From 53bb942befc423562727053e6ee517c353ec84de Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sun, 29 May 2022 15:59:44 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- .../commento-plusplus/0.0.1/CHANGELOG.md | 10 + incubator/commento-plusplus/0.0.1/Chart.lock | 9 + incubator/commento-plusplus/0.0.1/Chart.yaml | 30 + incubator/commento-plusplus/0.0.1/README.md | 39 + .../commento-plusplus/0.0.1/app-readme.md | 3 + .../0.0.1/charts/common-9.3.19.tgz | Bin 0 -> 44150 bytes .../0.0.1/charts/postgresql-7.0.79.tgz | Bin 0 -> 93778 bytes .../commento-plusplus/0.0.1/ix_values.yaml | 31 + .../commento-plusplus/0.0.1/questions.yaml | 2312 +++++++++++++++++ incubator/commento-plusplus/0.0.1/security.md | 702 +++++ .../0.0.1/templates/common.yaml | 1 + incubator/commento-plusplus/0.0.1/values.yaml | 0 incubator/commento-plusplus/item.yaml | 4 + 13 files changed, 3141 insertions(+) create mode 100644 incubator/commento-plusplus/0.0.1/CHANGELOG.md create mode 100644 incubator/commento-plusplus/0.0.1/Chart.lock create mode 100644 incubator/commento-plusplus/0.0.1/Chart.yaml create mode 100644 incubator/commento-plusplus/0.0.1/README.md create mode 100644 incubator/commento-plusplus/0.0.1/app-readme.md create mode 100644 incubator/commento-plusplus/0.0.1/charts/common-9.3.19.tgz create mode 100644 incubator/commento-plusplus/0.0.1/charts/postgresql-7.0.79.tgz create mode 100644 incubator/commento-plusplus/0.0.1/ix_values.yaml create mode 100644 incubator/commento-plusplus/0.0.1/questions.yaml create mode 100644 incubator/commento-plusplus/0.0.1/security.md create mode 100644 incubator/commento-plusplus/0.0.1/templates/common.yaml create mode 100644 incubator/commento-plusplus/0.0.1/values.yaml create mode 100644 incubator/commento-plusplus/item.yaml diff --git a/incubator/commento-plusplus/0.0.1/CHANGELOG.md b/incubator/commento-plusplus/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..1c251843f5d --- /dev/null +++ b/incubator/commento-plusplus/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### commento-plusplus-0.0.1 (2022-05-29) + +#### Feat + +* Add commento-plusplus ([#2780](https://github.com/truecharts/apps/issues/2780)) + diff --git a/incubator/commento-plusplus/0.0.1/Chart.lock b/incubator/commento-plusplus/0.0.1/Chart.lock new file mode 100644 index 00000000000..19c4aef7a47 --- /dev/null +++ b/incubator/commento-plusplus/0.0.1/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +- name: postgresql + repository: https://charts.truecharts.org/ + version: 7.0.79 +digest: sha256:bfa2285bfb14d27d570012b68aeafba3ee553854d2bff12af4fa83ae71f1154f +generated: "2022-05-29T15:47:39.149528596Z" diff --git a/incubator/commento-plusplus/0.0.1/Chart.yaml b/incubator/commento-plusplus/0.0.1/Chart.yaml new file mode 100644 index 00000000000..3b0b61b752a --- /dev/null +++ b/incubator/commento-plusplus/0.0.1/Chart.yaml @@ -0,0 +1,30 @@ +apiVersion: v2 +appVersion: "1.8.7" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.3.19 +- condition: postgresql.enabled + name: postgresql + repository: https://charts.truecharts.org/ + version: 7.0.79 +description: Commento++ is a free, open source, fast & lightweight comments box that you can embed in your static website instead of Disqus. +home: https://github.com/truecharts/apps/tree/master/charts/stable/commento-plusplus +icon: https://truecharts.org/_static/img/appicons/commento-plusplus.png +keywords: +- commento +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: commento-plusplus +sources: +- https://github.com/souramoo/commentoplusplus +- https://hub.docker.com/r/caroga/commentoplusplus +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/commento-plusplus/0.0.1/README.md b/incubator/commento-plusplus/0.0.1/README.md new file mode 100644 index 00000000000..f04484d2c13 --- /dev/null +++ b/incubator/commento-plusplus/0.0.1/README.md @@ -0,0 +1,39 @@ +# Introduction + +Commento++ is a free, open source, fast & lightweight comments box that you can embed in your static website instead of Disqus. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://charts.truecharts.org/ | postgresql | 7.0.79 | +| https://library-charts.truecharts.org | common | 9.3.19 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/commento-plusplus/0.0.1/app-readme.md b/incubator/commento-plusplus/0.0.1/app-readme.md new file mode 100644 index 00000000000..0df07aad03a --- /dev/null +++ b/incubator/commento-plusplus/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +Commento++ is a free, open source, fast & lightweight comments box that you can embed in your static website instead of Disqus. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/commento-plusplus/0.0.1/charts/common-9.3.19.tgz b/incubator/commento-plusplus/0.0.1/charts/common-9.3.19.tgz new file mode 100644 index 0000000000000000000000000000000000000000..3f20020f4d5d572f5205e6145ddda3826601ea15 GIT binary patch literal 44150 zcmV)vK$X8AiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{XC@+jd{;X<4?loBgfZNq75n9zL;?-rdEF4n zV(0!K4@~e!lu}IM30MtVFiFhM2r@)jD?~I%al*vA@3T1Ie}M>3Q<$#7jHKW)&5&Rq z+FFn$nt%mk37zzMbIcamv>T9RkEIz3M428;653-aLcJxV45dBwUb12f2fQH-07p)FZ&0J?wWV-sz zf4mrU2jgzP)BmQmgg9mp$0!xR&=TTk0&qMd|Cs~sl62kzAcnlZ76Aar(kMs2P(c<~ z7_fDMCK|ogO5<|e-R};LTaPsUYW}Zalp*>+0-$#O4+ewre!n>X5BHzu|D!z5K&J!V zB`E%Q{ua;#1$c%75RiC==UEE*TyH%C{~4kg%p%4MUmyggC?Yp4lAw5%#Ai!5N0Sx+ z0@j6qu?B2`fGPlj2&0$*%nP;vNKry4W+Yutz1cQ`Jq|`k)BS#943aF0KtduMtXn|*Iu}1C;B5Amu=5mA-l3L&_A^e=4;f6uZK-~P zQ#9ultLdJ@Zb)(ivjH@l(5peW-yQacgZ}YgWaxbe(P(zm9~|u;9UP%>ynlE+9nX$t zhvV51nvG_I>F97Y9S(=nqyE7m>K_lLusOtcsxAVKkSEt{@}2W_Jcu)X0zE8 z9S-0y91Q|^JUl!I&~SL%A0B&$xX|`i)Qu6N3qsho)YbK>scRrNq^>T%8CJEh7!Ibh z;ryi3;S|mKaL^yXY5!n0=@6i z!{hzwY;-U@JPOhA5elY9`)GR5pY4Z7d?KMXB(Q|G364Y7{qEqPJ2cFDjKclVQ6KgZ8tu;x;cR>~n4$0> z9L<8^;NV~|hSS*~7!42%(fD}(XgVB+N5OG03=R*D_BS@Yo!BLm%~M2w*Rkdm&Yq$+5tcq`h3v%zQ_?C&3pj}Quu2mRsr zcs3YqZhJezl6X#TL0DO>hOi25Q^LyP8zDJ_J?QqkN1Cojqr>sxXfTHG_z)gVkA`Uf