2%5~kohnAKhSOY5_bNNfeNnuNE_i{Fx;jp0H2qbWVlSor6`Su>OB2JpR`|AOQ|r?T z=F5D&ZJc(njXh>2bM9$})nhnkU38l3@zsHiObkeG^7U+&_bgq!)`(5~`ZROAah*A0 z3Yn(NUq!s1BaLXk|HV__qaG{a`&J%2M2j1dHdV8p(Tm$4$S16|&$U?k3Yv?xsF(y~ zGhU)}NtxfI^)`otF@V(a8uO9J({2TIu18Fx<@#f_bRxSdVE~)SiJm~!F{DnL!Yexy zkS0C*0|Xm$4s+$sr{wQC2|rg0gWUB_H=b+3bFuSV`BKxZ^8UJx`(N3MMP{^Zw3S>e zt!)mOdnXfdq1#lyq9`u?DekCKI!-=sc@H_##{rZbmn~W=zbDFHwquJ6*L)0$IQ;3- z@AGbA6Sygn({m0`$mwbrwA{bZckkBFEWoxGwE&&G<&mR-li0~xy*s|AZ19E;NXiD5eMR`Tquu{KtuFRGPZ zBTa@F;rANbL1zwyTRg=Ns#2b-t$sGI*Ql&GHZ!=m{t^}j>Iy*BP8NUD?=;vvc5_V= z7ZY3NYr#iCj6DV;h8gBm-Z#Gw(Zy~S16T}XfjxS3vwolH9$ zA8hLlut)4+H*`Iu%7da$XREX${^!>x1@YCUWwK2iFLzjFj}&kYQ54_u=t70uECuuXC2~ne~40Yo8`G3aj;pk7VRhLAg`74@#hk$ z2?ih2WAo*lR)i1DeV3_R-$0}HMu)~*mGy_}u+LtDWxI6JY{F519)1-FKm1jdy{h=o z{u~*vT`!u?r}HNQSd}0@@}-Md1GUo(M+Z7B?x@2=sws5!zp0VzMeiklXxxT7zM~K& zquH(b`Cz4cX4#-LX-Yp_tWAbY{*boes6tj^H{1o{D>k25I4uI{zXW0{*&vmJ{3{j5 zeF-!bW~U#w-w*cuRje8x-~`=ndli*UqgVI+i=RvN-mm$5 zA%t+I?V|1sx5rqt?4sw-=)!jnGN4x3yK!TB+-#rVrog#B>}w0`#~6%6Nr73Sfqs5G z?1PSRm#5c{dzV~B{?JP=_6*VX1b8!4F^_`E5Eg2%#B`Hx_Gs8y^Ny#YyJy8ALJ;zr z`l9^ArU{|eh4Yq4WI3g|3bz8amvw1lw|kUcLox|N2D7JZX7^tZ>;j`i zeqn3$&|B}mV70bS)TX%LZv%fV?y-f|7~b0qwoLC^BNf6@3Kb01>?un>xp41TeY`&9 zF^uk3t#;B`5wxr*&gN`BuSVm?-=@}(w1BIl5)AYP!3sM%QQ|}H1J}KXsZo%y_Pqk1 zC+Mr+$mzEHLT(@E4Y&hVyx0q9i&5WNA8ZOeF$s;)D`&)$=31i{g!!Wz+G%!le25q5 zH8&St?MMXAUaI6aUjNe$(Cb~{dmnQ9xs6Qr!4Q!;lGWJT=D{@i^H^>s)_{O0iwNEU zNuLOwCiV~{A_rk{(-6kR`feR*=NL%@n$yiFYSc*jH)x_+Yd*3mC+2{->U^M z8fmP}Q=wzwV=8_fwg^-&G}ZP-Xt_8oCKBw2zbC5t?)|Lm)obOqTDOp~AzNhE09Vn= z*L4%2CXlnVQK?7~NBWY9K>$#*2fXrOv>{t}JLzdaWz9<8akK13>bVKoIx=*vz8QjE z2jbm5{%GUzbnDs}^P+VVB>9e0N{;?1Pg+Rcd_qpVZ|V{=1p} zX1RvHe*=DHC7OB0ZDin*t)F^L{rQpk>8$f^$-T9JH_PjAq}XB{x<5_MUn{P?Q8jwPZ+fQH@yH{}Wj;wVS^`pDfzh{MRBO@#NUO zhW!i=^E3wquGbW1N8<>`Ge+}~Wz+u2tmD+i?H%^yr1Qii6MlV1ycB9o5tzGR1c1?} zwGz>J2h68lv%$u_N9=CXVnp(4f#hJB+yRWo@24PZsXNGzSu&)$iyP{4Gb=O>s(8yz zr8-mNXC@$;lIRo-UdVS^h&NDIYa*Q17q3d%_4xJ{jGaD)gRt4c-nefxZ@kiHZ(d-K zs>NF+S^s!z_|e)faFlYm3$6B%RYWRW>C|Rv)otA)YP`BNtqW*uu!7Y|0kmmtcGo$7 zYH7aOfZ4FCs5Mcc;-XMJb2pqCtF&0-dsn(XUee>z5n-fQbv^tw0W}WgIVB=B&DESD z@60f|Lpm_~?fh!fK>B>M$kv2o_ke+LUx}JT=p2sP2V-iw=-FqMhjHt7kupI1q z^0199b>GghJwwdi)M=)&v-x@a9(y*Y_2{ZWUl?U(oey7YZjQqIQ%{G9qPRqHDm!Jg zC6yz)K{EVBHSYh&f%#}V?^TcixQhN7)>;c(2%fO=!F=(lyP0cKN;D-Q%4Bw_NW z>L)AQ-@J(m#Fp@*C(rR_qNxUW-cCZV`2BtGpDpMGp^PjT)4%b%T$i<0AOJ?MnEw0v z`ug-Ya@Ig4lIvykx6VNC%RDY|+b&%wmKjKs?w-xlg68wWj{@TuES?$qjL{0$_2M7-h8pE2_B_)To$x7)+|FDoi9piY>0fWKu!# z;i{tEUZ?>@aDp8OZ%-1?H}OyKo~?1>h2ICLH@Q78q06|OfFsQG>SR36R##oTo2FLa z!Dv;J;QJ~(M|AkUB79e&(3k<%*LQaH+2=lS3486?wt1)T^Y3={1RT!f&B_fwR=Lyj zm8Kx6FxUba-()e5kJIhm%?{=pd@R5V;kO`EZo{>-PH_Vjy=-FWE@$3KmZ&U(sqk1= zNg^pX*ZMqUm9l#Js%uwWVL-zK&e0SW0x-tkZ9FJ;I{jnydD25o@*h~OsJXd>$xL>sF0Sx3QJAw!d-+iQ}dcXiBisvgF{2Io4pZmI(X!sKW zQ{h@4VPo*9HQE#R#Uptf1cxi{we=}HiPPoSCkJNu{!M>5;3gw19|fPBCK^iN*I1of zqDOdr1k4-HuteILQCrb2gf!0J07eIx2I-!@j>#(0_g$6F99;$ij`^-+U>!g(x!Hyu zyj1#~SZsQ)=h=$tvnH0!i54yphTm*^cN0DrC!KJB0;&>=f3goZEGg4aEbW$8o0E%c zan9N2u9|aJe-WkL-c*Ov8a53)^p1+_m@73R;y;AZ2x znkvk}CX?!_!$-}^|9oixZR5wKOe0=GWaE~i%_M8H^0#G)dZrQkd9`2LO1r-@@hLaG zHtCmd@xL9KVm1RR;4zIEj)B_j)329_`k3tM=Ei1zWRJ_K>g;y6(v641v6}4Rhh{C^ z>5XQV4tH@4h7~xGW9-HHa{No(3m)vZnc*IndVeVFw_XAuCAxqjdOWGL6#;vS&V(2; zo(Lrb8akgP0_v*krr7MKsk4g<%cJkv7Rsm*+ED!ypII`R43B;GSuS zS(}CD@8Htq`^$nMnJ&s?em~h3+64iGJFAkcRtn~35<(H`W*u3PR7hG9PDMmM^Rg&e zMx-hRl+H;lbO%4|$w9{T?5*ciZ$5i?vWUAF395spD&D9rn;nbfN#f2#K0HGMpU0lJ z#?};eeZj#zOSnPIDNXiT4%5R zt+m%a&C|;ML=b%bw~KN{%9)lSK8uxPd9}$Jdd5qPR*ZBg^)DZUgmk_N@B$2u$o6tx zkhBJA#gl5UuA{1k^>G@LJkE^);^cC=3Cq>d+7QdM!Ypm$he_rAjL%}iFD<^ee>447 z>YxYfT}1@u^w+NQDlEfWWj$z2Fe4E%n;H2;cW1}PbH-%68eMT)-HB1O@H{0`*`t@6 z-O3Ba@%Q2zykL*gan59PTN!z(WyE+m-Ej-7#&}tsug8DJc8kf9WjDR#c-Fbau^3vc zrOO$Tx=DfH$N%pv92bz1Ir z^(RxFya;isBSvnaK}ZVr9JDO!wK8{|GF97=Pjlv-GRuK+B*JDVa#5P`Sa43*H16}7 z0hTx?WvWv(Jq|`olXuw1ph9zcJhtCeCd|J^Lr*-J`L2`iIvmt5Ym|obT>N{HT*7Tb zbegVkw5`@U=c=psoOkGtyv-7u_#C1)U^722kJ~RZDV8`K! z<@=hpfx&cA46sa4 z+VZ&pMsqc9QAJb#D9QQslaJ1eVMSXZ_90??nOxsGTj*4}|C}AjRac1OT1snsU0w8IHqXy9L55m0AP}5`8 zL0CF&Lx>jCDw00B3gBUFA$lvmZ4#L{2G!@jAo9Jl#_K+#-uIFz`J@9@n?NzN*Hhcaw~AzzXN{hup03Ct zDPj`ymWsX6ftx)9;;P(v08cXjpg;p0Fsp;j%k-(Eh50}5!m;Eu@+?i`VTY&%;+Ke1 z3ano(x4bY?=Ukn69q4P!RwVqzt~&7vC)pZ~{n`jl$Kby}E^@saYAsEsD+VGy7fT!E zNp)Cy0=`9oNR%oNE)?N0MgzKI9n*>KLc(Z&VE(A#C3Nsecql2Ci;zszv(n0+G+Hx6_=|30mpL`Qt=J3}4r}y~Jb363?pOyCf zrR2-4_osvR`uukI71M#gUE+2R9}Cw6A6FMo%x)haHzUz%+`Mj1ZXf(S97t?W*f3)mW*JamwE#c27zM zs|VRseq#@vJVfd{rr2sof0&i4PP9vzrz@uu7#yeBXRFm>>Gnz>my9tA5xQVZtMdt> zm*)E?R1gaQrVR5+5m^H zAfUCbco|=LOM`h!|7knNc+9VJ9-LjQj4Dc6GpN{%Wr@6<_!BgUEb+13Tc&6s5vQkH%4M8a zuH$ZJ>AuQyi*;-9;IkJ&1Sn_#lP9;GX*eq| z4RY?bkP;b$%w7~h7*!9=I;x4=l1m}VnRz$W^xeH3i!@EMi>e&HJKdFp0TxsNKflV~ zwk!+yIZ1KxHgQA8upFz9HVV_c+}_e6*-}De#hIE?bubp{Rhh3ImC92~D5ctnbiqiM z`psmlbc-c4z2U;agE(h^6HH)>GC2j}6`viYW{5%*dHE$_;$ua^a7tkWGbK`?;xrK@ z`5-xELrvz-2eRXs!}bVcNxith!)dSD9_Qd*mJ8R0y(loNO}qQ^-7Y%jtSn93F45%6 zO^+6?m*di~sLd|7mj@}H_w6SHJRaq(jrT$kqHj{n#m5UC-(bgx@h za9j9UdI}fx0VAXq#00^Mj!6lADGs4enXZ%wJL9LAXD-)JQW^pl8zL?oFDFq`7FTLU zn0Q1PFpW}cigkk4viN4RK>es8Ngylnf6 z;oKgy=~eaot6iEUS0FNsEx|hVV#2P;*t&Q*ScM?sdwd6{u6NvZH zyrERA0Ax1F%r_xum&vR>Q#g5rWoGLg7B6e|e2}GY+o}Ha&`DfxXYRjz?z?r)q-JV7 zyE0Q{bN+W}?%!Nip4d>Hc+XI_H!h+u@#7cx^~*^C8Gp7RGB0>l4J#a|%l<-Y=yEuV zLalM{=R}3xextPY_$mE|CDKV zk1d1kPm+u6c2LNwBrh4c%>{(U6W$*TcSSR>kmT4QmDdB`J^B4e8(T;vWYEVzN(~ik z(@kpR^)=ktZQG1{;JJ6veVq1lw}KI&DH(Vu8Y%-0a@vKbj1A_F;UluVw z*Uar1LpCQxIV~*F&u(7CL?=ENjrO}Vr!2aJCxrsPtOHZZUqy$DrBH;fY%}iSr~v9 zIS$@KA@+CPWi-pdrWTuJXe-?1=n$Dza*!@_37IglYo;rqiwCImG z52xIwp-44!`YNOB{Mqg;ztbpzl*%Ka{vv`+)ZQ5 zd4)rAdF~H}r_;jw;mPLeWg8|VJE`@9tCh|5WBWW9-gt=j$A%#DrU=YMI|c$K%J-o`NS)K6>z!thbB3jfbln{DMn5Jw{$$ICd=wUp)e~Cqpe|h*{`z zxdrDuQcs6N_3Q@HFn+oGRg$l`wb)Kq>0K0|@|?XhUuI9!&nIBy2b@n|b#=y4@g?%M zhzrf7aqCJSDIhG76^`GvIy4gZ7>(Dwf>V`qyg%BpG_*n;7X%3gb$&yeY6*U+RQr5f zY(<>Y7(qMB$%;TEyub>QUJ2h!?3@DO=kPY8II=FDFN%NT4-X^J`0kgj2|Wtttd$w< zVduA+_vB}1s9I{jZ4@FwWfEzXT%+M46VteWP~k=jMgu{GaS4>>8Q0U$0e>m0Gb(qx zEb95}7?-!10Oa0PB3#2tqn}u=ApnQ(Z2UArj+58eYP_cZeo|BwrYtgEf&r zcKQm@U1=e4_@3kE-Xe68Fd;dJo8mNLnfTc2M9$LyHsRwcSKK2;Q{u{TnJyPyFl!|5 zh*!J=VCH%AGYVaj36^a=EQmrJ^&5yWGfp7oUMGs9B50Sx%(RcjnCfr*V^CujCJ zeZAhG5FjPg7F-aQ%N_sx8D%${5}JTni-;{u2T3H0AJIJ1oqOou=lETA0Kk3=2I?2M z6-j{iNm{1{R!d#U#&RgN_(|&%s?9%~5YU9xk=!@>_V9xxO@${_qmDopc{{`|FtmuB zq3GhU`@;8%uJXVrBD!EG)>jmVa+^p4<-I97Xsow6a6NNgCAVp-`fz%Z$pTMrb5SFu zgoR>hv6D(<45bT)2W}k9!a$CLNK2D)b>s`;40OUAC#GpC^odjxSFbwCsU$qH?j%RL z1X0|O3@OtI6_kbh^9+aO7z{M!m6VC({74lXK?zL5a!pN0N$UvB+5%9;_Gysz;p8!j zsySN{u$y$=&v8&glsSqCQG!F5bbE|XLCAIsp+zscNx$5(=&FHT>l3hPC z4O7(+ORdC`N(H4t2?Q4kUX&InR7k{`g@i3`G~h4ZolV^M_~WKU2)C1@qGjmpeUS^K z<&rAqQEi@>3j;X1-y#JUf>qORdwwsEfkq!?6U!s?b({VztPRPiu@L3QtOiwg4%*tx zH1#F)%yA$3nR}nS+X#YTr%mbD?*g^XeiXEdC z`XwyNQ#w8tl@*$j1~D=+WTqj67m1Y$?3Wg$pd~UHgi+2moP@_(I&3--mPZg3F^B9< zv2#N3A~=ittw9Qjt=q7}AMZ;>)o3^0lo@QG2 zvdurtI{^mrOnWXkN&S&A;{?U90}LvtGUEilD}>1A>_VbMWtkXc)*Ec(id`Cz1|Q}D z0zdg$8bEH@b$8dLnMXmoQQv{Nyf|CF6mtZ+SswxDf37sB1A4u$zI)$A2dPe}5?UI{ zxBwf8Aen^nhn`7zh_Dw#B26GPH}2S>Y?wp7q)L}s=9@NG*-m^x^T8eAweE5JNsTTV zCTUoIl+sRSl^A1<%JRqw1QmoM=oP483CYXrsLL4{3^T3r)sB9^Y$QXZg@hIe$_FdW z$LPufDF@V6;K%ELD)t9Z7C|w=h$qKTiU$b^`8D-IJ2NVA^nP9k-otAxNAg3`U zZRFTNfi)$PlnWG@C(C?!d4Inu$<2hA7kXz|26Cve3Q)|#B0&^{{jUCj{2n4|*L(!z3# z;s5*Dz zLNd7QWOi1Ez|(PgKI&FO_W&kvyW1d_p^C|5v=8v{6@m1u^=gvt|>d zScU{ST331sVVVcVOdi&ji-n{tRQA>SINVl+-I=j%$@!^}!Si@#dw~&48Yb5L6JBb{ zEI~mbQXwu#wMpaDJm-*=KrQ-jD~5%;uetD79rF=ZGhDa*Pn978Fph8@v9q+#FyKb> zi^wcCYIjmpw9HIB`sKbc8Qo@2vyUsfk;CP z*2D~L3LC2Rm-}mbZA9P~zlW=;>4cs8_wP+t+*}8B-Cy(dccyH9IJ7%C)trwWA#SrM zgPi_GSdo&ic0QN~PVP`|?pkd*6a(en^o57!JrH`{Rgn%&Qr(6O8M2>4KS5>)oArNk zuBoz86dGIMfh7cFjWy@8Hy<;9P3gRlc#fAa&D>cOMA`fZD#r61swaXg&1Yh*Gu+j! z3N?Ui52~>#;WzbE^H)1fQJ&Ckiji(%IG@bvd|y5#YBt|8ch>_9gD`b&;!PLq%;7*R z422+*8&7FNR$5>Q3;Yema6eAsJ<_E68~F#77zJ_Id;@liD-w|N1~=q#5>OAzcMPHe zp!PjS07wdcx~W*)Fg))puISgnn^0<9D8kP4f{_?&id9`US`@AE;)LTk6v9 zTSl2`tg4*oqYP&y@4rt_L?`*v*lFaq7BS{1yVVK6Jbu|6E>iGAK&YfXJF?NmY%S~u z3pe7;7#F#fS=nahUDGEES{_Lcelp0sFeIfXW%nLIxxCto#c>hT(qk?!0lz^yTxN%m zT3l^jxVNTAxOU6ki&Ysh!Wnn!_17o?Z9LoGX|KP%#R>a;(P}&hh>}ZA=)kIw_iiXs51lZ)?y@-M))ut!LaNE=B@JpnJkXaNpWa4+ic1ma>}ZGW{1}% zAFO6sh`k#G?5NK&*R@v0K3vg17z1WmzUZsg__k6k;|Q}TDacnM2@&d?L-2CPW$;@f zv#F5D`-IioqSzx*YFGZ*J@ zD&$w&VcRxf%N$m7B(`A71RX?q3T4`IZB6^#Wvbuu4=_&+-nA0p1J`Hs0r}ySuX+vS$qyt*$;gnZo+Hx!2)*v%at5%FWyy zUV{Gp#B03j)7hSy>+8jz?b~EJ8QSb0SzpQU#{O+PnK%&`@J-1gi-DvM4M-MYttzIt z61vOpGs9XHB}x$<+jTux?#~>~vr9T5loLO=d%B)$O#K zRI*?XocGg2@;y76nmdgL%^=|y4C4&*ivlU(-*vD+(RFv)*XQG4Jh~_unXKVr>ugOA zHkbFgURi4|mun%n7Zh)o*WK`TRtu$#T}_^&yo z;_NJOysM4)0z`knnae+#t5xsGSoMN=At|?@j``FtpyCS9iq$|i&`G2sp0r^4HKVrGW>@cr8RO6RNAncnAlA(#W~iNA&vxu)u^74RWO*OP=S<-_6~uRR``#pLUZ zknjuH%#R6cX||V4{P>*nXEu(;R5FAzyQ~`XiY`jFS!g}g+sNKaQ189Hutn&JFE%Du z_Rq<=Eg8K^fe_u-6y@{`+>Oq86_4a-1hr#h64ilz3}8Mlc&#F07X^vKm5(r{>i0oe zC2Az%$_9lvisBWiXJ z((LKX3EGWcS|M_BdbM`0b8~XByRh@R5~|8NJ3P950&rX9d}V%Oewq@s|ivijX?0mK6ZAydGqk->i+a_b#M->qP3oM za=N6A&Z^GN{_4AVcwFk9hh|^Ci&;P0+~VEDEJwVeF@3D^a8IP%HV>JU(_t(1)SlGbYEbFX-O!OvC=WD_-t+Xh?H`yI6 zT9*c+FlW{bqbF6aWl@nC6(B0AS!E&nDW%qHxnR$dAaddw@#JyR8i13DdlKhUhBSk% zGF=-JqHo}sy9a1O6swRTex7MqXj1|MG@>&cGsXS@5u7E90>KrL3e$j2nEfP-eymKQ z^};_Zv;KHQV`qJfelH6G=S9A8E^14rK4}1W)x6vQQ$6s=^QVa9@Q;$vVNIIQ9S*XJ z4HaUhKCI9kao;Z?BGJFCV+}BTi-c}gC6Yj9G0_<`-6s~zXZ36qOCIXcfe47%Vj&ny zd=t8jP>82kCBow<;UMu?CGjC!${`pDcGOtwH-HNXY9tcVs3HejY9R)XhW(LRSIq?& zjM?LoKlvBr7)+|X^-U}hdFDKpb1FfW5zJKjT|r6^q@+V^OOqkx0udsQb!nG2M>$)b zIT}EK(|-ZP4`cZ;LDY#Si|cxCv#l@aVR*tZSe#X2=b0h*4{O0J?K5QT_k&r|1xc?5 zBKu5{1wqrY-Wou}i15ebW>SK=ewc25E4F$6G)@GMHb@<62TeG7d}dt>t| zw=k^`|F!@utyCNAJhMxQSij|FZRNv))~ z3}&_ON77Q7GHPd*EMT(Vk;S)|Ta&B&0q0vN$f2s_;QfvS5+tx+Y%?#GB21ofZxK-nIi&zB|IIfJ`%8QXxWD$YZuSB^5>X$s!>ffsb@T_7CVljpvl*2wizZ9hf zqRaU7;VF7z4{3ODO8s3{z>h^VH_VIYEGc!-_z#7g!0I070wH|atL;%Kv;Q!(cS7qV z#^MJom-y#t6vQFq6{Qp-7M>UdAPkb}3MzTJxrc#bH&kxQh|Y*vM*}Fs^&+q=tRd%2 z5qd6qP&de}qWoSWudfP~G}?;ga5!{s|v&ZORC=lb!wi&?sK3~Z;U!CXU zBUv%K)DPOK^R35p@dqSd10`J3OmU!a^a8p50QL+I;m{8tz;cD)ZwDaA6c7sB%CC9` z%Bu-3HTnMqB(3$~BX1E)k^>rXTC2iMu9-fB*vl#4|fk zz$OAj7f6B@;QAea0iS+J;8czt4^To~%tkHTKuvTjslSI}`j=od(jJx1TTefV3k;=S z$Rdo`HZ&fAL@K%jK7$wKbjljU?W%OQ6DxuSrq7!>JbINS2b2-J@K@m zZYIii?+3s}hs~vUpL`+uUAV9;^Jt?Muz=L$7qK zuhHmqF7JX0!@Whpd)rxA892Ba8d*1rH$v7~&Q3=Qm_#1YKhB99YCZ@k_Hrb+wi+TR zA)llLuCD1zaneQaB4Zte?p)U?^QM05?k7dHrqhpr45mOtLw}wA5V$O%VEWb&!H%CH zDTGhV18p_nLEYijIpP`^ZpR|S<^vjjP9!5GT@15=1=%zRlB%UJG(k5~ssMiAkW-2Z zZT+X9Cel^<*&*aGVNL3@msdmu^>H(+`e&B=^%nUDG*GZjTUU6)LiDigQh53uxb6|l z@7hZrz7LC%>kBW}_&{KeS_JoBq_)N_a0})I-KR|#cioX)lR+c*11)5N8T^kgqRptH z?*s}t@?i!eg9{nR&s0p2dYE~XB##X6j8pWjZXu-v#WokUk-3XiXDeA_jm^Ka$9(|^ ztSzA%*fyc<&~?!H(7iO=tpk2FMI~tqQDXeid{$Yn+Bq2kUv_xjt4Z_gIY_DT`wi;5 zujY?mBR+6g|GOEysr$t!G_a|p5VE~7_p^wlAvW#~2jr>EDvq*+FKdgG3Xw}f><{#o;$-|s_73;$tI$J zm~@3d=7LZgcb~*9my~TQQhP^x5*L+^T`IoTHx`*WLeg79z zmRCyNlrNG{w$oBAZaujutU0QCSXkH8p$$N%qPniQh8`Jwt38kr(i$*rxS{|=F-ZlO&^=@&#zu(*bF!>%u{DBc=si5jea)Ka~Kq|~6Gi4C#rj+NYK#CN%t&d5uD?%Xl zXIo#v7D|-w8nPps0{x(jT3A_)axOE;Tw728R}YOW8}sb)q*$~^S4Y#>wUA6>GSHRD zKCFx;#Wf8S`;J9QZ`bv_S#?U*`87GYeedMu>caK#&G2x4XU_%Q`+f9_g;7h^b|~ND zzO~!6jcb$N`1P?^bV;_@;L&Gx<8&ik|KY|iBzxs0xFE(K%Jyomyg}o23ag#y)w5J< zt!)lZv==`@62o26hj}>-W(5bnsHQOU(U3|ePe!}>m%O6$ybV!u7xhNG*L>IuZ#OJ3 zCeowT;n|H-LMaR8kdkjm=RE~ELmf~3LpDV~Nm6dL*zhE+FWgSVo0;}`2(025aqxmc z+Bn14*D+c@S}W2h#*3i5qr7B)dy|HO%j@3SqF?NM=2UQ z-&F7J?0V<%{^ntSRoC79VW{;lLK;1Od|ZEA9dAFKy&P{}|Gml5MsWB#4jk=j?QOgp zzk_6t+b44~f+UbvJeNUGz`_p&(<_*v|l-kRzcYNmDywQe1`gMfrQ2m$ppKAD0S zDETT*v(Xq7so|tfvSkRpQ~~wm25U`h#=zwj^%8&Zt70U3D+0!CB*L<~HEzWb4tp>n zPk<;3X6CehMCLXI-b&r-`ZpnI36`jzA0XxkoG}p$-fNQbq3$pgeeuwp%KGoY=@b%- z#my&KEVGaSf}C&Fzl)pNO}u689=ry z2>QCo!3Y9=B*-;zkKm4NBnpvkiH}ge#c1CivX~bkxzScKf*>ece#AZk|ItU3_y8bT9g$p8X1Gx-^^&3r*!5vh zNgKu9_jDEWNQc;FIzMTN5Xs=op>Oa>Va zcye-ve`}_G%?4fgzzyy;EVP|R-LMMxpB0%*WzsV10#$g?hDP2R+0RqjgN5q!+CiX((e-Rt(i`WWZ#P0nfHs$yiu_L~T?f>5q+y9%` zTs++$VHJh)Cf~$<98+WYFJe#pBQ_bjxH{K2v5CKkeG&3a?B{P{(|;3N&J*xN}_wdwRj{~fV! zzKI=v{EygjU&NmICbsAov2RWO5!>~P*yH)%#1^7LTm3I$??MjeRi-}kd=q=Wc}eMu z*jHP`oBts;blpE<>b{SNg~(a-$5U zIp>=8O0ru%gApks&5Y?EW2pQ3hqg3rdS3%QN=zT9y}J;Bivg#f>c{YDGW9=Agg>sl zcw)AuzPYo0pC>v);(R2sAjkoN=8HPUi0#;+y+h4+llIYJte@XOlCcjWQphm& zdip2~Y*1O!vPDRbPB;)<=MOH5P*h|OKjo6pU5mwt8aq6W#u}QkZ@!2v{7r1sZ({F! z6I;oaE48=mi`YuXDdmarb44!>U&My}53#Mji7l;{&m4NbMEtC5j+Cewk9un6!Bu*m zM$MDPs-_IB2P8G!SRr1XSGZaBON2@VPREBH-=)=&#Z0rb{3W>?cAs)A8-vEXoO+4i zPE{N6sW;^OMB~DyQBAvH_C%vMte3IA0Z6sv^!%j4*-;^XLA+9>*yl)fi;73DU(fKX zE{HU3{GIBM<`}ExgWSOf+^d7w)C@tHTxE#iFHAFR>9p#q6=ov@X!Mb6C)n0SmuazGb zx4(~#Y1%n@x;%E+f7IRD+1ho4cY7I5Ey)g@vNA*cE4prRY2sey)W5&Z<)0QS*17W? zU)*0zFu1$24@_D7CntD%I9C2u^==$F5&PbyRBgF&9G$O$Fh~;7LDGX|Ar)j11*o_@ zJNa6NN+w@i{kyWHl+&!mS5iCaLY&u3_&s|os23{Kz1iN$m2;FQJwmaJZ(#ETB>_V{ zQ~h-cg-~g1T9w$qDxMGAR>Z5(+G!xDR5`BSj8XF6u-KQ`SIbY!!waFTEjewaaFrg7 z%I?%yubpeZ?d%*XA1d}A>tD_}g5og0qw)x3J-fJ+ZnuOmbxe=#+Ds?zFY@46U3zh-l-|KDmLbG-cH1$joQqQ;GJmdMn3rb2egLUup(GJ z1kdB5sCj}&l{c&GokiGizbf%1l&ECDxVfqSdeFMlrb#4F&2{N9WWKf1P-meuc?_Ov zZHZe7u9y+WTAfbP4;HS4`}>|0YqxLUJH!idEF+8gh_I%VNb3Y^Pfq46nGvtT>LreI z^+hbm&)4x_Te~e+{*_F1osc=*ot(D8Qa?t}2igvxRbLrj^wFR%F+@a#5d$*O6)xD% z0WvowM9_OGpF1H_6t2pF7Sh@?qXq2G8Z3%z$t)ksRJ<9u?j6~fT-Z48|H0eky3E_{ z?cvhq!nLm5ji~xB>o~YR(~0Kh#mUIeA9~#&8?=6eueQn_*}SI}O~x*PR~q(hbjw5* zAOS>`m@n&uYv_rdx+WA!f!%g&_dMd~KzaLHb1q@#m1 z)zd0`UE{9z#iP%S2(LYSA@<+dGuC!>@wIwh_zArcT4@gSBFuYj@Q>+FhNH%t z&$_rrt6`KuCLNc)XO*hXcMVbm%!&O9&%o9Qo+%9$>0emA)CV^e{Mz$%i>(o56Z=r^ ze_TfX!P`Ww1Z<||BN&LxC8f4M9Kb*Va!0mk4A1b|F(M26ytDvGrF6|PMbLA_y4BQ1SC>xN5R9Z5W zfc`WN@4&9Cl9YB#0lgPdvqN8?`}4Fv>e*BkO@6;d|05CGhdLe-H8@3YM-U;5&#W>Q zOaLH2m>lvi7XOhcVc~QZ89P3LoeW5JM_@C1j6~CJQj;X51|GO$#;42k3Ty`NdtG7e zaeq`b>!W-0(Z}}Av)AW7mFVk|v39lf@WMzh?%L}p-lF%i{J+EZ1$2X z(J@?Gn|nuli+9cx&c^oXJ-j#pc;cjY5tFJoA80a8sfWW@dE3`Pj=e`pXV@ zr5>3ZqK$iiE;<{N>WlMj`&b5iIeixDA17~QWR3C8m%OARmLGl?cE3#KVAEH?Yp5Z% z$%9LD=5#p@Dd_>!R~=x$x{6(MJVt>)0b)?xHQcm@Nw$}hC8)}neYzk7aTLOQ$qE(n z8DXs%J?bkEYJ;l0d+}kAHYB|k=&8@w?eO1X$R|SKfiNVt`4LQned%hIu*gdr4Kl`J zs0IrEA_#z{DDYJ4vQ*@rYSTj`8u$O=*t#Gby(E+n=F7d=FNRWfZ|xz&2dINiec}6v zswL>3Nw2j2EI;FzJGmuVzO-K2o^|@s)O6aRr@c|54%%+@z&=XIQ?A*ZxG`9Voj!W8 zQ%=-W=iYjj)d{|>I%2ikQjYVmHf#lKheISpRdegxEJtFPH%t0^G47=fzMwB0&3hG$ia~elUQ(s?WOjE|E>Wc;8(>d`jq_sHFJ~}7ss0DlHh+=h)BcBr zwx4bsEsUO?2UeLDN2=?cKi@V(a47Mc&5R~kWP`0xThH8y?5JADx~g&1S;}$7Z4xcj zZ!gGfmD{HJZmHX{dlJvPsu#>fAGdZl*FZ*MnXoa3<=9Yc_O^juH^WvXRN_Ay@;;_1 zPmhz5LaqKtqk9W(HVXqQEq7QLi_5mEOX~m@K)uPC=K37UTbp`IB2qP>>LQR>+l=^v z9l-dst^w0q6|{#&YT(4!>Ubr@_Kxnkb&OBXSqcGWe=eGNlXACZ&(q5nMMl zwjHZ|v3qn+yD1qix90of`jf(W3b7_8@zVvjh~BHZ$c~Mzx>=7p47*EPkVTG*sxm+9 z+d5nD$Rd|`-Co=iglrF?^X*?*D#c#1zG`4r@@FRVI zk3t$$BPT!`DBTU~#f>kLCUgn|24_zVK#1c3UH2K1E+!)kiM$WN^WysBQ3qwH!BtRV0U~= zy;%}=T$zR_0g++tn1pWQAF7G3Vzu_DR8DvCY3tf}$%Z@(DT^p{7qu*eD-}fUertZc zC8YisBx2J#X`0pA+FaI@AcRLG+kGOO2NortBOljzA=w+fj!)T$1Yi?N(vr>5L!L}G zqWHp?n9((;Vs6RUFC}tl{vHedy&H@%xrS{dCP?8|J~e3DJ%|A);Pzzy69`t!%)!YY z&TDhacOx?w$HyD{*V{{?4(=|#k90HdGc*0ryu7WRUHF`w?Wer#l>b^E`stjj9xmXk zyLN)>e|UA;+j)Ds2a#`lEf|7#HpVV_*BIbOy_|3GqJS(x_}EF^pigP6Ud)ug@Lu&w zcl%`b_f)}bF13un{AFV+SE2jLDQJ$FzJHR(zb)_= zXpgYp&kV2U3jO?Op3e5wZbzR? zGb0?{V6@-T6ZSYHPH4eU(K;!}CgC96;I z`@AIIealerUN4cUuVe<-Aus5~zAx$bYQfc6|M6oTNVa&=ZFJHoioL}(qLiZZi)}`% zNfS~kEMgCw2sE5#Qd48}DSrxPAfn-UxuY?XNW%B~?xn%#e<%cYt*cc-9R7|m>t!uD z+m9l9Hh}CMFFsa*1c&V7f_eu4u9ZBae~hiZrVGd%Das<8JeFqCFPIj}FIwuhl20Z= zIVXdS<|>OU#ufz@)R2A?VPCl4p($^Z5Xt3`@K{7x%`bF1wVjWbg1od_wXOhoFL+tw zyYp%SK%j*yr*IceA!Rh_OgMnOtN10mK0pHLd0qNrSM&~ic=6B$lRhBK3^el zV7S)<u{d`a zmkJoHfQ?%JnGpF}n7dsR%<>~)UPRENfz(h@B(vc1?zgxTQ?;@-cvRS0sdB!-cTpO= zxlvK;9zvWbT4vnsX2WS#ktlja)O*}gv<#ihcG+1Z9nhFIVTOPHmV5v<)xleedveu{ z!L^|Po%-abM8;j>Yv+@+bB5FUT-4nzfA{F^!rDSz@c8V5_I@YXE<#AeWr=U?yfiOjWjB^-KVH)!2(t-&y_@byGD}b zU$xrB{6Dk92YRd*(FNEJ1UA8z83lCjNw_o>$Er%;wT2NQp=QK&@k|c%HvZ(w&&|!o zpKYA&@2W3OAAz6y0>kt_ek!8XtO7sUmj7M;^ll%n2iJU5xJN(tGAC$+BbE1*s=6|- z$m^IE4O_2X#Y5COvZ>@NrA3nkqnUHoOj6LK&Kk>Ru4NPb+Gp+PEaak#YY8fGUlT$` z=1PKwE>}jw2k+T(8d~Baz#wb>!(uk@XB|={#|qA$4__=1`=CXRNq4b7`lX-^Nwq6U z+zZ1C~7`9O4=sK>YE$C>z2|1I0Kk}VyIn* zrC;1Y>cO#CJ_k24ZT7cfy|^c9LbUF3cMuJDLKvr7#fU2e=pn2##a66C@E52Ys!tSp1$^&b4$ai^{cDW8A4vY~@TwC75l{cS&4sKy<2;?DH6V9wF6tnc@ ztf(YbzbVlLpf*-?X7V1C+w^-XIKimfu^sa8M4}%7OXhW-!QTLu9iMO={hqiP+=eNn z7Ocj2Pf&_9np@3eQC}X#y4w)|>MGg;EmfWBTUKRxFGMI)L)wOcW$+zy{)*YK(cPED zmW7V+Q{_j{?*i3JNYUae1IL%5VX4aa!4ahBy!L9ySfZB4+cG}~q}r-(BKlZ>*O=#35N|Di_`Brwq>&~+v}Cl6oYt7V+G^%#V9PPf zi0Su{pCBMHweO7#cu#2x`9{SRux_q; zN)>UKpCK1){-NXi!T$miT1VITd@rhUx%*~e(aU%(-3KPjrXr&r4vQT%BpAXlY=g(2V+~9Ik zfXEwIK$UhoLFT>qBvwE=>4>aMKViorW&M(zaJ-W%gTe;09(2!VtTKe&TOQ}68_r5q zS*La9Lto_AM*uztIBl!h>az=IIn2!(RXEn1;Ids)Zad5NjpxT zG7+3(6{R`<^@-6IfyLX`QtUuHyUeVPHfw@?POxxwvCBx+s0&KO~4Pb^-784|!&rDLW zmv@a88HmJ1E=)ufE>pw=0TGhG94|xe+s7?gyneK%JbD-0{^q04oL*cIl2gjAkBsU9 z39k&!RskL$AC_(_nkIg#L6_SUs9_g0o?KE5MKL{JWks6btGAx(i)cVjsqNg66wyrg z9V9`1f)cd$W4?!kLf7yxBthy7T%LcdbSEzYHgMOqGs#%Z`Db9yR~yvm($32e z)ToMZPb){;(ujkp-GPktuJGp4(aIX0PPU1Si>+OpqKQil>aq^N#K!A`B2AJuK@XaJ zY>$dF6pxIk^tIfFbJSzhhu6X@0oe-qtDZ`cy4RDeCDF;%-8)8N-*Fby#y@+SLHnkpGg%jcLzT!heZp7w$*0GIamy!~R?( zPE%oX>~H0wIi{FQo=DMtm{x^o1~ThZ%@|mb23>u-r50nELr3R~vsU6Nl_Das6+y^Dq-hB6rjy$Y@LyGQ;Jal7nEnWfPO`B=)btZBWd#@umjc5(y_FI=<4VVO0#|PP zc^BuqE+4b0@}J_vxqq)7nyWgLZw}qDz$PfH+EVmz|nwu-6aY3uGF zTh6o(lS{0IAtE4K;L}!D#9%Xevx2OmB+6+A%RW~ zLO~izq5>!$v_3sAn>2Nf{JHB05ad6>(Uq!{1Hq)3LPe12eUU8%m10>1hm1ff!ckvw z(E3WnK&#D&mgYM*g&c!G#U=)WzzR(X&;>LjSqd`Y!axW@K~Tj5_dv@bNQgoQTJo?P z^QJDLL_&!T10fS$aisI5kyxnM)I>;Y8YIx2|NVSoGmj)aq@F%59BPFh^5$vBjYI~y zphlG;wEA7KutqBK&I6wr-xy!|5DKMRIRiaW{%>Ev{O3|L8}JN=LP~wUVchVM5EDNv zcM=0lpc4C1yof^*Zb4)#8Zen4f)JJa!1>@p>X_gjpKY;25k&}z!>N~bJ@dpM%Jvx= z82$Px>RZItMhS}Z;`vLWBq70Z$U_rJy1xm3U^;|%)I+$qpRYt0S*(@Vs&w1<}%+*DAtZQLer_8b%gBBQu1?N}+kVr)As9Uu^qf#8!MHp3g8H zH3<9(>lv`O9oA0)_7V^<33}Y&8<1faG9;Hv(9R%c%>+5}4DrO^M};iZ)}8i|K3%tEKKPse zO74f~r29dH!H5lo*w&;Uwye?q@lJB7Tzr0SCA;?F);sBRdt3=Zp|SJ|6k!bLmi_-| zZ20UaA;K=ClsYP#;)eGa(?x(1&#rEtz8sEL~9o?Pdt=GWhu@zknA33G>|^)yel&2L=edU zMZ-ilNA@Ja2opGle`+|fT@(LWbKoed@I%;yYdl6)xc;FdDN*lafFGb?dg6^C|1chK*UI9sjX$0klJAI+Z0DT{ zIPsZ&Mfv;VSnxx#9=)5~YL(0)_Q>h=B9=PT&Kn90@h~>4)Iu&8&Q-kNQ_8*Rk@aKI z>M@y`8*H;NHsaojq>T-3rRsA8-P!B)kBk4EqkEgjQ%iuyLnPtJ=lt;JD&Xphy3_Q$ zx4AUoKW}|%iePQE|KjfI=;YyPH%DLKrn@^r@6WTdujh>$`0@(6v!R{*#A#JhU@Ei= z+PyEGrAh@Z*&MN4!|8p;z)|l#vuSNm)6wR)j(ap=FNkL8yDjo0k`bj-{xf_>wYRsC z*STwILj1?geaPqj`~5ES^0y}f9o{c9v>eM++|K{EFWXbde|}|i7*}`8xb3f1;RK4; zWzc#pqSDr_{C+6WMu_zGJBk+7r>pePGX5Cs3hd=}?v4>Z691%NHXn_o6VrLo17e7T zTQH(F&LNMgc7hlSW+Ien+Rs4s?sJ1xtKZIpcZN7)`f3zlVvDezV#Ye?9^1fSizQG6 zI>wT9%BW?!IKW3DK~4}|=BA(3LEOFhG2HWdHH#mtv=f!^kvcgMMJnY9yJyurZF^So z=6*7BDn403s&myq=SgeN@h12-?}y3OrhJ~ji!35xE~;rgbLyn&v1L}xK4B@9E}3S_ zVuU1`cSZxV8Sm=}ma$O#+3LC{0>{_CS>2NjK5Bz}a)CIY^qiyo`_Agx z8KLFk!uAAV(p7hEilCj523Ltnh)9m!6y_KXIz?h>Xuuagp{XzH=S~|u-BQ(&E1wP& zW`1w|-%1FfBQNrU?*=0`$b>roACL(H8rKOA@fAHxqj30ijiqdDmmL_wJ0714#F8u437YRSt$RxYw=w3r_=VbD_-jX;l|g$ zF(xj@j4Tm&V9>LWvmLVQYmDiga31T2Dps98vBGeR+5m_1j99xwJ4Ox&=ZE!IW(-?fHGlh9@1l`3K~n0m`G7;e6#$8Z`DE zSO%BGc)L-MRsjeX2?lBnu!V0l#I??bn&gu0bdfd9WZy_va=2o*`t8>-{Bp^-& zn)U`Pw%sk+L4qd_(DU~_XwRgjXwP3y1H>Rg79yO$pm;5>>B{Eao>fT6dR;Vla=0xjE=yE*bTLS4++4R_7n#1`C@99EWiZHz@_ZrjU662eO-sZim z(M3WO9yqBVYXntCtz==(RS@bq@1 zS0Ul87i!AUHi0Y+VU<@`W|*WbF|}2jX+>7>nKF}q*ROzkgugrjyAQ#e#ruGmA5&xlp|4CcFqSeR@ys>+<0*{v4{};_=L@VbOZ67cSr`wo(o9!m z#?=;W-XkK@6Wf2%K$(U$Q2;8#t1zwV)a(EKw4KQZ(i^ zsS47m+ZlHJ|L45$oJ*{;Vu{##)3T-$ z?JB0x_W!C~i*#M&0$9Br$Ub-Z8Vk!Spt2%Rg@z#08U#ZKL%5c{l9z9kXOSrP3H9)8 zzM@4wK(O`mThpQx$>vh7QJZu-7Bu*xVy}C*@CikfYXfBh$ZvaOg$t>go7S*`$=E22 zKWfO@9MTek&hla?n*Ks$5Mr-j@5GqFFI+H8AtEefp$BGKKt#&O$^7IWTn;_N3N` zB}tbZrI*ID%cH{NL2!^_Fy+Q5IB*NnC4RAZm_t-#j5Y>574$YeBo%fqeut=}N02>0 z9$Yt}OsFl7{CxgPQ5FyBkE-BLk}&f;iR{6z0l42QP)z7?@`-Q#1juqs6&-Ly$jD%o z$nXt_o#DY0q1rOJ5et@WgzV8sMtF3_r* zB{cfJx|$rUsk4|$&W|lL=MTn`NJ|7vL5B$K zfQk&C{YnyfF__!R4iMIGtd@$vv(b?7imfo@LlH5Lna2ri%bU5&n_&;r&$*p1KOZgL zw{Z3M6Q5!L&UAn6kM|G1&fniZ-d_#Bg$TlNQvuiNKDBK1Y!W)(JH0D>H6~AXe+ye4 zIHp8t8;WKEy(~;g5J%`nmGM2V^{Q}E@VrHG+>G$+W>qmc9grQ0q;(OyE@P_!7ayf4^prU5si&`u0Ox9xcvPK+;0 zb9eM-Y*^46nENyljUd&m(bA^a!>A)Y!agqnoC{d{>dbyf$Xx^d5Py`;JD3;OsA*mer{KCB%y!!J>MLIZ1I#M!z681-`3+Mvm{X zHOZjUay@~tyIhoB0(hV1ma6f5R-bztO^{f4virKc$W!i(cClrQdSj?ouAXErS7A&w zWW2z%jQFoi&;Nbc4@v7{RD1fco9Ib+36m{*egh>xZ#Y&6aGbjt9h|*Z^jlgHdQ8_a z%1rgilMthPl#!@F5>q_Zz_K?wr0Rz4{@AG1KiNEwv0gY7*?)XC;PlDsO}pNcK;HRi z!5WnF)R+D?{bcQZv_sW&C!V%X;d($%&xM;kOv=NCMZ}V5%e_beZrY!wUA~<^UMhTFeP?p%e^=QOpNOO+>n4ae$ePSYR9#$r z?VX$@ChiaR zCtnfyc{>GHM$ZY8L=b7hFTjzQvR#&>O?S1lq#}awq?c2B{7bag_``mZiv58cO{vz_ zJUfdQ?){{Xg61#n4P}%3_%`i+?>+5(0JI?%3BLm-FKe-NC{k)`MVJ)*U5&#yhE5Wf61&oF`$9s@6I(U>UC*cTEh(W>AQ?_cr%4gKlh^fDO_ zolEqZmPNZAOr`8pUabDT-W2hnX1lubqE%Vw8{fwyCL%(}Eb@_nB3yU_F@TO1tJEiT zG=#k+yP@>WMXKLfD?BVf=b?OAaSg?z?DOT^v{-ofXOueUH=zTE8@ zz~ed~4A0hE>MHNGzaNx>(?Ie0D(`B_qrRSy&|x}HpTOZckKxH<`9IRa%3I6vqn&i0 z3|a>yE+86Rm`v$wcWd%?^LA@W%N}YF>VnJAC1P1rf8rdYv?2@a*+Q#9xLze#lvMy* zgWFo-)8n!`z_mA4z)s@xJJle(iY9X4CcvOq2;1=@8N^BO2K|8<4YfK@X@c*kp|r@! z`+%hCnxo(5!nKI1X>1e(_hk1OwggFA4IzU`+`K zqtXfxkDukuoU;q1#VTg=vTxcw?j+>pqwt`SdPEx~gdVxVsBT#bl!*!pusYzI%4^C_ z37f72NZtwrGY1c-rw?w`sa)0x5BqIbT6+X5ypHvnVyY56E3|i;Ya`P2d zlCGoBA{3Ys=xc-Xwp&d9CLFMo`GmN0<_;q)+I(Dayfyx)O#XwocKa?_q3hIL>Q(ib zmv%Ygb9cQPdp6pWZ!i1gHs_(=3a_mU+-iAQ8-f?!h&*V(ED<{wAEg!bk7cRJrNN(5 zA)G>Y!D;I-TOop>oDa{VJbemkHGWTF@8r7cx%oSbA&|-`NqBCtO3=KSBO35)Dj4rh z9DBr?30~u&xX&y@S-`xcK##rNhT#@|au=_a=RmZ_-L=F=)L!Ry$efBi;cD=`{!M4@ zdR&3^6Ppo6u#wD|{DasrQ0U(OZ7no_QR>l|F)kwePm3gQY}vE!;Z`6Ws>HY|E!m%5U=G;VL`e*QhDR`m%JOQ9=mF*hP25{+=7iLH28D=$4Q2jgSd4E`o?E&H#m&Fy+;{@qM1zfuM1#EVgoqB=~GLT&6H`E5D!CyYzlts zl#%#*`eSqX$y9?Gi*g%W&_^8Jt1tV^>8M-X^sT`?hw?lTv!eR`IAHk&6mESk5A!^*#pU6kft8vq}o{r|SK!W|rvKBXub%zRmHM)102 zIv&6u>jN6Y=7wE}?nc@be}_!{fwBjQs1-b*yWVy^aap;OuU7eOZjms#b)D$1xt;vL z+P;nJy4AF;wgFqL=GZVj#Cl)1x=zHqeUoFBsX(-n(J_IEhF0r$|86UW$)1`uQfx^yra zCbrXyDru8bz%eBmjNM;G_+5tuG!`K94sB$HsSj_!3=8kCwDD+u7EKrel#`op2TMI4 z4AYf6J5&gQ(3&BC>y?H(?|#)sVmYPiXbQ7tzvzjHA%nSI=9adGR4W17nNk*$2vz%s zdFi(~htu6eKJxF!?Z0Xcn;pyF^-Ncv%g?TD2s$6V!&;4P3v}cPZz&RB7Vs4$4jl~% zoTM`xmcF=b`m!^gm!pRd2dCc04^LOV7SCY~ArU><_mbgH@dWwtS66=tHh>#P{{knF z|9NZY057%dLm9$G*v5Pk8dMm4p<0!JEq<>mpjPMVrC?3hw5vP^=_@=!DJ^b+6~jx7 zRItIC>h&z_zao2Tn~Uh8I$Ko=;m2e&;4VR%ah6Q_mI7CBkbA2^m1W*hMD03B#LcSd zmn-Q}TpN&m|Nhmce{1qh*iJyWU$dsJDx2xk!nB=v>gR`HF5bzj@iTIq?zU~cYj`cm zH`QcOgeWFD06P)cDS9Q!Z<5lXMc{>q-&Yw;w^%YQF-xtY3|^FAoF-)R;Q`3X8srOF z`tL^WMS%yX?))x40;#bSN8Aps#NZZFZzAER0RcBZ+DA6&r56J6 zX~y_-mgU3|0lD7-uJXBK6s~bNDbAsB)Ext_k!>b87>cnm5YH_WeTQ-^W?Y#mglvo; zIzT=m#{wD3n5tB$7z+Q-lU3eI+g`d!l4C8|mx#tz2Bx$ueMd2ne$^Ofbdd}ujsS6{>958z~S?66|md*wapq+Mpj@=%>xl+wtLHbcWo5_4s9Gg zl(nEDZG+g==K|`KScrcIT4N4_a4K|VObexA=myn+7zGJd>tPgzMo_*?mqCoKJavSe!bgy**yf! z-x4IOH}Jr4R;rP~L>CJSQSi(wk%Mi0@FY+f`@vHz02V-37I>7o=&Tm}Hd89752d(}Sf zu+|1*9n*OH9e%1Gz`<$WVoclbI$5aJO^m($GAzArqh=u~Yh3 z!Z^shp3Nu&frnQ_L^KgwQ*%|!BA#+M8t^@OLIA$UA7F6QbZ-9n95pA#xQbXYHG#wp z6rAf|5_GUNDhl+O2I}+J4?2|{ICZ6ob(wXKstYSmeHx)jj;E{=5b7KEeqbm!pygyR z5W`B+=;48e$Sg<7m7z#n$0y%kQO{tXJ+pB4<*L&TsejK~2onsBN5{D{P;B zUz{=eeHLGTIfnD|CcoHGdqgLLe#q`562A(E^QlBO#IWxtCe40&a6d>IO$& zmtZbA?5#K51I#gFoO>gmTm#N}?dSE|tQgl@((Tp&9M+H5_^n;?KC5LtA5TFLkl|At z$7b30O_N@$+DJO*M!=8isj_N^9J^-OH%)b+>4#6N9P4J;mnt4@fU3ct)oucd)+oKhIPJlyF38Lv|0AC3j4HKYu+YBX9j4SG{ZVsx?K|B zR~vkhVdZ%aD~P$7EciZ@Yv8BfnZ(z13iyw9FF0D#Ut6Y%?O!PlR|SNvIkrZ>@o@hC z`b}5{e{{k1be<%O5Mzdm8bMUa7hK+ezk*t;Cxnm&?gMPe;++s;0sQyC;(y`oUSe_j zYmXxzT)$&x=Z2MA;&)+_ZbGPu5Y#$fR?90uFokO*yMT2XJAYZW&kT@)UI|e!WyK&{M?$@7B2&np-0<}m z%GB+}yVFJu7JglxJe#hq_ui~Wf4zV7%Y8m`+rCyRxEmSDwjDk{w06Jm_5#Q8GeTTG(^)46{k+Q8K_ z7Y^)yyLhh3*6miKcoUOEk6*tzT`##*c_@80tWG%w_1(0W{!+_furdERgg^VPst;agK?$Ll$}p)0ESyw}{>v6_tA+pO<=M7n_igU9s=tB=I8 z#rwPB$;si(M^Ju#jv#@6-d0Xt-S-VJdIGesFoxj?F9c^Iim|#zUk|?!`#GoIeKe1G zeUFcP|2Jk?nkA|VS3}k(zz|B*Y^Q&X)H zkTPFW!s|`EZT#!YoI^~OJ3N@L*2+_ky ztb$@*e*E<4^(y}1GBpMY$c?9KQ0(f7gfi2dgC z@`%w8fRDfM%fe02Rnf~0@{j?lJWt znfoZPAfSU9^dxeCMyT4FGRza1?w`v{|d-OFI$1asWerTC5&5Xp2X>rP-md4ukcR0o+k< zyQ7hfXhhPG?5(r{PfDz;Al9Q3Ajh+F240Ci5oF_uaWPl3eTQ4Q4r9!w9v$Fo>*e~; z2{|m+H&hgUB=cc`S1q&=4-fOFhg6j)DYW zFlSVXDJMU>hmUb$M!zA`Pk5*hVZ_evBo0^gbrETkhD+7O6PbF5fEM3lHTIH+EH(Cr z_a&K*-I9g;!cZTdQ>ulnl!mSz)UEXL1{vTcuyxv90ecb9opaTJ=kmZSMbJy~RVOZr~PE2RTgJ;;n?#B2Vl`Kqrw3PQ2Df$OEnni9dQ6OBy_tIAi|iDwu!3dMSCFEqIR` zS@Ig?cp^vxK%;VL9R@YfJz7cG=iq*|Z>64AKs?!vPgv{o*~DdxKQyvpMB|paYL;8T zY%{I$P=O+@@}$ayWLjBnH4%j+;YuEURD4a$%~Up5ZjDp?Dd>-lsIj2LI9LpBoqVt` zU-=%_Hww&Hh)K+wmc*L3|rf-(IYX!J+ZT}n;6z_=73%? zyO&*jn_2^#SuXOi_u{Qk2JSfw5L+D1zIzw3FLX$$EWv3iV#jyw(Fvd`FS%|+fodzi zM`tH#1KT#2b6N4{Bsf4e$fy6ibz53lXQn-qImVN2$0^PX^Rw)X=fuCBlXvfZU?Q({x6NqCvELx0$bVoWTHbCGXSnKF(X zkY#O?W?NNe-GL^q?kc&qMvRpxSFji9Z=sLL>*NUIOA!~ zl*ULC_wX=8@Co92fD{I!< zsmgmd2(@GY{VSz|gUG_c<2pkFp|I{Bd60#GZ8DiQUN#+4pTD>}NOA1bX2qlzoX zf~FRn*#WKPadrv^mAi$N=WB?|zq;@C-K(~fuecBYDxe6ojQfN!Ey?#X6alNyS|2-Cid_MJ6E;IE}(;NL(=3D!CXMs^C(kQ z&mBWED;m37XtPDYX36?lWpO@#y0G;RV+-STdGEf{B*3NDl1*#sT7JD3+#Ddw#hyl? zIPcy&(;RFg*~@6Mf*IuU(>6fZ#_Ye>mctfd@F_+IK7e)zdh! zyw<$W`Zzoe{W-jzOgJ6z*VpZ9f``|~`%A6obJd3w(ql4-(7)67>uSaGTgC5I;r;be zG2*PcTu`5npZn|Z<7F@#_#~?Ge*gC*wt89pUv`I^IUNkN>L2oB@AHw6emASCw#QAR zk5;{1JZUv02J7v;{Nt%2?K2>|(Jzh|YwsYVj@XbS+a6k@Npff!8M(x>q5Ns8DnI{l zI+S%57lXd+h-XQKhTE0L&d!EV)m3!Tc4~(<*DlT;(7Pg_r9$7#z5kR;NJo_Nz?lHE zvIP&^gQXMXU`2$oq7S74di!WsVyCf=q2U4X5>s>NmN}%C{keR{eK6&%pNaGDA*k3s z(V7f;)31qH-7UMp3I2&wFXG#5?=QO69DT8S_4$@A$dtu4g{E5R>fHTEGf@-yY8WRe zrNL@DmX&Ea6FeHkJXJ~YOy;{~7$(((z}mh=RJhj;2NJ zjeQ*KQkdVqCe?xh^xH&~v4S^2c^Q)rm*g)ScZZqU+?Ba&BT@Z%#Y z#$g=5+Aocf=p2A6V?~>C%aJkWywdMEltlJJcRb$Mem`g=@O9N2&EJu=eeG~x#tr&JxRZRo03OviUX&A;KSm9g*K?-w}cg3FnMhic^dX5U9_wUfs=5(KTaD zRa7I@`8%k);z+ztUrwQ1xMWY%d z@{ymsthrY4#wuL?O38Gp%Fw&oDS`CJ!M;zk=dI$9On>}|wWd&9Y$i0&{qlWzOCL1Y`f$8c^ZDBNcpc4Gu;1QTk?PlLKG=L!bWlWG zoZt7T*Z+E%r~N!-9rS$LpT9@DPdCuF6wGd)PWp|0fqbt|P`ddqptg~R2~falP{0Hz z)>o51H#}(tx$2){TeNF~VE$!uhz(z~fW(Rp@dY1-s5i7bB?8;>**9%3FgFwC>g(nC z_7t2ijkcfWF4WX>$j$zspGHaj%^n7S8TQCavNl4aOt#4KD7Y>O7(cN|XKLWbrubif za3+Qka+&JT61YOn^XP7`_P6wOis$oivh?-r?s0ZDq8Uk$-{*aA@38Ud{&c$ckN5N5 zqwM|@<;MU1Jr!yIKNk7;Uk~>#=jX8m`Q8s7kpxdI1odzf1Ni*Q{5wMMcyOs#{F+)^ zU9$Pb;h!wzQQ7hN?guFl=yZ~d6spce4uuG@lUUZw0`OF^-;`og@0EEp=+&8J%H7xC z9(iZ_Oi)uB1(Y$|cr;8iKO~oh$2J=Xdr|zMohib_mFy(t@Vma1krq=Pr6VFCRP6EJ z7Fi@NT-CXLe7NeLacH%TWZ9pVW_1O%Afl&9GejA2l)F;QxEIbU9IflJ%pbYS7yoN)8XAnApy@rAN+5US_KAA}2S*yS!K63hGF z4e8B|#+9m*4Kk#Sf-iXzCaHw$LhVT`_sy?!=2?*KLfS%t6P_-6X2`L_LP_?A?YGj@ zXsZbaR+RbZwB0?0l}|4IGk2d6b80GO$7G`x%s999-CYum+gjI)K)i7ujOnR?DuiFlqec&s4MCmpFjcB}f|O1vn8lD0K}SX)k%ECrQy14n zUri}57C$q9{;}CGpmo4|^e9-bI&m?}r(JM+_|mWP%jN>Te^(KCaWpc z6fVIo37ZE%CSGYeh~5fQ!L#^V`mv1LrQ`#e0|(;|mC7n+j5pSv%-AVoJ%sK0{A8@G z$yzZFK(%Ip)z~)PY`SDo)Tw>6Y0$FLRYNkcHcUOSrLs^9!>!9eiyScgfRjk}%l%B{ z+V89>He>(AI*np#MVuBrmfOH2gWKhc@%U+U0;%Vu7<`{@AmDe-xAe?e6pM;fUm98% zHXJK;chqb$yx-JFKDl;tOW^n-3xkTYAO6FIJJ@fJElddepG`-jsXA3t7OWZXwZeN@hIpOFm=n;b4eBC@e{Jc4{Zz*i*Le~hL zkCe2pd8F{Qd8mNYP`iTVT389-hSRQX8`Jo2O84-;w{;Dv zaMWedr?}te+LQjc5%AOMbZ)_Xn~eoVK4~VxvdrwzSxx5ST~VhfirU-O?6_>DI~nBx zGQw$T_K8ZPP5r;q-xi_Q_bkb668lkEqj}p_*IA5D+5cdh99C=4kK&_T8WyIyNw?pv z^G3O8T^^EA94=dQqIO^wouiWmUqv&(B52{7A(>#G+F^AsUa;C3`JIr$?h!An`agRY?+| z78OpAnPQnNf|QwavRB&jSGVg2bw{3*P;f@Gn57H4{eTK%6%?bo9mFOMQw>biA0(3_ zH(r%smQjJ7Dj+P&Jg}%l*NZr$wR(#8K9(?bA)`0+B=rLQqfk1Qyg?41uut)1E4#;8 zWJ}7U#b8V~OiGEpIaExCLmQqll^%2Ajoz)VFdpt~cQQ{W?8w}u@GVYG6O)wf1j3qP zK8GjFc_W$<$H+jY&cbfTQyO5MWsM_2oWW~kMf&?f%fcx|1$+vr)W$Q6>HMepKM(5u zIS^JsI91qMCFkVHTaX)7YP~XM=cb&A9-|AwA`|PfS@KjQ>h|^M-&TL}Mwmjhs~1!) z2uKLYQ`U%3i{7P5;)@Kqzcb8X;VoXaD~RKF)1=yzKBMWz=e5_i`K!K$hFzRd#o5eJ zmZeai6f8}@F)(pzT4#>A;FL37#mY)-1hZucbfGd2BECfs{k39C{YdmE%VD@rEjw>= zUtu}{w}Lemv_A`mBK9FlVV=ji^w)x}XM&gn1pfGzjU8h}kheCombsCIQ+3BBRi9JA z>XI-FF&N?{x`|W7QZ*T&ex+bM*jp~4V3pD?Q|Osip>^WyT(3lx|b`}suxdB;l+Q=S}@AsvE5yUp^3@1 zyX*E#o~|&_GlS{}tZ*!%4zl&QU+-K0U%ki1z4xvCUj=;kt+C_m2sAzYui7L{FS8n5 z3AKIxSMM0%OCwaUYa#lk(#)wJ3LShRfS;Agi6ogmj)JSgY_gIWa5$dnMP&F9V@S5B z>P#9b%&wadrKX~NQASkiOT8+=U>U@k|47C&Nsnpt80NYn-rHzanOVYsYSLd~u%$Yl zU`viHG~O}ERjSyL67@>KA4Y9*2`wT~*USzYt&JjdJNBMWX-Jg=#kGCceE2hsUSId? zgbE5Z>BoW@z}|~L;Opq~aN1!@;CuCD_obZEBLUG84bo#O$$;(gCL;Oy?G-?%pYPA* zXYuiJ^)Ot$T(7AA_3`w0JB#07iUxW4eoGbd>*ZPc6B$~>5R-@ zu8t+Ru;F_P$&psPmMW=^O5I?KV3BQmW6N=wP`R{8fT29?8oXmkXA?jEFFokxR)swj z>1E_!bBeGtuBp?3rXgbFNqy-+6NJP8Xut)sMHiO5;DtVc*nYARlecBM|;`EIK zHDG}M-689Pur7Uy%q2p&H86_xPLvVnTk&Q{f2s-MOJ=|bOA%dsQ4OF*Sw&Gj68fjd zUj@GUtAO`vRE6VVGrm+w=dBMT9$&%^YeuyoP|G!%r0CwaZb!~ zhuJObZy;B`x$sWgH&BK{wO;f0w4z<3MXC6}bK(b+Xz zzY;GOCTj*$`;J(my58x&ddBK^w zR?4iywQy>H)VwWP=6n>t+hnEHkFMdkqH5Yu;}qNSE&Ie!yLNt8Ney~HMn;p(d9=~F z>R>|+tQy;}a&2W{Rh9)!9KVxX1@4_`Rc3hb13$|lru531e0BD`eq(Km?=-iBdZgU; z0NMO;9|Eya3|+)e+wvYsv#MX=t1iolpqGq2#+{EkLG{1)uK6&!RW+B{2Xm^TiG3XR zypABK+rZppT~ebCxw4M6HM}HEzfab&An51!T~)fIEaWR|@#^6?tay3!tyb~p&MW8r zPahp$+k_2rEdNdyJLXI73dDV)Aog!IBGIAbt%vX-^_JWCQ-E2t5vJ6ALyY~Q57+?z#4%EFN zAg?40+wr*B_||>X3sCsHp|SJa7V}pPL6l)c;=tIj|y{+DkcP}4Yr?M1z2Y(c9zS+u*od{;5Hay1o{-2&&fQw_&Hc9ds zo)oFb&|>zWJ+vm$%juiG+E^IyLdNIjs+UfW&7Eea*mAny2o%gH!hcLg@yzO3QpXvw zy-z#`dPv^s$-0>hHWjijVyJqsjS8!7DizSJr@_@m)#6A6RWQEl-CjxkwHV9d4$HI0 zO$%l-*{f`-wNwo)DC{aLB3Wlbj*r=j)*{R`q(=hE^Nudi9^S|4|{lBj#|#V zhN=*p<8|8X`M(}dq4Bs|XzAWXAN8s7c>Jg8-&&kWS{F>8c79FSM2$4y!#lCfF}ta?i@ZZ6XMS z(n}zh9fE)#apIXm4ITNBVNON;W2?`@QT#QuCm3694n@3GPI(~d0J#RxXm-|Qi#@Uf zx2Y=`l}!LorliJ^z*UOs#hd_AePnG_{HJpJ^BK*oB!g5dsTVilhO4TXiKQjb-x1_v zCgw|vXvEtDL0}h0KifYW>*tKsQw}y*;K9NJ^!7uLCP4WE2px-cR zu7@hHb>Bc4T{XFS-$3(f^gEXiDUd9vof&RBzX#MR7H|6=e@CqFcsdO>$^w@U4AJ zH%N15a_ooH0usDTk&@nRF#H~9WfUZpN_kl z*O?WX7Au0fa9cHX*?HxR^JG+QbvVDQNgPiaI{$GyWa5>)sacVH zEUdHqWY$_4=PliQHj&~px=y>Rj=H)J2`*+*c{GBVj%2t+)%{9?xQc$< zle=r!xh7X*7W)3Ib*Sl!iOfmdKJ*w~afjMvdkO_*qPSUQ)|P1(G)>0iQZDFNUU?Rz zvO!hVw1_!XX}d(~x&O{u8e?ePp7-n{n_LORwG6JDJKV31GI*WS)3;-*^|Z#i>=j(s z-5$pwx}ek+s9ESds(!*?mlX?Zwz`ROsOxFEj&jfe78fe5sW4q#2N!u4Hm5cRcW|~! zV(S$SiqOevQyva&L06}AlElLcugCO3OVCD=V9rT@gnN`j&;K6)p+H{0)%TKO7{q>v`f{2= zwR8E9V(rLaift2~5?i&AVvJPIS9OY9O`ph6Mo8B@3wq{6@sMk{y632hVJIfFJ;l)# z1YKlKwTZ2o?!=ios$&@wZDZB_)NXEC_Ex+(I++V(6+oactK$pkug}W@x6aAbDb#mTBu|r|NsLdI1w3 zx^`baGq83hbG#in%!+TsROYQbvPK%`tz$ZthTsIR1azb!6FG`*8j7l_o}!wXD_fcl zC$8?AvS;cx)Th&_>o}I;OpvY{o9ph!*eIMuTQHV_tzj&~+m*4j_(n`6#u_7eG~s+j zt}&Gz*K$l`D-&cHhAf*%hq~$-x}#f`twKlDY#V8+?xCrrLVJRc=ONuyjA@6eyYh7w zL^ccxuAmIS5JW4KB)*G?LxGwk$n!sg$RoeJWf0)SGh1@MWu;44a5)raeu79D;3Cft zebP@LM<7D_>BZ6E>9Ygi!5~G0ffI#U5(NQDa=a*nc7WIf!@rIOfPHWeh_9haMNt&s zMgE9vajPVZu0K_Xm-;zH? zT6U-40DSqQrF8+cQP2l11=zJsTUIMJfWsLwW z<5>b-1kx;l8JgXYqR*oQ9OuNOk8vA(m$rn;);V$#1TzF4G6nSrz|aNfQ4sjy>|N}_ zjL9X&b-`M5ff|v$4UbWPGE_%Vpr^==2`exf;LpM+!9&MS@i$IC9$JZr0>2QNU+}n6 z(*k}5%Mh-hAK;-!poHIj(4@;`MiG#|DxgBwR$yb8WL%+u;#aOM&S{TgBneviWXpH% zlN5R&@E3kYdYyiFN#CF1*9Slw4E)k$L3L^|EtKboa;ZY;m*2N)WHz~x=?Pq*06AHd z02l<(bxIU4g6R#2eUhOJK;ZhGhmyk4;rdSY82F1gN-`K`xy~l)6ufwMLL0*|AAlkG zJshx#xe{iwzF5G}eV9JV@$fk{-#i+yLS!g6;DE_2T?36j3!sOtOCkI)S1}-qIHn~T zQvi3reZ#Sh1`ohl;$u@HxM^rG`kW>3uv`z8gCkA^xbzq3wbO0 znEDzfiN+~n@Ia`nOATa3Xe6*a#W2Xz^6b@}tmcWUgjFEr7-c9~_#sNc^&DYF7o&y_ z4-5*DWtf6%KbwQg%b&S4jRskEliN<)p-VH@4-16kXBj0KtKemn_`hLH0XU0XaJbB( z)PVs?Di-*ExqeD;{r3Q}GJZ(ZVr>XyFqxt301HwvS1_w!;fLq>W{NG4lpP|G-VTQFiE;uR5y+(^DxmjD3w)%+9-6={|zJs9SM9VO1U2U*p zhqPE_z2OU;0Xas%P=a(GEdv+W2vBpu9RT)M-VF?!Aj?=+Lf7Rgvx2k1q~ka)=gc%` zs;Wv&7J+5T%#srigi%JcFt$3FHRGqm;C>7sMdYVk10t7c9dWq;GPH;Tn4x^DZa6Hn z7=oimhbbaHk-BNCQk`<+Q)N@(eTzb2ldJ$P7GF9HhO zU&SwRfVWz)t~CshfymrCgBf zG>q6p;{;2Wbtkl=RX$p(BNXH~1tojLTn5Aud>tiM)C$Xu2(rcpc#<2fbCws78%3^E zx<$I^)a?JpK;p>F4MA?x=ZwKt0o^|bDJvw=?xPk$0eg@$7%PY<0SQ`Qez7LwrEEF^ zZ)4VjYzlu25c`+Ckmzr0wGzNfvINFsw-GzymOBD zjVK9WaKaI!!fF-UOZkTbFhpUh4cVgAkKy8g{mncCLwD}P!xmUOk=KFZHIMJ`5`g|Z zIXe=)U1<&kfCPrzj*~}4VGgJm~QJVQ7q>&^;c|`tioYO^~8O+c%yg4Z0 z&le7Pk7N;uqj(um6`tb7ZbnTCEU#?odJ`>~ZDpW17KRa$yD~7{@$y_E_jviFYeW1fC)( zj$FwPy(n4GvbdG+F=?bHcw67RJ%0A_&Ee~3e2{rQ3fyz#6@!kvIU@@=JP<}<a_Y>HyTrylhdaVxZ%7s30Z4Ds3@s$w7RgC`vQXr!1?s|JgTAx|&9M?% z2l>w&Exf+Moh!L8oS`IIrcyyj8+P;=cc`BcbxUM8MOlW87yg3#T0YEC$k*6Wn!TYj zG+4kZ1X64p5M_lj;D#xmEF-%a!&sMbN@$@|6&C$m{n1&6iYBRLKouBUHV>5{TNco5V?OoL zJoiYn1gN1kW=0kvyX<&rRMJGy`Babf^Z)*Dg1rCxzlUp-h7*MjinDag;Us3v`QZ$I z46!m1^hhePg5w8t;_<_ol+6);{b)evhYR|X95yKn40k}CB@vmp-lZr3C&%F7*}IeD zN4RBJKY?~0K;UsNffj0gRbZ%ER1jBuVb|XR()=R zpHTcIJqB3O8q3r#?>nl^>v)==n$xbl---4X*dOA0Vnv^PMc>20r6(&r$~l z%w)?EU=F;A2;n)HQ|XaXpRDhd!1s`I;{>R!VR->zRdq@1H^IHctOHElV*pbCL*R#g zmX~;p4Mjhk;qmJ)5P%u*>47Z}g~82ez<%W(+jP&hA-r@zu1~i3mUKsfNjh0ujRtJ5 zr;!4_@e0EmQd3cgEFCcou1{jKVR8ff3@y?Tc!sMimF6CwIb0#&W5s(Nf-6J}E~vtsKzD4`wDWkGrWyR?Bx7igdGr%%{^z_!h`pU%l7zIr`zcnGaWPlvJi2cMlNqXWjC6m@Mj{-O47+IJE*G7%F+aw1N$`6=nMKHnO z7zOa=0y$CWrUyWg+1D5)KAB`I@3DrAmRbJ6VDCNX2g?Lq&J&bkg7KGPuhoVARKi`V9=h*MXy^pw;*|ukSZ$|#L3H$|}6MBm~n@gI7Jr$AeS=1TsdqM9b=pxhh zEapw9_aWp}VOH7u2M?&{dx2n>0zU(DY$t;S{Om853rv;qy(T|V3>mKqF)R@yOeI*x zz^0B?KO>_eZ5~nW1ILsH18T9tQjAV{=|TDyX5f16JJfgV`FLnV!khA9}W^bCB>+g0VlwtNtK@u9P5}{x2P46LO`DALI)nNqL0V zSBwhc>B|+yN$C0xUS!Op>+TIHc7(Zu-EE6s{DfDJpNRYD({mUEHgv8oqtj@Xz73xx zNtAs0li0wcoLJ?@OicnmEF_KYd4UiiDtDY02+R`bAa5B2H+Mump`FxvR+}%X>t$i> z!_`!;jl`7ufmmco(|UXZ;==|K*qREuF5Nr9WU|n)d{S<;HLOYpkQ)^T)f_8Bv91sM~&)ItQ7S*FFnuyOwseX zjdq=%mKaeEfNnsU&q8cFm(B!v7$4m~uf(eImf(q(ea-iGFZ@LupogasbZr>G&_T(g z#{mC)%6>lPp5v3V$KXxmqB9!a#V7LoEA=8ZMk}|(_O?d%vId+b(F!-ZC0LA301J3S z+&t*lrJqn$*cji^5OBODSzCo2w>OEQTGN`K6rWL>CIwu~iA+N9fUrTuRKq5d0)rI{ z5?U;rDez;qb>p2G(o2lE^Vz)@f;;6)J|Q( z&AdXjZd9)^AEhn&b%Ty2yx5>%1w32oSjzEM1>2%zOVUA5gd~E$fQgdqpi&lVE!>VQ za-v`)e7ji21cwl4@CmOnK0T)YUf@42kItAG_3rrWlL$^1B={3sn#Axr1Q4%pis-q} z1v8WtdY?q2U{QK^eoDTQS)$mm5?W6QJ|NgDP0HQ0g@z|VjHIcRwIAKhElmfc)ieNL zj)1UZMZS#6z5A&^{R#INJ8p$swzv_xA)n#=Fh43mJ;1_>#}CsCK^H`xP!BHsDJE5r z-WcH?X5k!|LoOS7JQyUUT_;YaWRX?SUQk_?htlz1Hmk8H25wY|vmoguKKqqs)Kuiu zuKS1iRw2erHqdbci;>1DJ*b(5EI0})@6A>r@zu9$F#1_gTnu@|`upGi8wjCR* zfgfIpyrc1WqEf`d{TSF$HZMZMQcM7$0+u+>47+6(o%-Qbo%i|Hf5ZBzPYWpy6M9xwYqo8efJphLTXZE~@nbUpS>=Ko!Y@ zHl^zu0bw2_HzXa!y5PZs%3M5;(yW+=#W{_9DF!Je{biJrlTd`H@-97}p-IfNU~$nS zWMqbySZwAfh#VLcR#KIy7-sW=D2$-6fAObc#Zypr2DAAHbR!AmzW;IQ9reMIxx&Tv zGBzoNq;ufEp8#c~=#pH+M5Eo$$N~7$N5KtNtBFsOCHEJd>2l{}Aqu#f3Kklz*cmf1 z$-7||7EBcb?(+1aDlQ}N6i?VRl$1p5V)aNR3->_G!qi~7cW8fPK`Lm2JW!R2Z%JyT zEJy{4_+cOxNlw-+kOZLRyDsH9%|S^V2-DR2=zkFb*+FHl>zUZ_QXmNOV!(wN1U%zsMIYw}A21v)STZ-fC^`T(Ox8)-&QjK~ z4_O>qO9)p%PrgaXg1Bq6mUjKgR%JR`yZIll9Ij$INQGD(Zh4zGAWS$UMu_pdQUv_e80J!JzP02bL<-`?;&5pA)}K){hp!jL2y zii}}-n08Go_jIVx`qukXF0v?rGX#$E^ErjKE+HWPqZE;&+MlFPkAZs=!iDc(vyA37 z!OSE_CR0H>m%xY#BK`9G;?v_&=u3_QB@Ipl)~-4}Jf^cbIgJyfh@zbND-?p1wu&~Y z4!;bE#~8Wbp+Lr?#~_SKpu`9zVLW6z6%Uqql=~-|$fuQvIOyU@5@nl3^;|=G@I66G zauf%k&wffo(g~oycwF={3**VZC%>HP*j+5Im}lAZZSf+51zzhCp0l9IU${o72J1Hy0ponfssW= zQxe5+#?Bp-^xz>mYg4m?2NBV|qe!5xFQIGljF?W+7~>`)I$q zDEa>w(q2w@iep?*C{YSieq2YwRHW1e5A&uSfO7=h4~d_lx7c7UntwS*08(ujc{z=| z6?mpWX|ZL|%A3^x4IO~#bo#>2kyBSfM3yd8BC%Gb$79|ffn^+p;1fv@vkci;iBC*Z z;eyrN1xNX6gwHlyGH_?iVS=rc>>8mEz(5TD9|&CT!{nT^q(0YA9<7gy#3Z-}Wg917 zw$a&+Q(jf`V+!2hhFKujUlO0?kY@WB7Sk65*&_B*@bLWbwPZu*3inff0Ot`OF$`%Q zwMV;{BgQ?AVbgqXiA_S}I~i59;M#*fED zLpdJB?--4h6tTn6)3K?VRt-u4IP)Yksh{g&gK{QLZl#LZk#u)rwI__9H zsM14=I3ib5Fy5@~X41~=9 zVpI~Q#F0+?bI5%RHEc`Sj4n2Af z%9%&kA{YvwLsGReXLyuw?`N6EdG4?_ha6!?4|g1o;;D-)4R`+&C6~H+ zI|wlM2k$Dtw8i@uV~+P;nEy0kW+yHS8E%t2T2NZ>qV5iMS}youQ^U#0!!dL*{sMlZ;qJ8xJ*if$tC^urt0tRfHEUs!%`TYMXPoCVcv z?rxSpu3KNz!kasq)!wm}t61-QxJ^O1g@Ve%pb3u_;@*tF&ywn}EUQu1vEHI_7xm5} z?~6FXD|B-JmMKc|9cPe7<1KEaSrRSd@#03xiwrhwdkL4kFexh{06qyZR(|OEE8kth z0QbxlzcqnmTS_w+I%qVY93~rRJXvST@-32R6_Pqp^d8~295j0r!z+|me@Oqg!eM8 zzrk`rci}L@ohVGR1o|Ygd9O)~re*ZQnS@p}0A~!-)SrbU#Znl#X#5}~ci_>3tB(fw z*G1_Vs~~qNfF3zHbR*D2Q%3hr+Si3NUYi6%SAt>YOZ?5F0spIk$SjJZAe!A=#CS*^ z?MNv@#)(!%A7HcWX0TyW32X1&UgqkEyNRt?j>O)bX|!N zAY~DeL6kWXp+UkLkNhb?O8NNFKxjwauYN3KV^&6rEK@CzQ%W_N1cp4A)rl5E{_gtv zdQ^H}&N|7{BJi#26pZOrIcZBWz|kPjq;N0*55NZmmg$mQ6_Ow)S}aiLl7J&2B~6h< zh(XdL7ZC^$Trp=I$xVVq-tnVliZMI$$QNP+@fXJTSzK^4JjG4gqW#(za4AdQlKW z*Cc8F0}xxwU973PqJlK|_A+7g-hAW#}vdlSN^qAVn*b zzyJ>o2`_?q0!A9{lIPBINe~YUbXpr_30*hOV7|8IJht=w*&9~<2%Kacss`*bEpn>P z554Fy^9V%C4E%4jOz)KEI4z;&<3Hc8nk7 z7dA_)IBa$d37N+S0IXv17@}w^<93o;>Y8q-V^Lg>^9!$|1c;YK=eN_bg5tTq^_Pm% za_uM6S%t;glWrcmD9n6F!zNieT<+Jwm0gsQcaTvh!ACg`Y{)Vn6i>BI_qL+tjGtQI zwqovP0eRUXI`PU6f{SZEbLN6$9(^YFM7S(fa{BS)Y^CSXsZC$aY9<7x6>(F9)Rvrs zl?1OXJS=xSs6tiase(YrSezfcra3ryRwEku%>8F^2vXlg4iv8U5xiPtMNo2Qv6UEZ z6}>>rqt}h)5r%|fw%l8loDlhCSzj^1r66Pg9*9xMC|ngTlKOp3pcYD8T+HDT!s{X5 zY*|Dk+|I`^U9Hj5&;1}j%2VG_YTU%w$_rfD$XLZ8{%?dyU|;KdSGV9w?e9#jxl=K} zhJ%K=f$80b*+IN+nrdZY_tD5g8kqm}%^CvHUFMA99`Snez+@SQbxssI%P%e-Yw+Tf zH69Fa)+A6D@#k*O+fWnYh3ngB3jzLCl}3qoLZ$4EL}LFH_ZV`I6kf6USoFBRNg`em zdNGCTC-nHd5H1=-EMG?!fjFU+lsbbWa!5XN+Awm{V(y-iB)H7=iv+?b6tqB<0O8A! z#n6vOs}$EbY)KZxmN|fsKZjY~uh@9N^Zy)$Ws);IJ{U4~!x)Jbr(xDGj(M_cIxP4R zY!Zk7=lN~Keu9-^E>nU(j^Ji=9s3DQ2q_vx^qfd=!{Qm3#(?03p9wd7V#SWF4iZgI z?#)a570eL0xOj>6#zymL=4U0-=^S1YSdNF|0PMI6S)Jzw4*_`!Q)KEA3NZ)WD)fk6 zX+g3p6yppVjU+^#tnFBxR|v1tuTYBR$iXHYPfaA$PHU^u@Qeq$Gru4kkoZk=YiJg8 zYSW|7F}dE$=WgGa-a(z~U<5w-?#CpBpSUhAk#xas>fuIT<@l|r4vWMS#o>wS1Toq; zBbSq%5rrd2dw$TMl1PdhsbVUpy7Ddx9RNkuR7H5(L=h1kfjeLgh?m z<@7yZw}a8H8?8G_-*7@6LpPmvCknOiVfWVK?))5gKbtI0qD2P%KrqM(n=FWC)a{eb z{TT4XB0+TJ_b}Af+e^Iub=Fc&V^>oNbhngp+>K_^mR3=YbSs-EhrTKLoV}9`Bo{CuMCFt z&U&isiCl$IhS)jmcju=U>~djYM!;Qg{1glCG6{qYw{ztBY5!&=7_3{1NYT4()B?-3 zYxi#!1MJo?R``ya7KO8DtEN%Fj!mP5@2Y9v+|g4E#&OAcG|ul!8h}$?O=)G#1Cmgo_TQ%e;m;?cvKWv5EV;229x4C`QlFY zvY9d(d_VrGPv?X_W-nvpTPoU zkVXRW;K?svibfFf*itShv`QKMjw$*bgg(}O8PG8(zrKT1bxB&sZiWS*M0FgegN4HpT@21lpTAigFhGp1UtZUK0chKRibyJ#gBJMJOYnQWygGc{75d zjDSF62vC;zj>zU_p`(-^oxOXP`GNl%nO)9M;$XvWhB!MU=FK^0d+6MLXFrS8G`n9n zUgmFT1&1q?z!?%M*}&aR6yYYJ&=r5KZ6Q4nxX(r|isOenw6g}4V zenn50`5y*B=efS=*)adhhANlmf5kHO`}zM)9y0&4d*-v`hMu-8T$d%!0==aaoUnbC z1Q9O)Ua}H@KtOkC^LsXJh|OZ=AYoZlT<#WVo&I4Eh|~Z0d+>rLuIFBT7`mdV&l2l@ zKNf9<%KSyHiDna41KtEJ*q#D6W7cBBL*_!n_*YgfUB-WYRANgluwncws-jiwe?`{S z`|*Dl4;laGWF%KIL*|2lr?2C|ChW4}wgH?=OWQD}cP$7hGNDjMY2+m^oFVWn26zm< zEl%tlJjsoO;$_*mDN5It3e4os3s6iLsZfRV#~*{d^!R(4Y)sgM6EmsRvRl&gCxk&o zg=|-(TJNZYsi2Wj`4Q8FE3eTz6aj~nOQkmEI%&{|4-DUu4yNda;Gyd~8Scfr`>Itw zs<5!C7|B+Y*e65q?OMA`Fw6des`KCC>7xJh%$K*L|5eqLYx>_*?)Cp&JZt?wSgDmg zK*Ui=#Ni@8Q`g}2VOvOj+&;OG4I7;+%uPXE6gdUWE|gC0n;m>B9Dsxu3lkAPImQyZ zmULwn{R|gDJFZ+eiu?a92B=VE#Lw|GlDUpZG3Bm6M?0MYmE5_MAe!;=rJrU|a>FwF z2upaOzNWGiaelubAz}eDXMQSl&AQGRaoE#_zA`C#F4qjbATR*b*xgoL6U#@K4dp5) zDX{*R(s+Wq{07tc2He=ZLDH2`w7T`YjS@VyD}Z(sr>P1`pm zNVav8lkshuB``y?8@!(7i}K+)q5?Qdy6o1!NU*<_zEPCYG0xt@Wa`=*rlHZ zrg_j0z(X=nJTQC{WdMQ|IZu~^XE!ko@(~8m!+)fYhD8;RYJ3JcJe5+q>+VKcM#Oc2-*mvzupL%#``#G6H%9+P#%LG&kB6FXy9c<@{?n@dAK5VUd;9M$9^%{< z{r@NI_`+K6KWH=Jn5e9G{TKJ}cJ%!7BNc+*pTDYj{kf>N`25*t!Q;>IH2M2op2Vr{ z$){#RlvPlcocYXrAb$CWRW-v2Ww+)I!MBedt@HkuDc|V(m$q~M=iOJXudCy~00-ro zS$ASJ`uQ>VHVcFnPv61%#69CCREh6zXYYTU8KHl8xw5 zJz?*su}SNUu;%@t0n=64G6`#0-m14@vvhA8^i(nY3f1#1(;X+dmclCx%$P0IlhjW? z63?fJ4s0M@8#+XH;6p z2zpY{R~uWxcTO36DR48#d4+D$h9>;Z4(ryDml6D3L&Un+f9!nFSrqur%@$VRdizh2 zO+~Nz|186}xBu?qA^yLoH6Py_vCH$^nRA#Q24kAvoQ)l4EcOM_)gmB41v{k$WMy64o|WDBI$++fbfD zVA|PYxYctfsKFr3y(cv{$8Jszan9b@bo>v={33eg(65`z7se`qEWV@%;D3i~1{nUI z*xas|(Hg|hINog#Gm@os6>!QQgQBi(lVrEkVS=DFsLjNW$)XN z+7RUUROy2s+qDk`#eV!Wh@7j|4h_J(OGdJ{ekZ$)D_r{NvsEb zc2HbeThKRUuNG^2JCM}f``El(tG{Vjcmk?>V(8>qO~E7ZkXlKYJ&$S)jgm&NkudZL zinb!pKF3%fh_|r193-7z?U5RuoRggO>xmK98VzpPTR521!$zN6`$((#aRYGK2m8LfM z9pq>&hk8lST1@+voti9_>=K$`fE5!m&$QYhW~&{t)udK({|Wh6Hce|KI0<-3w5ZK& z_~rfFc0ae>&uyJG)BW6bKezpr=e9eY+Dd-LKilWn#s8Ndc)OkWf6dft{y#-A@BM#w z@eu#t1#+U$g~^S02o$SS?#K@!=%S>0E|dsNtIJO~CRy4Hrkl+K5Bi*;B!t09n4!cY z`R9dQ;MQ%%I@l15fG{FuP&(+z5=}Lv?Df5t{b%ubJjonCD)JnP&PmV~qC?!F1xy}s z*r0X_3X7EUYbnD_<_Xt_RXSI3NUp9aZ{9SLw~E7VbX61U^8L%155-r=m$N%tObCmSI*Y z>otWDHZiK?`K(-@1csHMUcq{(5F-|>ae)FgxmxQLmW~mvsjn!vOLfBaP(!f3#!}I> zb(YYy2bNZep|PYbq&}){v=hOp$#0G7#D-3rT-FMc)IA-`GU@AFKKJ&wYI;FtS+?Lp z1vXSqgB0r68b)>dkR{e43|gtGZyJ?1!fK7bYkRPh{kL*%GyjL8%2qA^hjoAc|4yFT z`Tw&b13bHMl-yvqZ8iWh3pED=#w%xI03eSTJ9~d5hS%h2>K#;>jIh;;OXqXdL-Z?n zm>&=zV|o8bqifC}p(83|CW_|{eLG< zul$cN2!#3JeR03(UJn9Nld~a2h{$0jGDwU9BH!UMBWWth$rd3Rh=vfc8y3!^0DVOV z2MOWjBZFUdI55~&L+|r`HEmtTNiHA7pUEG53$8sBi6O-H@owGs)DK-hoZa_gziN^w zKr9g`jQtl$w2aqqe!!E0isPntNZgVthXb?O|-_Y;J|D8NF{|~=GcT0ay?$%v*0F>X%)%E-*zYa|B0P$C4?+-88 zcD{;z7JN4x&o=oUIc!U|$Ks4=soL&mM0sPno)Im#?w0aH<{ezFuB)4<0B^K`o7L-p zNojuakMB#TC1KqplX*0R{-obFPmlQ@(xq2_GhmbbZ&mkyR8>*$^MBpRBiR4q`nvZzpd3n2_uZ9C zj3~wp>xPnxpmF`cXXo0~SzAavYNI6F{jQY;XF{ctn$M=u*V8HS)}9w2oyLC=xv!b z1cE{%z9JX$zA^}|L%c^_^pz$7Eak4-B@^J=@E8T?7Bc~gL#ab5z$K~fqDMl&ZrS}d zWegm}Fv)y!btuE#nC~wy)!KvWk$$q>7fWQE$CNSc?e;iTH zK#^a7-4yyda#88<3^|ndkXBt35w5r!o+IdfNc;@FB@sT4!0+JKWhABnEv{`Vp(Ymr zmoAPcRAo^DX9dlp)c>ti-*h^C;SZZ?X$r%n*r_Gm({TB*aC~C?Q8*2;c}1|v{#TW1{zu(X@6Z3-$wTdbZu(~tztydBSSAVw z{Mt7@gvY=SSy~`ec=21Vf1CL$6mGuzt#)drAquGdJP!BujlTznag6l=U49fTDK3_0 zE_~>^!~}uC5&x8@d;G#~iDD29_rg}`9p$Cz?BylVf=rR6V<-a7l7BPz2MaB&6E`H4 zN+OeL2y2ej@%P|_(M~rt;vl+tg>KlUFY~&hMV#G~TF-V!yEMImv$$cm@P=1n@(cX+ zpwXrl2z|=n=#mJ5DZrWZH$6P>saR2#{l={3v60Dy4rRznm5!o z;%Q;n`pv6hRVOqc*ml3F<8D>G)@9gOZ@=E)2`RevMq2{OFOBJKH{xky=Gt_#wccPD z#@~Zul%ZsSbvikzM(=(u?UVjLa;Cc2E~R3$a=0HyNTVuN)5XIpRZyPcin_=oJ@YMo zAT)~j*xKUbWAN=fN;5HcFvE^tr>%Q@59x}60FPpr%~K#h5~Pz!D{V{8k0GXGm^bE8 z%SKw)v9K|{@4B%dB=_B6EVTXoXWK!4*Jo?{pIIDTHUu`s|5#Qv{!cf|d;9-Ro_znW zWFq)3a$v<=CP_b2l&swdTxSvEVa~3+&%Y1+1#u<}OAbT+^#p$$B`A(kKZ}wZ@W&qq zYYJv?2LAYCNO7JmgMcP|s(2&IFmYatIJA+oO#JKy+uP_fNsyE*!^8Alijo5$^Peni zS{|TqbubX72NbSO{dB{m!wXfN&m5Y%kn&$-(L@VNg1e|xnCW9uwEUSumz*(QN@-|v zm-XT%DixQ#F018)r5{2Xfn-xraY>5opHY%G=4m9$F!!TA}JqF*d z2qWulziMdkN^E4aYltOt;g|#|1cj*MdA1}meXRyUTAV~#%%~k#plW2poK?nAomZGO;BJkPv3}zee81%T%APItKb^YwrT?|s z`cIMX&wt#>lk0!x&VHC64<#sc{BQ+_%n-e8 zJvtFKT;$NhTBJDgfRimSloxIld|d)qN|RS9IDuLAuOk;70M#(@B#@y6o7*ICg>G_t zmAW_MCKLAFtM^xXy6b+K^_u;!%J=dAck<-=KTo8%tMe~UtJvuJ<6oN` zfBf49w_mwf7pGqtqU`eP?ehb`fiblGz|VXhFa=$gM@dQG&9lpohsUo^-VA#92Zdym ze?{+LELeIL&ezk!*Mz%e@hPeCk+safggH)=w~;ZiQco5<`$oA z^nc#Wj)y@u=zrNV>i!?|{`|+CJZx=W*D&7xoR-8ZEctAEd2D&TIq5fW5gdTu>5dLrxN{3|o@MdJfJFU$ zjLB}|RG!G}<1C4t@<;lG*t+6*5YG<~ZR9vx#N+%sskr&{Se3g$bmen<$O(KD<~RN< zli;9qn@{zqhLgY;v4LJYVbNaSEG^DD{426Q=Djqk9Bs&8<~wEl5JV0P z=24pEZ>z^%0Isa59{ha#7{hG-@grMn;2&hc&~k*}Z|1_-QvdIB{jaL^^}k}?>;F4> z>iU1z^}je3)Yt#HCT>{&^KTp0|K(y`*8gRQ9oPRo7WKkB_g7rh=OVGMMZL(6+h5dg zh`Py%=^S%Ir>ha3nV*bN<`gQiWEBi+fi1i-ycok&3m0j}Sq>bje@YN^--f}>0lBGe z=g6E6u{dk{_pjss_`5&b%>Q{e@5le6SXwpzk1pTm|GS%~&Hp1_`E-~5pW^nX9?QpO z|Btw$-M{~*$;`QB|4+f2-Y5R@WqJEqzoJN|HWyb`)f&pslp0#R?tR#=>Y3R6)L-6? z)omU1tIYJbe&BEG)$2C;zgO^22mimOR@Z-;A>W_>xRYmX{0|l0Jq7+W4myc!zA*>i z4t~9RdvVLB`}kkQ;rJuDU2@O)9~D`x=6_HuL%ARSck#5@f9xvKyEOgCb)3pJ~nOsvQHcKeoLjg zZ2gu1c1!lqBk-HQx%m0w0gTmGGBwEl|1!~8!OG3fsn>i~!S+3&+;_LAcLezs8r&BmIM(G?T z$Q|VcIU6Z4^y?Z)6&xO=KFZxBwcrbE*Ko)#!49}=;IB}K()28eY*JC_Mb~%-X+tfy z8BMXJ{kPBjAF`=b@Bh=4`~1Im^V~xIkLub{x~Jb)X=zga*3dmsOEH&2`Y?*s4Yy?6kb z%2=;Agl&*!?_NREj{d#eWmgN2tWZ+&^*y=;51-KH&S$#z+W%XR{~jKojsBn7{ojV7 z-OvAb^5pY>F}Qa105y)D!UvRpZt?=gbMVG?K+2!HW(`OeSpB^5)diLhHR5J9k;k|pQ?q2#!`j=jvoSt5M zIJrD}S?XgFGT7>B(TS_2>|?qWzl+|{@1i&RUFwbe`0S^n(|51y#M$2S#{){S>au0u51?Ozl19XWsYE~T+igcnNz37)4~2@7Xb7>_s^eA z@gJ6ERPTQ_l>7DHojhyre}$FXUtz$5@L$7tuXn%lOC~Dm1DG21mO;Sp2ifd{ma1nO zUc;C}7pR0%wL4}<g43*DxLKKdVh&QKD<;3UjY;z0+cd-DJ3)%ZVMv+m=+@8s#F z|DQ1d0J#LTPXf!-4`=kg@T0@iXW+%Vlg;YCE@4GPcxA8FC)Eo&+yDHm22It@G9d#K zG-;^e)g&D`p+9m$#~b<4c%=-P&SIwVVU|H>ju)KAh~$6sqp(4X`JW}M$g0@sr?>rg!Y+=x z4eKwzVr(C_A4AsD@)PgH+u81`Ub6QUSbZW_>NcPFwS&bc5cqAJ_zRfaT(G~XS6Kc^+j}AKBS8QBVkUn~}g)Bd8mO$|Xmkv<5 z`>`rD%|f$zur&5jX^^ZbPMFMiTp@@tx$6kaHClR+K|5$vh2mC3en}_?VCTv>o`vgP zCz$*+W;WE2kv;_FbMGZJc7#QsSf4eadLsBX{m;@ruqd=4c~n~ojvl= zCR9HUn@OYR>7Q2txE8J0j1|Q6&VGuhR%c0N;~H}#j=ydo^hwFL`xuaM{7*8JYh|mv zt5G++TG}WHQHD|{afjehnWkd@q$4>wDZ5r&tcuGkpRpQy@3=|!%tHu0-jV(YkaUf^C?H;C3$m^M}RsMg-< z(ybvvtWgUVFia29-(r+{BR| zX6aA}L{5bd;w69A$R^w3e1ElTH9|kLYQ&ze?E|m(tMzcC@x`^cpPf&c>*uoS+Y)!$ zr@xZ+6K181cWoBblBeccFAIc=y6d0-NPt`^U8Fe`kmSJZ+UY`&07+w)#h6>)mbu-a zPDGtr;7lDDpd-XDvjm`a+e}5hiT__&MhvrnUO0^v_R#3G*zAi*6;ifs4s( zg-vIAQ@GH3`B}?+J=A2SN_B{s+58PwYWcSFl2Fuc?Qf*wNv<^VSNTFAtkWY>B!H6N zr3FREs@hsRN|sH9qBooCPYc1? zSXGr}Z9}l%p2q#t{psWXjaN?p#Q(MIaT79+U_?}Xz&$sc)>F286k877<38M@=M87td z97@BAlZ+Ev_d4<~Ypbj>p=eF+Qi+n1IZ~;$xmbY>FZbw5tx@EvaR$xHI9{E|rzpwm zPEZE@u;;G6&_o8$mq&9HEJo>k%)_~)m;@LP55N^dannT$yDxy&*{xgNb+K{1+IvX` z9S5c9>&Qj6B!bgOKBD*B)nW$ z$))~pr3$9g=?i~YU6R%q#ZXbjGz1R;b#@CnV^|E^SrFMU7=mv_4~ZZ$G=Q=Y%Hns4 zRH0bYIpMu+5%-z@xoN)N{a@L#l*%-k2`sK&;NW+}K;LKZ@|X4v+Qkpk(KC5;m;1D@?5% z#``$s`m-FYcOK;=gXzVkcL4Tz5;a+PAf$W7oJB>&Dv<=Th}SRv)TF&p>B9##Nr`lN zYN*Lrw-;=t6jT_^i(2e6RBGy8f2E*$m}Bkj;?mnv(?Spqyv)s{G?eq8f76h+Rj+f& z%fa5H{(O#t^5$PTL0XY@rYw!?`c!eeX1eN?A1~ywn5*>E#Z6q$oFv}SmulN$xQ0O> zp&a*Y&R@Ufb&QX?nr&-P50nRLT0!$7*R0s#>@p=zj#31nUJ{)^E-stKc2|a-+`KyDv!@663RD|9m^{T7ZTOpqHLYA(H zGDy7=6WSg-pm!8rJ4y;yJ)_x%nRS5a5Ut;ZI2$1x|K|-i z+IIH>ZM*+Dti1m@91W&l{XY-!WB#8jnB{3K9$R82CnH_%^AT@2=zgD_eL1FuuedM7 zhPh-r>hv-9s+Q&Uec09ZVW(~*8d3K}ULL(;zTMoB_>Pw!dSE|-u@37%-KH#|#lCdP zyuh5zFi)98kWR03L;b`1mi)u}UtSRaK{=y4L^g$lvJf6txoyt$0UL9sN4L`!o?NVh zLS5iAVN9sN;jx&)CKE`7zHF~K;0l!R;uXK4U2|9QgsHR>KB%-K8AMW{n zP@Vhv;cl~hkk_fW?>~g^E0@Uj85c9Z3O=SlVR3?#mp`Ir%^Q?>IglP$XB8*%PD;f_PO-ol@55Ep%Z4ENu}n6VxrT2 z4M$rHTMTlwef9EMi}4b3Gmi^4|qiq2T$$SD_eNwxRj7` zIxsz!+@Q0frm7njA0J!mnG;!MKw{L4J1CIV&G5LcjqF5TZm7}3NGrotZXe&U4fXoZdLA?>CrNk&WJN<9Vp&sD?C*Om9piO-a&J16{0Y>t_8@W z3M+7Irld&QrLjaCU=e^_0o>_y_L?V$;XsX8rY2{$l@P8JN0D%~q<$QpMaj~Ck*~m5 z4YZL+7|v78Z(79q^Lf_7bac;;Q6}Tn`7~-}c^XyjSDYRleY-yWcFkk+BnrG!4xR%# z*q*+vY8LIF|3_$c6u>k)dPDzv-6Zon|80x^?GGyXAEv$0SN;DXem4CdrkR$!T}HbU zS7~+*b}6`to(>D9*-tnMwM@rK9FMEA9v@?Sd`yJGSZ^nJS|wK}M%1jlujH&=-d;Me zp11CXo{n3)UbQ$SU1XK6FEd0+SUM%>BGdhW9%P7G9mEu^{S593 z^20-9C;$5U+`q>1zj^wnt@+>kV>ADI|Lgm&5A>7gKPiH12q-%}n)|}!rOS=xDDX1~ z5D`hs@)U;d!yki3D*>-N$TCaR?>=RntDIy{AWY72vQfNdrBsvgvm6Tw>t(_;eoesr z4Q}}9zC6p_ic#5F5ge_K^i7gN0^_WV{_m(Jqx^%&)}EjxOn zIMePg{--w?nEBs_!~WO&zYp?bZ)~0Ods^yM3Vu@q_(6)5WS`E5e-yfShtt~#`(c+P zP+Z{N$>nM|p0}p+WqGt{!`oxhUH7#lzVaOn*5z*)#lSlRUJKX`-|4P%&~W&F0Gn*K z|F!&DJ2QZ-@qdF}W&cmVzW?swQ<-Ik!# z@H83u+C5hrDgAb3|8l1)fQ);KhT;p97)C!yQkTr*^3*EN=+nJ4vJro z^#sd7@uEu^63-;A`?m>PtzmkOR|(7b_m_URf8trZaa(7!tEX}h7|dYiYh7ARP0sL_ zFt{xygJitFO|$7Jvx|0&v)z=MFPlnTC!Pzb%hu zD;KJ(ZBa}zKMtTiGBwQXD|h{O{WatNoS5!8|I27PHTC~NZ}K(%<3WCmPd$B~_~MOi zc9jFqdHNQ*=uY;eG8QFNfagDYp+-@dw^Wo+kJm=lBrT@H0_ri?FYe-6ily1Wi?mpd z1LwVw(kfx%f$_bf7YR`d3$b*~&dbw04!~r{{)txC`FxJv1Fz%RweY=jmN5tT1qSmx ziZg*4Q9+R;Y(ctvzd#P1)z4@jba4on!NAW61O%@jGvGK^=gT-pFbesVqX?}~ z21EW_IwD|ywqZ;BltDrY*~GPRMV9AX_!9gmUhKFhTC0Go(p#m9L346++v$#950}l&cFz7Zv|}EU zV^V8FV48bhiKi{rUR;vXR0HESn83tdr_zDmsLTY=@~ zLS;P*0-VPgWeJpn)Q^N{ZC)6=S8?0w6}vnsn6`S7Rx3_|N(kYB3u>$2`4A=% z-mHqFSi=?cq*DArPuSxI?86m~33R|^rPr`ASd#e}oaYe(Y=e9)D%fCmYOd90zz1tT zLLo5w-2avwcrJ`=T-hn0>AHHHCjSd~UH0GN{)-3ZzlZTQk@tHTm%Fs&0$s`lcG?Ik zOXT-%?#3ac{?|d|U)cppS7&*K7chn?-FYQ-g2X4}9Zo~S?vFzl z!mti@2oo5GFb)vAnIge-QT!Y8rquPC!Vr-=b;uy>)Yr;Sksr?P)SG~@TYorS;Jfz6 zVVM1Wbrk&xf6e&6ObL3Q{{O+SH#PIW33t#SfWOOt)PLRo3?^Oj};{1qK_Shil}Bx5r{t>bqo%Akpr+MNcfhzaci zue@3#vC(?6X`Xuw&e8XPRRjqR&&ptu=ZIuHftdcCPknh^RxNvif~-iXQ`QoX3KjP? zE8Qpn%P?09Xl^+1MOGS>H*zITejH;qw`^eco~=FDFe%nkudhwD=<~oaulx{2n^OL% zGMoJKP7|rv7EuY`HJ1wDou@JKXVqD(bZdgInM0*9@Z=GmK8=w-v(94K(n_S(Vtsb4 zRhrJUzYFQQd)jU4%l39cw&PRR@2+d&JLp@-Xv+eb)NYozmgV!%z7>Acb=Y+$SUam_ zDwbWKbt~qYXR#`IO8E#xInV6D68@Nsm|?z=VOpKj57n0eQ3h9zhi+IORS&S1`y)am zWA4R$`Rtx@mG3~$KEd)8WN_7uwWst{=WMn7LpAw=%HqT*d3!z>^L$;O!w{~~_UYR) zNeYlH^TTU?;WJc{j75AZj};ZbEVq42d8xisqH=kdN~#7fs`v3lwk#%F zPd+54!qR6glj5*;k`y)2cVki6Dq*?y%q|^6(B%nhU5A4eXEvu!NnvzWD8E(Qi=-n? zBB-cMX3>K!{SKmugW0NySz)$VYwZ;X6J1SQRaSY6Xc7x-Q_r*>c34_%VMPFDxtuaH znJTPMyl5q?RN!B>ppqlpfellHDr{KJS^=nz1&hksDi&A6%$+AHTUl?ltjXS!IPbRa zs(sxTyLCXmKUOO`u(4T3-z`|I(n)jnDmRM3TD8xgeQEEFomS!93o8|1Eo`*fVKWw5 zLf)NyK4tUBE*+x?E?@{)QahAwsHFhkXW-ou#;QJxMCgFRS+&D*-uj%k?ka#Qr>hn{ z*UfKC$SkL?0PUG!^gFa>ulHO^5Kl?qM{GM(U@5fDW{mi22uPkJ5nRDI^P^`e&JzMM z4A|M_l4tgj_jGj;G)M1YC>oqT22@;t@#I(;HzTfvUZX4x;rf}YY?0*EGKqDPXLQ-p z4vaIH(q&dgAi6`bbp(!;PH=c_EVgA<>;rq;7K%Z=XGuc8u!j=qpcchaSb#JmyDn?@+bqFPg z)iJ#I>{Wt_cy|9$(2$>Jc;#m(@S|wMdO1J4eDmVz&6^)CUOaho{q*Yf#re~!xIXuj zvoN#>+#n|zUO9^y?{k)ho7i8Wz*#Q4ev;y(u5U-V?A%dY_HM6GqtR&>AN??NjQDX2 z0A`NeogjpC0FHt0h=dNpg+(#tuHkF+@ObBT4f-?2suMwNkJcd;`!hvrnR1@z*D-jV z$w5t4C|>7K(#%w!FyncDizisix5y5_KDb43c)@%MWi}wajtXkOa_{&t==TOA$}I~X zX@#Pu5-vvln5+B_E+UK-9sQ&haZ%bH=cF~ZTe)F@5PQe11bd()WnN;Ez2H}uH5_!F zC3uEsa?olT=z4uq-HI+vvt*N+nkhbOjK{!IgCUun350#uS%=9YHA!CixYgj)7!L60 zcJxX(4sj;B(udKoCqE3m0!r1Ywe9kXH(N5M%zWt-{tjd`G+HGQynKD`Sy2UE#-hQ! zWF1uL!wK)F%Prt2rC$2kQcnQiB`~{$=?bxjG|4rCh_QexHF;^F|q|WK37{1v*g|13BwOxV?6)8e!Iqh7LgD~Z>VXI zl$(BgH0YN2|KV_I=6@d#dtcvwdXOKx=W??|q)c(j9)~BuCoJr97UhuN(V63veOci= zR=Ga-4bMQf^qG?|&Evfpoa0p9lViyRBJM7(c{NZ8q|(VtNzBMxW7P+G0JQQKBL9OJxgRAch8OgEH-!l%D8uOneEM|isFeA|``y}-h*vlA z_>8!+O(u3DJs zj@C(hBzyR85G+?Xq~(kMdZ(9xj~@Xa6R$J(k$lW@ox~zb^dY--zQH+N_?V9K#gEtP z5jZ=4PX0F=B%ey25|8e{H;3TSGGQ)AlfV^hDe(zD@aYqOdnH+QIY;7;sSugb#TbJd z>nfB_pX%}7(s405N&{Tai3I`jEx%4;4p(fF0`pUSbzQzroliO!O6${n z%vkHyHtT!Zb8M`bJ7f; ze|(VN2YyHJhU#@bib1is@(N%GP;B08S1t;=^*9RdTteeooWdBkzaPZ5Z>g7<4OmH; z9ZPR}CbQ)IHO^U)&uxpBe5bhR9FF2F*V-lvc6hYvLh z#x@gNx*;W+@O_s0XX%1y?ns}1V6EuCt*Q^Jq@Rhk9Mhdfq~TN!=Z{CM_#?}73d%A; zG$adAtQD~@jfB|>u;Yy#;hEB?GY*7~}MW$4mcdPcw!!mI12S8whNx=7)AD%yb^W^F4i}R<~Mn7we!m=xcxf)QOTwT0=diCb~?DFh~ zi{}?N7Zpf;6j^XC;N1M(xl%WOuV(4g$8+b`12*he^ca=bk!DW2PQU9PJS0QLqi{k11XmpcUyPs+J;Z zVotXC-Z%fMJlf7XC;$n-br8+xz$+i*-m=W*feFo`wLDVeply?xCB?`e)nZp}5wYk7 zWViWiV;OS0z|Enu1(dy|Jm#+2_2SVN6D4gFRZiNl@7HoIcf)|zJT(_W5GjAn@o#W* z1?TGYs^3qQwJG{3N2I~vJJTGa_{oPBU2Q4q)~4#l5e)_3C-CDAbQDfFMAHh&rJ7RML+|J!Km! z(Wt}2?n&aT1r`PuWQ zK<1nZ0gKO%=a>(Y)~uevQ0ct~v^b`+P@dX(ERQV<^sT74AB$r(R#gqfDghNywdE(r zaghD&=u!Jaqc79>+`|96#3W1nELh%;|F_p4kInP{QSa;fuMhKk;Pd~Rmrq`vf)GY9 zgCNAgElfdxR|zJNe`Tpu;{XEmf2rvJ7pe$<_%Ic#)(ybs8R z1X%<+@4%dNQH(P*-*i|0`!_j(>6>?SSdcs(4@QII`q66s*10_>JY}_ zVbLz;4=!6u7)4T@E47sp=%-Y`3nchg>!EJ7FE$(EkGmfN+A(Hzl@F)j*MHt)SL*Po zzQzA)-ih*09#nNL?;^+Inb^{QVixakZn;SP0A9irF#2jG=*_#fc4yc|SxYEoBJ1`birmySAShpu3H2|?1-DSF%tu%+<$|bY z|D$TDb~jXWUdnscx8f1`Teu-L-FyUjjD80n0l{g;UJO1k&a28u9r-N08=CGcSB^7E zD0;*(s74)^{fV~_sz57;CYBj`41AvC!BVF5VRM0s?VdznUmg`zU>q>#;Woirku@bX zyh;|SA3`fNcM3{JKHd45%LLFMwLJBZu`YJ zgvDdApFZuWf8QOtKW9cg+q?4LcZZtc1V?zWxlU5(hvzsZS?VKk4ZvA=AN@u!EffAJ ze>Q~uC-BaF{$DHqUz#;~17zFz&vazI|2iD>zP|tZAU}5gbIJ0L6b?W6&Y|Y;+riz( zPPvu5f<-2yNKfx%zu#`WJz3m+(w~gf#bqM$u!syQHKLH!)TCggGKaz60TGGl#5dl$ z$g_1uV2;bAzM=7;Y`2m^?|5H+Oi9tUq$Ds_Cjp9*}B*vT|{bGd@!1AGthEWr{ z>{lY{%R=SUTz_frWuEc_Jpw|^^bnFKY+7i4p%@E0A}oM)!G2K#d`k|MBETQ#<0(R| z-78lug?d0M@F6O2%2R)y2S(H5lN4t-z`AMALV4luN~!nL&CR99;&rRvuWbc4=d3=D z0uf(N!Oi()C0eB{rHEG%s;19z1J%TqA;4V!-nReS@P8H=(m()gyZ=9#4ov<(9DaTO z=|O&+|FabZ{4N#3F^KR21-o&55hhgJw@*^E^3#p*pGrH`WcC&HT@-XhbN1+^2~%d> z^2+WQ&(wQV1(4EC*voolAvdbVMC21vqRXq5xb5>`BvHywk9Hc7C!fVK@HjZIZsJF5 zc5gNbf7hCEo#I(WAskqh7eXA;e{1Or_`<5}k5{TlSED<%H(Bg?iaOl`m4@P+i4l`_ zT~2h#6Rnv~K=U$^z`zzII?!aSahI-)^)yI8TX8+Rp zrp|}~SQ~F0O>^kUcDOcDl2BP}fFC`9k-sU9v6N+`+qi3~1nQ?%f~P8Hp2C}D3ds^j zVHLJnV@JRlT0xv=PL%cX9f2nLX`TsFE4D-2(T=eH^M2%i3;j=xrP@gg+@k*thP|;F z|2ZD_zUqGu@na_HYwjAY@c=mA`E&-To96!R&jG2vZl0VQGoYHrQKk(!eOy|pM{EOTWDz zLluPA@ea5zz{s*q>Xa0fGWU-i+lHmVyGr)o3enJVC*jCGO-~=h`7!^`cKN@PFQ_6-A*zzztpF4jRr%TB>Q=dA$+k_&uEOC0 zUP;RtLcS`o?Iz%(ie{ms`W}%C#S6yhbvAeOJvfWr`5OX~6wYA^{21uf(Y&}w zLts|C{$-;1xUS2N=`rb;NW9FJFnxyz1RRYFv(>(Qea>C=Mz`h&X`PpAn5HPSCK6!R zmhgu?c32f>e+Sj%1hILpRB;a62SSD->gwB^;5kmYSFsME ztu1UyX?b;3HqKs`Y6*AR1@xaqhm@3My7Au(LeKulK2}nAvHR)Fl~fotFTdJ&T+c z%9lr=Vv^Mkx;Oyje{=dQ*}nqW>Lun=!&~uxzu4AR*F39qBV^0ZI4s&JpH8b8$+iKc zvs{<~?2l8094&Dy6SrzyyD^RA|ME}XTOxJzGJQ>9Mslzvgvp>4~n+@5lKN0O#-nOnchtySWexjkFn zz@N{qF3z6(@aCtN*IEiTJ<(8o3L()~kiw8Cg)Gxf68R{mJkr|h)ytPRZ!XWSuYY-Y z_2hGOFK08wIO`-nA@6V+x^A_9NmejMTzkj#OdLP+_5GN~C6;0Gxt1msD`NCt)|Bhs(H=&Gq~_)TPWE<<4! zlu=T1rm)1(&WDO1uv^WjLxgMvXBI3*xG2K#{f*pzBr+P*-ckQ*L203X3@G74d! zJmy#SzY8!;5?LUcoiaP38IBqpt-l?CRdAFXSIbaVP9fbw>@wGjd0F*c^ZkiD8g-ik4}${zFnVwyZ%4lt~;Wa)8Vi;VMng!1{42( zMPSMkx(TH9z3OQ7#LxVhPau%%Um0bdMlmL&8J7Q>kZ6TN_*kSAdT^|nwwK^Eqm0Zz zo$)e;shgqI!gaxH4(_*b78sD&C-Qs5ulTb$w$Q-+%o6RZ!_+Dp61?C65D>s^D2SrZ zhy-_$yiEMxbGY}x`i`YE$>e%o77S@$VG$f+!J@WAC_0}p)U(+xTu<}7&hL0!R5pwnUT?}KTtKUE6lMAHht=Llwhlr!!R_}z{F-;e)q z)HCn@jYos8@m~+}`@;Nxg=}c=|KlL+{y&Rkc~JkKDhux9|5E_{QT{(6itoq&CxC7B z{~4WbbJDT;U5Axf||5p;p{kQ-t*`ga;c_jo7R6U3a ze2WvYEUob)mX+#ViDtdhoA|{$;Dn>ivpzfHF~1u~7H<$qp&xEQ=M}JyTlr@pNIrc6 zoh83M!WZ<@r~g)bY2d$^8_oMS@}vD(e|O~nJ2?Qi@c&7FGBN#slkwO1zX$n!S^hsw zFtm078p2^m>F|(_!29q4?&khW7N5iUr-;yP{y%}huF%9k>%dw%-{QJ+pj&}vcHRK2 z4e!>D!D7y=Rb1n*_Y7_wr|h+bd$5G9+MmkT@n|^EEYN!Oq23O)w%y75)`@W?tW1LV zvN5-XJMKE`?!d=CU@TjmaJAh0emsS{Ky-ONjY+qY%Kc5)4$eizI8#Q}(#2>4mZ+c# zCeZ*?Lm#8LJneeg)zf%Cy}A62lqNo7moBH{=jqn&dHmv-f9r8E@n9d^pLJ*sN9$+h zVqbl(f1+P2`#*&t+ST~qA^&&3KQ!(Ce(!7k#|Qa+S@u68th<>041m?@=b-;6gP-+& zcbmTiv&HNWXBW(9J$+ofkKpw@V=~x(m9Wu!at<)Cbq2g%VT+Mnh1SNbwscu%E^o1S z88lTT;2$Q#>4~NdDAT+}2PhV-eeeS9-L)U?$8M?xwu7a@+6yo(?Grwu&Fl#U?Z)tT zwIc4)hs$=@wxF##a#;)wI{T{B{Tuyu)c^7fMdav>cs&j^dj4hW`OjofdH<{b_5GKJ z`LX=pYqUD$Ip9zPDI zMH}n5^waQ8>qr57-gV?X&?Yi9-R{e%zM^>p(^YY|=ufnkHLG`rg)7#KZgvlNe7Ag- z6;xjW5P8)_;!4)1nh{S{?C+XpG!kisCZ@x%buCR_gRsrc!zaTP$&%U0twB8^gy>P zDC$;_P@1qY9e^sL?OAg<>vU7gjmJ!I{mtBhZSyX9a@I=XUT(X0SK9Q7Sv*ke`F;;n zG8Pxvj#o*xQ6}xctXgQ>ev))=^BGKIm_gD-_^4=f%CoJO6I|)e`ZkY9vV99Thu{(0 zwd^f`%7mL3iPyYEYJS$v%8n`>$I>66@lDFl#H?977Zu3zf#APUcB@YaHBo3E4dvMV z?M6+i{V}_-6nhW18=DK*j(ykN-<~@LuJqz{8}9Dg&9d2AZnd2^n$cx-lQrC8yKJzU zEp>0Z>0wk2-qSs38j38uKSe{?(%bZmhqnKk+5aqBw~_7tA3MDNHR+r2|AWD#|JD9~ zh~IAZzsei3B?L)IjUgVq4FoHxYyd$l?0+8E=ZXJ4_U9GGnR00EXUlGeyV(-*+Q3^x zc;-h;Y}POUy@x^qma+OW1Ae#YRSD!T8)W{%s71eg1R1_&Ph=N0%SRwineZ@rVt{Hb z2ReD>tbv?R==38IGPGtQWfhNSPTw*qW$j{^tmFye&r&I`@`^<%Pmg$87^<(duqsm0 zD|arIKKUEm6rjqs)n4^ZD>W61*Rq5qoSG$6Dt*os6y*N|2e&WyIQqrmBBnwm_>p-uu4NuJ;tw*(h`P_y1AHA}>{hIB6lHruya%{u^w(0-V zO8nPgG@gFl{}1tNuK%m@`rYqza~dE?>q{X`L9)2kyh)f!Fc$ zN|k4b1wM~~_YdzMo>zV5PeQsrKYRYP^Yn`rmG8xhF8W0fL6Ca@m$UqF@Iv9KwUaHctNDjv6SQ8 z-onynVP?HQr)*eU8VA-6?zCPteT&hX^l7bSpNK6}QP7v5RnXeR%&B;rO`BMo4i{y*te-v8|lzv}-F@@pjjsR2v) zvv@h=FV#{T*hg_`l6UuB5q|+sZQ4LdKHL~C6$19zt_rYEI~&{8E)0f3hj&5fu1it8 z@I-)yc@mQ)kt~r%F2E`7$|n0=dA`GQaU9rNe?hU6&G!F0KaEkmXy^ghvj6+N;mFkg zC&S6t{r?cZ2K)aPzWBhO;XD(r>l8;3b7A|7x{Y7Zji`U)FKXQXR~Tn?d)x|5RngfI zvFQQ+2vWF!?|(#b2)s`EkAH;!_2?s6`h)T0ls}*Q%h}b7ixyI9@~>kV1++WlAB)F!0wHh1FRk0I}oO6o+|` zAsho3uThHQ6^yg)-hZKZj=?g^5^{QU6ykt%XDEyP73v0fbtJekOv%v_zw2c9C}%u7 z^W(51dg;(!I!aB|`Tk`vrLVsS`#Jf4cL}2vVxb>*?PI(D*Es*}PljL5e;?-e4Y>5P z45l&juJZK;@0KtIvm8Ys9@!DM<1p!D&VSS;8m+)HdQVKPX-tf)qx6 zhSrchDy@9?<8bdA5W|Jf*xG)Q!Z~^mL!Q{|e;ste%Q)Hq9J7`bC6K@rL@0*cz3!9i zH`f_X;odjkoDnE^eSQr>l#;#f0%b?+za0I&?(ARb5&N(Fuv{F`|HwbdIzB1^&HUgt zPnhf@d*64-yJYYC?##d4`@Wm4=)ZA_7JJ|SKYQPR*M7?G!(BXiO7^-*ihqMaw%0`= z^pAM;6#ur@U6TNZ@aWILK%M*l{HL=Q&z?Si`K-GN@7PD}{_pq3{bA4C|GlsGKOW}y z4LD!=@d8G8@t0Zp*S)>HzxXUR;jz%RIw#$Jw?Fd!`j;dBuY2Eo^9}e_EBNQW)J7I4 zTjn#Shh%9E1v&Xi!e}b-Q+TAd9Co{14blPFAM^%;PH)&5Ob+&FUlcpKWB0xnSBpW& zPmK8;wUoFGL|z2Fm@bI(4E!Dep8$ea z5co*~LJSFG;t{%qKu*@M;qDmL?2d_JvUXb!%Vdr9$(ksW)t^=-YmU=E28Z#486brz zKW%WKJa(YGn;5g8Jkn7f*Q314ZtkD#Mr?A4`X|S`>}CPG*xYUzY+DQgU)){t(Ci5HK!=QT&38+U2h{H3V;Q`j(r~SQ@o{y2w{B=De#v zX-K@28sc?nZ0!{`eH~SGt=Enb^hV9b+Z)x4*Qu|y9j~daspBmyksqO-F>;C`{0^*e z3c=;8izi2~E}pPMCFVdOn>gSOjc2s%*~Jq+{9!Y#rZ+rs58tK7wN&GJ=5qIHhd;|# z35%{v{47|CRqwD{R0IN%Vzihhvh-6J0+fhp*p0uG(=c>RL(ee{y>`=Z-0e?wp54>u zVQB30AFiIB{q5q#Gr;{M;Agt)nZ5$!b!Y9T1mHX)D1-pd={GT*iq*$CZgZ7 zPXx!?G84R@^;9UfCWllv7u3wY`8$|F6feL#aooYrY(i?+2(^Y1jbM)`BcRBzK)^i3 zD?WKCT=|HdGMyy};d9k%Cii+hhuq@>bInyNX31Lijkzk><)AY-Zo@A7C(Q&AtzR={ z8^7cQt;gIm#@tuOJT~Yfz-bDDj1mQB4}c|eGgt>3_hdJPs~GoWR5NZHhu{S*$33a6 zbx$4lsKP5F9Nbz5OZP&MLP`j+J_y-L)>cC-&a%5fOZ!3gGh7cMl zLP#CIq;c*)e*5C}#gmJ(H?J?QFMfFb^v#o}uP@G@UY`PQjZx?ck5r7ov&&Zi5#SSo z7Su>%GtzIk)%tFBJ#vYtQEL%3GDOr!5mEh?r%nCoakE`8J+9jY4iPnKEuuz-h#Dy( zs^1xycDS&!zzUJfzlAK65XB_(qlg(Cd9q0T5c1=uG62vy9*2k+wH6UWLqv=e5uuGo z;oK5wIsiEslE47XQNTuWzHJ~w7fT+tX30Z?B@Y#r+*b^rX2jUg_?^}mze5*G9=2x5 zLxUv`HI_VR&XU=f$IT4f>DX=H4qa?`*qRLw4K_T~*l_=(-IzxW$2_VVvxCtNTQl0B z!DxpXqis9pK{Mep9h{gaD@=_8b0~c81ZEkE7X-+(W$YwJdgY6?i95@9W*)wqxEYD#=+Hxt-1Q3vPo2~-nVk~XRj{Udc`n%htpgB z_$wc5GuJq+&nzhTo;lXk2X?9aqa87@y@mwXb89yP*QOh^-gENrne^T6wt;IW4O;J{eq};>_6bpT(#_5P z9D?hcCl@c+6kJ^X=&ukZ42=#N?x~*pIKh7Y$O~EyyQfALaY*K{t*G>@Q9Hb#H7dG> z+EW5|`fZ(mljCNNo5``;ano}tv%S{JY|l_;dzv!acFfahvoTMnHDh)tv%S{JY|l_; zdzv!4^O!BZ1@`Gc%t15uJDIxKZ_lON_F5~qJwtByH08E;VmalF@Pb)g{IV+@;-uja zCv`(~h}B+evD!1lYEKiZy>?E6$*AF&M|ER%NY!3zsoFDyNKcchE!~BaX7M|;e$AL2 z5~OwP#z}WDHO4F?2o)cl!HG?9N&!h#1pg4EFve>-4-9&SW)VCTsTyUfCq5H{hKz0C zWNZ{|>rBvs)-$2WQVL0(iFO9aq~B10^_>EYBIp`(OQC(z9gK}JPt-BD+~vK7>)e~} ze3CP6cmg_hpMcWAyXLc{LU7U@jEwmltMl1TAs9DQg2rwoh$843b4!Kbq&pZIV;(7E zZt3+HPnyxtcv8nJ>pQM@voNq&w&t^U+u5qn)NO zZgwk!)~^|}T~nY1ZO7a{F~+QF3jKDT`*FXSMmX*}HA0G@W6V3A&)LR&tdF^WVjZ&} zWT_ajfXoohS(s+VUc?7^8huCDu9uh9H4Zl*E894mTp8^5g!o9-mHS9cDqP%p0EWh9^T!6EcH?B z9FR+2>$ld|`i8#NpI8UvUOc*LqvK|qZggC?>0CXDD_jCK~$UG-p4bpC#TS_i#+QO95@Af6|7A z>Zxj;y&W{q_8iSIK$phZTH!PVdZ}*qJ42`U=RUZsV}LH@thH`tsAgkjfCKZ~!;jwi z8zLeseX2?OD=03ri7PyK4g#2F9U>la!LghaJ{8Rlok#9F9w&~Iu#>h2VJBU~?KM)T z!Za;-$h6QVqyZSA_!c_NKbO<0z0XR=cc|j)^jPS$IXrF_Xg54|2HKrC&a6(_9$B53 zqGezmpjZ&W(9I0eU;)_$%Q%E743+zLeDuvU?O~lG)~R%~9lha^>Z_x7I%mw~Z5Hh? zbYGr4aU4~hv^}XhHkY?&9iTj?x>zL#=KGcL3^} zB6#*23^F37rQyzY2U<)V`qZSYJ~h$xsfn&nnWTYYp*1Bbo>7}F@;7V-GPHs?=Lhod zpnnTfKsF?UD@Xk9#GwpL+A2d6T^X8a%8>hb$dEqchSF#3ls*%O_B3g$Jxz4&X`*RQ zedi55V}PS(>g;gjRA(m+?P=0hdonKQPc-exor1_1V8g3%L-*A<*PZ*;SMH4)_Y;i^ z_uYvX2+ZW!EkC|l<0xOjAo9_w$n?+Cx~zlm1j}i7AAjh+kMFvU-}*NGSU18a8Yfof zL1DMjUXjOJk-u@7En|mCJ#K4Kk9CuJteMo7YxKz3IV#4QAm8=K zZ7^-7sSKu0O~sXxqIE_JBO%3D6Xcd$0@vI!-V_&$_yeKTbUxH{YN2Yg!!!AE7@Lga zW=vslT*DOXLcevY3L{g+SQGk|$zV6-!VqN$$9@F-2>FCSF87%Wp-4Kk)aHiILo=Z; zIClDNT{$LNr8i7qiHL$7Q>Fww*988)yLtBnimno`%g!uN^;5)NAzTfTZk5rWORlm)8TYJn(*0Zcmg@l zV=C%zJ`IKqx74t1OWAeoVe8nep%I%kRAaO1rrOw2!-n)UtfMEpmOH#_Y*x=0=tv!? znUFpwu<+bcX{kNb%CvPJSg2^fOnNAxgg6HLu~jxh4X@h{+}CY~_9r!XL2EJ?0i7pe z*ch`jRA$E#^MA=7{OLRmB9ssa5eTN@;=!%^hwv3%(EzOPBw+}|>W>laR4|mH=#pPRNP*hvx zt0vMpWlMI9Lcjv8Va$(``VEg!`tD9QO)L85PUrsWRqyU14WwUX(Xuz8wvh zTGU!AGL)j>ZfLmlf%fWvj>cd&G@O#WEgGgA-wh3yz-%cm2j-&mc0t3Hr>J$BA|p%D zKwp%R6Ak;Kv`!pkJ_8JJa~I zosFLMqT_M-jz~QoJ(peAYi-x{47;wU*mb=V9^mUh#lBy9t&N(VVbt^#qh<>#_T}ld zR=In+%H2~`?s`n@DsQiy$}9X5eO+_um3lA5<=BafU2*NTRa|?z;@T?}SBl2OiH2Qq z?X^{0jr>==QgN+E!>&%YPJY!h7iF>=8g@OXb#5jjHB+zDgD4sTusbzYkf=)*| zF2mh$aq*G%Y(z(6up1h7Nz*#DkdaxaS4x_CG+eCgE?2PnCYAKI<1(cv+o+Wnw83U- z$UP28L8Wg#_PX+KAz)Garn7>;jIhg{{Ejw$7qhFIO6>m0NhAC0l*5GQzuZVc%-|vX(sqdvya>@<7D-Ex-Hs`tpT{7o_y*XW$(KA&$Sx*nz?R24)8U z=NZ6r@ua?UNH$I|ZLQQyb){x%Dm9f6(e@F{V6>4Bk>zntU|5Wf`R|Jz2V?eFl~!Yp zQ#v265!#fcXqiqp6`7IntA|Rt_{;dBAAHk&ec=ZrTLz@#7e0 z?7Gl%L^4j{?D`4+lW$|njgk}xkPwkaTRhYjs&^1hn!QGT;(CmH>d+adZFR<}t}{*z zopDF!;7POafD;}apl4-9aqVSkeiF|ovspaG2@l6$yq1QcK!vCHnMfI!VtY((HBRSXCUVL%7L*P~H* z$cgJAtEt1rnYOiYrn-$YHEf*fWU`FoRFG0l$Y)`dmwvV^^0aXII!6&?fzHqm*=6xU zIp9A9C~)}rJ=X1Hr6FIKY1Wn*EQ85pjIu%-^HZ`#)Cn;4Jb zObv^#%vP+D=@ledngqVVO>lbw< z?0pGk^G}o~b&P2#L=;XlI`-oF@a-|__*rL(MYsf?COYtD2|Z3+S&jvk_K~*@vEWU6 z+R%r(J=1gM>=a|nAj!(mCB!3sPnu;OIdLT(5ePa*-G0GO%t1RAT+a}YC*mf#A2IiW z7SAP~Nntr){2%Sq;^|Ixd1 zU*_QcB)@OKg}5d`h2h@bk9o}F03$R@{dB`LnVU3+=OTh`TZL=HuGxSHGlvjWg340< zsyh|G;_o?TnurewTA|2KLE>i_Oyfh4EfFdDc;^!^%TdHca|+p|j+Kw%48}g~F2E!M zGnl=DFy?v}2hY4!R5cSqKT9{j50(h7DT)j1M-)f?aQ&03|LIcR39k5qQj}Sey}iHX zGnmFOgX9#v{p;gCd-%E2d&{amQKZM--bZi+6HHKs(+&6tSg_tl@EWGn8UP>nK6aGf zN9}*~Uku_!aUG70gH6-k-VL1$M1T)|g3$^*7t_LThwlAycJ<=o#j{gz^V7vOIREMF z>IPg~gBLGvz|T+5Ufh72m*9t|;Nr#g&DrzkPoID%7gtZuZ=U}T>+zc3huz!jfJ=5q z4+KjX+%iMp*WYs#+;->|$-p8ws$r*>HdT1>GW74+nc4a9*PJ1d#xzVOcxmAG(XhQTCc# z-u(2-O_tI|FB2F8ANUBeJ`z>QAg zB1rg8A_1NJe+i>iM>rGiC3LT7!wXD6J`qKhSB|tvuhELOu2h^?rz-a&DDme=*8Nbr9GNan|( zpN70w-cuJ`#GLIHFMUx6XvOR?_3tmnUCOakaG8%O+vZ5oIUz4?nPI5eU-^~G#Rk>5#0P8 zd;}y*DaZc^-g>WY&b_zbBe;ecD4sS2H)sX_g=0t|E2eAt_9^%%T(uO)hffRwdnI)P z{CH!vb_rO*l->WM#x5;PHvnaDMY`arA1v)AGFjq0DxO*+%vW>^H(f57%3KnGAA=b` zJn2fTsnMz6NxA+EQu+UpF;VG{Vv8oyG!Q^2G5HZ~-@!5I(yHvCKL($>Qt}jrAdf?s zaspxqm7R729CCi0n*FQpQVk2KdK7s0On?C&P+%PajU&ZeDnS4V0do{VO3B#{2>ysu z?#4v%93K{9Hv_*?>I`upge{eAI3QicRA*8P=V^zrX^nGt1m+zvVMpI62p`yIrOTcU z{0JgM7y0(U-!;3Jq}Oc(R*+>Z#Pm_HSM$vlp$ zOIVUNipA4{p|gv%ZJ)8^02=_~HA->JxYXKD5$%(R7YNJl*q(EOf6f=6SO+%oRP87M zipP&($U(hBQAFvCo9h`CZpUJognv&Nrc|~hOXZU7jnxE-bQG5Cx5w=~#sjpag`o)}q8)+#4_&#CBe27_CGsrh$oE1C^g10Dq zlM?@J4Rh_HnCg;bhrQ^>KvY(I8n`>XUrr zslt`Q6g2^3ZY(}R>`9!!7>44elFHCBrdeIgL5wqgYl~BbpCr7o)NsUpUg12>5`QUo zDKnfDPQarRex|k5(Znz#ON=XnzYDjZM zyM{E^Wkg}(O=&IhvnAmKvS1fHX*ZnNIRM=vi%6uPUR^z>fS$7&Wz%&M?@aQBVNwwM z>&q8~Ecv1o|03|PvrggzW7u7e;EyPRIz@V72Y9DcnjU)cP}@88j@C(hB-?sr5jBRr zQ;))8CIgd1vVF!23owl0FNMwRi{!ZIUy#SI$Z6x0#ZJz-Mj}mkN&>GhUv%BW=@!TE zy5QE3r%3#=M8T2~nWQb+Qku9kA$N5H*43Br2Pplq*-&%^PApn|KMbh~%n4uy=aeS0 zl-0~I@15@~KU;PgahC3AV-M2ZCX$|1(6uw2=8S=b;5Fk3bZ_j)4g{w6#Kb;7u2j3T zu#eK>fiZHs1D#yDRrO+?ISky_?R<(BMRaS_Q8S77N~WtA->!wxGdHtm2`?}FEU zghEN_%%+l!4uM<|oGLNbtkd}%#VFfYcEJ-kM=`a|WR(ENgguCsfi!2%oL_%U;ryTF z!NF~@2fGL}4t*5hIDkn;j!3YCVIHA)(Sd93Ry(5R>>} zQ}xtKfxcJC;n{S4@Q0Hhj4N-Jf00E;c;*h41($Scvz1O>z!g`(=lJJVVY7g z#*8;wL)w|rfGc+e1CnQ$1b)OvQY`FWBnkhOvbrz?KKKcz=wGyLL`^7gCK?JjrI}hw zB&r+8O(+JicEqBZw|0s#yJ76(+#A60$!st=8IO7= zlkwoh_j||icsPTzaM0_GLVq$D%^^JTXOrNh--o05nErEgyaQH}j-(}0OG={BJ~`Mz zP-P^cg9Of{7FuTBS3E9Ep`|jkOUX`g_RE?=m*tXmwkdU9<;dU`Zi?f3A&kD`Aifhg zb#+{Y`qV9B({0BWXG$rxA4A2vDc=yVf(`x5x4l-jJi%)sQ zf+@R+pJs^55{19UD3TMQ3=&+aO@Y$1t_PB*3+RGg&ZYr;<-Z4_WgYN5_SZg&7%jEw zLTj&gM778aE;cT>I_ZKuS)_glLDB3-oPsAs-{g?$-YAsD2-SSAh?++=W>VO zRHG`^Kl37-`-wk85y}uWHofPEp?CW0KM%by#R>fvV*}^qDK(2~p!BL6E!{wciSvva zmC|B-_UeLeYds2rqQfI{HvKQ(!*Bphb-Y(n{!z)LK%AFFJIb`Hh!P)Md-WKVPB zJZ2|AudaV6VtW<&&d&JVqMa8j5?xJ=%mx<|J`7`usolzT9>S+utfY7PD=+j;J(jK2 zJM+`IQ&NeL`TCCxUvzm{>Gku~(nSh>#2e?>x#$2Gbu=N-__iIrHbdC=NdW z(+Ai#(yIP~vgJ>_rmYnfY8(?T)`TJd9L2Z9t!x|#MT1`&=V{A?JHzcrE?=B#WY&sS z9dXWs;>D40Ky>_sUy7nj-4PX!zTy6UY6oXaC_f*FG1}ZwKl>=Q$@^;D-Znd3JsM%ac>^-G>jLdnKM8VDXrrK79wy%L?oVpx$TALD$^wQ&dwZSt8BAk8x`;EF&iw#Z?aNmLiijvA?j-wJ#zJ%0 z0RxMq;QJm)AYB>7N%!_UKZU1&g+k3X2~T!@drS%-1OA-Hi1he3X)+C?< zR(_IDv@R}b?GzHxl$J9dd-uKThhax_-^nm@O~EYaFbq2HP_|_M?D!n-ql03kl4)7y z`IquSiCVKvc(K7b&)i*b+YE!Z4mSC==(6Gt6>D`CMfja`1~Z>Id`~$M%F1Rkbcn)2 zb>0mD)9$)Jbq))yrCO(GXgVLX7Sb=k{<@Yg1ZwIND`J`x_x2REd_Dt|NTE+QAVI;c zG|%Vk;;}scrRMq}K&u3&nIC74ohc(Sw)zriQ&AaibtjY++j}b_hh3hZ$Wz7W*ICI>|Fk1+tCw&+-gMv`m>8&Yfla342-#r`aKo3Sz!_ z_K-iNQvRYaQCnLO;Ii*W^d5#kqcDshlJm=Vn2I43^OMN&;w`vKMVT=;#bn&K7k3< z*5HAL2*nQPEE)?Fq2sP(zc3D2AZ2x?8Q1=`_fPf@oprD+*@5rf41Dl#|EuM731n1Uaugyzw+ zFXUVQTsNn@OC-vXckv`&)4Hy8{HS%dsZI?&HM%fH+0OSvjLKUshG@0jH$rZf(1gI$ zI}zcU!E}XUPM|mqVY>YeiFhoqc39$iNLfXOhopIY$evcJLs#vw_RP6>X4QS*tb%EG+AKSuq>3Dn+OvZ!Bcs}k;Cd1?LJeW_m;3Ex48Sz`YI%PPqdwDcK&h>r1-u-~6fXVVD`W|Mg^ zoKE`v;Vc;S!{I3O2g6=4>J9wS@p!xqA!T{q;qPDxc;z^ek29;QtKNmraFkkeARfa3q+LkE_U zGsdCni7`3r3mj54JQ5EkDe+?W9w-*GFcyvp_rZw}x7tm~_(v!-4PCccs5A8-ErI{qbZr2>K^ue>58fa2!mg^I0z#^iJl(s~A6H!-DaypdbE{q71%_1Mc`dD{B@m`SJ!SzY);o1_?J9u-Ku@G~=4g z3Wu<;enb>MpRNtg)8auTaT`4SU(L2NZ+%o^)e$LUF+b5S1*MNLmVAnNk< zc~Q*{vIQeoSCi@MF3{qV;d$hvmCgLTm@{|(J3kgVTUdg;7|4bope+we>r@=A6ytA6{w7<(H@x9r-yRmHA{hqX zb-okP1w@5D%QKxYlpBW5HMnP&gxuAR-csm?EVA7~-jXe&xjLxIy$(QObV?)7(hEWV zGDzy=4T`r2-yUkwr$u9!S{&VC2~|i0uONS)5Jm)YVC=%H z{*+mRq{W5Q;Lw({nm7tj1U+ z>p%uqRarT!UWu+cEgwcd6#x9`@(?8J;1Ix7l5L)#^iVj$4$Iin!!pe&mG}HC+m7eT zPvqf)OOJReit(J~Wsu>_tKu$mE!2M>?x_xnPgGT!tv0-FXXPhVyHk;(qXgXq%cOeW;We%!Pp#57AggTxFT!}6RK%qJ>N^$bytMOX&N9(hRZKE(t zExD=~vj~(Ka$d0e36qR5Rh}IIqgcspT*N?9e2*xUIgZ#ZTwI)w^X%arsuW^UVBZG$ zZ5$x9%jX_*>>nJ)c*!O|yS7SS$4vuD@HT^CtrC~k3o)!Ku7yLc=XN$IDu zZG<%2x@j0)`ccmI@mo2bw|0a=xZa5y6w|`-xu1n|VdPqb5U%fI5!4y8E*Cg@W*xussxXKKm|F`qDQ`K_H)J%j6`zC(R%y z>7Pk40ia7>HKa?|OQ1y`18 za1l|-V6If>wCHV1Kiqk*9EyGLZsEo|^<)+Z@6bzl=9Sf^!}9hYtu~#a^wU2L#awjD z;nv%H1}gssW|J`@w-L=N)*8@aB6qT$jeb9~!A6#T%6$6vGo<38m~`OCPBIKw(;`i} z_D~hM6MtiUg($5m5FFd?3Wg}Ro)gHRLs28c!221laJunIdh8ch^_#J^6V6cya_MJ)wh~9xIJEd(1)c=`3(7mPwj&J+;O#Z~7vwnpz;NMa zFnJ5+&}UE0Ea(!j1S=vh$p+`_EQ831E5O{!?5-XI1jMMsj8^f>;L3f)zxA3kZUt8f z=9%2YyxID;t)N_}FK8JVs$c9PuKiSGI{Q=XU4ibGzj-C1U-H7Ixl>#H0@ppw<3Guc z7s!68OMmAZ;P-fKJHg@E)-)lOoE>T(#(%sDI1xp`AOZNGA>`VtDf4HKkoSK zUQkWYR>7)>vP%(WJG<_l(>XuAl665)1W}Z?W-}_2Sr!73aa4qBitv4YrNu=SI~;>$ zKDlMmneTiS@>vLW<$HwIFouM5s6~j_zgY6{Jn3*8TtU9 zbl+miGWLSFiO;=?NW^?0vSg}@Sh0yVS{5{Nc4_8t_S$w zr<0@D3bX92cCo@IwS(PueQ_arGb)G0gLi8hHg01K1{rAyiAJyWGRQ};%b zI#A0X?wuZ4O8a{Kvq;omqkXD?TI!y9UjK^bsrArA?-UKUby)4Bs&NjwqcS6Kf7*w= z<1h%remDtwC$stdWONb?rvV(zN7M0Sb^>9qKOD@D!{gCp*grX*%zb|_7>*|c-*UCX zKuD^a>CAW1t@P>uk>BPDNBkzS^7juY4rO*43acBGW!p`4-M&@3vB494-2rSJwxX=o zq(7^A19pUd2e2i)7PldqEFH@g?m+R1mDM3fa@NdspP(ofXQWj`x&XyNl*=p;{tU07 zI8qBGJNAR1IQ>jvi0V`^MC#3Q*8Tx4@)Q!Br$HsHBg;@qyweX}kmTN}H|q6zEAPBXOE&gx6lF7Dgp*9AfiZR3U?|Z8h zn#g6D!N;iILLQtsxm)8C%Bi&c)9$kz0tc`-J@m1q>i=}M@) zy_q41o;od-j3sr`0;r$*@d_NN8j?}$6R!enst^#P>WPpnB`dzh*#C?}9L-4z3gJQ3 zQ$rvR-Jc6msj*}^Jvb51U*fX%-Ks#eCaPm1fty}S<4D9KpnCxBs1of+HlhmcNPLNv zP)F6T5VLp=jW>h`-<%6zHcnO5X``_?3~ep}ro8U7C4R^JKa*Q;3d22py7Q)OBzF4z zg52{b_&GutO>Vsc>fwU0e5L|SEuTM6k6+;~%xlA`RQFO0rwhUkeYrX2qEUaxxFQVw z1yK(j5Tx-+tenq+xz7#lWb(SAr*YXcc7*$_I(O+6F01ZigKo0KnIC92hg+x^+V1yl*HH!WVCr(xk z_Mw%KHZJM9yHxhiWXf&Yy;q2sFr}oas8>lyK5*eWlfw0~RgkqUr0KPCnQJuTM(yuv zEfOW0!Q%5L=Vj5ezM8ZIvabw{FWKWyyMR*ozi`{2i zCFRW^7Q$D^`x2wQg|Hw(GbOZ$FO7K21cugVmqr7RoP)J%bRf%o2!Y@0$~y(EmiMI* zG$gWW$39Bek$@bPlnSYD1O*u8_9De|;*pd>=tLa(W-bzEsy&`{ie8^~Hg4KDp&hR5 z!x;Ov-r;wW*ta*`PE#YPUH-n;rWMIDydYH(%WvEuyIa$wN^t4Ftx<6()oDpqT(!Q# z;!s3h^IY&Epa>c5a;nlh&Eg~u{4w0`p)e>&umymSt)rE}@Z6H`HI_kZ)DKE68$ylFS&^Iq!AW##*<>uQVk;LvF_! zzekbOX^xMaQMu=1hsP1F5B=mpo+W%r;%(YayXW+}&Zz5Ze5(N_ZZLGZ!;iyHL*n;8 z4o0(nFboF$U`PTt=+4}MJL~m&v!U~8K%7x`hMk#9J_Y^WXf!(5GT{ZWZo&{f(#4Wx z=uxD9@sSPcc9O2iExa%C(wGmVb@5*QT_q2t>J*Ymca+hzz4FiH;W&=dcU|~(9B22} zar=XduG@2+e!uVZx))Bj@Aljad)jI?Un77JW^G^@kdwDPK<-MF;{t5s9|Nr7Z4-EiJ F3jq8n-RJ-S literal 0 HcmV?d00001 diff --git a/incubator/mattermost/0.0.1/ix_values.yaml b/incubator/mattermost/0.0.1/ix_values.yaml new file mode 100644 index 00000000000..701cd66e30e --- /dev/null +++ b/incubator/mattermost/0.0.1/ix_values.yaml @@ -0,0 +1,49 @@ +image: + repository: mattermost/mattermost-enterprise-edition + tag: release-6.3 + pullPolicy: IfNotPresent + +env: + TIMEZONE: "{{ .Values.TZ }}" + MM_SQLSETTINGS_DRIVERNAME: "postgres" + MM_BLEVESETTINGS_INDEXDIR: "/mattermost/bleve-indexes" + MM_SERVICESETTINGS_SITEURL: "{{ .Values.env.reverseProxyUrl }}" + +envValueFrom: + MM_SQLSETTINGS_DATASOURCE: + secretKeyRef: + name: dbcreds + key: urlnossl + +service: + main: + ports: + main: + port: 10239 + targetPort: 8065 + +persistence: + config: + enabled: true + mountPath: "/mattermost/config" + data: + enabled: true + mountPath: "/mattermost/data" + logs: + enabled: true + mountPath: "/mattermost/logs" + plugins: + enabled: true + mountPath: "/mattermost/plugins" + clientplugins: + enabled: true + mountPath: "/mattermost/client/plugins" + bleveindexes: + enabled: true + mountPath: "/mattermost/bleve-indexes" + +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: mattermost + postgresqlDatabase: mattermost diff --git a/incubator/mattermost/0.0.1/questions.yaml b/incubator/mattermost/0.0.1/questions.yaml new file mode 100644 index 00000000000..7ba698f8d2c --- /dev/null +++ b/incubator/mattermost/0.0.1/questions.yaml @@ -0,0 +1,3220 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10239 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 80 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Config." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: data + label: "App Data Storage" + description: "Stores the Application Data." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: logs + label: "App Logs Storage" + description: "Stores the Application Logs." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: plugins + label: "App Plugins Storage" + description: "Stores the Application Plugins." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: clientplugins + label: "App Client's Plugins Storage" + description: "Stores the Application Client's Plugins." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: bleveindexes + label: "App bleveIndexes Storage" + description: "Stores the Application bleveIndexes." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: string + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/incubator/mattermost/0.0.1/security.md b/incubator/mattermost/0.0.1/security.md new file mode 100644 index 00000000000..9a02c3d2192 --- /dev/null +++ b/incubator/mattermost/0.0.1/security.md @@ -0,0 +1,719 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: mattermost/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.allowPrivilegeEscalation' to false
|
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-postgresql' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-mattermost' of Deployment 'RELEASE-NAME-mattermost' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mattermost' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mattermost' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-mattermost' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-mattermost' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-mattermost' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:c8b2690480691c332bebbc47adf9f77a059006157c5c11614d9aa33311a0e029 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:c8b2690480691c332bebbc47adf9f77a059006157c5c11614d9aa33311a0e029 + mattermost/mattermost-enterprise-edition:release-6.3 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-1642.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-1642.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:c8b2690480691c332bebbc47adf9f77a059006157c5c11614d9aa33311a0e029 (debian 10.12) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
| +| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb10u1 | 1.1.1n-0+deb10u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u3 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u3 | |
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.4+dfsg1-7+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| openssl | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb10u1 | 1.1.1n-0+deb10u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-1642.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-1642.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:c8b2690480691c332bebbc47adf9f77a059006157c5c11614d9aa33311a0e029 (debian 10.12) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2022-29155 | CRITICAL | 2.4.47+dfsg-3+deb10u6 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
| +| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb10u1 | 1.1.1n-0+deb10u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u3 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u3 | |
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.4+dfsg1-7+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| openssl | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb10u1 | 1.1.1n-0+deb10u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
| + + +#### Container: mattermost/mattermost-enterprise-edition:release-6.3 (alpine 3.14.6) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/dgrijalva/jwt-go | CVE-2020-26160 | HIGH | v3.2.0+incompatible | |
Expand...https://access.redhat.com/security/cve/CVE-2020-26160
https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab
https://github.com/dgrijalva/jwt-go/issues/422
https://github.com/dgrijalva/jwt-go/pull/426
https://nvd.nist.gov/vuln/detail/CVE-2020-26160
https://pkg.go.dev/vuln/GO-2020-0017
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515
| +| golang.org/x/crypto | CVE-2022-27191 | HIGH | v0.0.0-20211117183948-ae814b36b871 | 0.0.0-20220315160706-3147a52a75dd |
Expand...https://access.redhat.com/security/cve/CVE-2022-27191
https://github.com/advisories/GHSA-8c26-wmh5-6g9v
https://groups.google.com/g/golang-announce
https://groups.google.com/g/golang-announce/c/-cp44ypCT5s
https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ3S7LB65N54HXXBCB67P4TTOHTNPP5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HHGBEGJ54DZZGTXFUQNS7ZIG3E624YAF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QTFOIDHQRGNI4P6LYN6ILH5G443RYYKB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YHYRQB7TRMHDB3NEHW5XBRG7PPMUTPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFUNHFHQVJSADNH7EZ3B53CYDZVEEPBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQNPPQWSTP2IX7SHE6TS4SP4EVMI5EZK/
https://nvd.nist.gov/vuln/detail/CVE-2022-27191
https://security.netapp.com/advisory/ntap-20220429-0002/
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/dgrijalva/jwt-go | CVE-2020-26160 | HIGH | v3.2.0+incompatible | |
Expand...https://access.redhat.com/security/cve/CVE-2020-26160
https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab
https://github.com/dgrijalva/jwt-go/issues/422
https://github.com/dgrijalva/jwt-go/pull/426
https://nvd.nist.gov/vuln/detail/CVE-2020-26160
https://pkg.go.dev/vuln/GO-2020-0017
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515
| +| github.com/mattermost/mattermost-server/v6 | CVE-2022-1337 | MEDIUM | v6.3.5 | 6.4.2 |
Expand...https://github.com/advisories/GHSA-f37q-q7p2-ccfc
https://mattermost.com/security-updates/
https://nvd.nist.gov/vuln/detail/CVE-2022-1337
| +| golang.org/x/crypto | CVE-2022-27191 | HIGH | v0.0.0-20211117183948-ae814b36b871 | 0.0.0-20220315160706-3147a52a75dd |
Expand...https://access.redhat.com/security/cve/CVE-2022-27191
https://github.com/advisories/GHSA-8c26-wmh5-6g9v
https://groups.google.com/g/golang-announce
https://groups.google.com/g/golang-announce/c/-cp44ypCT5s
https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ3S7LB65N54HXXBCB67P4TTOHTNPP5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HHGBEGJ54DZZGTXFUQNS7ZIG3E624YAF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QTFOIDHQRGNI4P6LYN6ILH5G443RYYKB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YHYRQB7TRMHDB3NEHW5XBRG7PPMUTPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFUNHFHQVJSADNH7EZ3B53CYDZVEEPBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQNPPQWSTP2IX7SHE6TS4SP4EVMI5EZK/
https://nvd.nist.gov/vuln/detail/CVE-2022-27191
https://security.netapp.com/advisory/ntap-20220429-0002/
| + diff --git a/incubator/mattermost/0.0.1/templates/common.yaml b/incubator/mattermost/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/incubator/mattermost/0.0.1/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/incubator/mattermost/0.0.1/values.yaml b/incubator/mattermost/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/mattermost/item.yaml b/incubator/mattermost/item.yaml new file mode 100644 index 00000000000..77419bb2217 --- /dev/null +++ b/incubator/mattermost/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/mattermost.png +categories: +- hosting +
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001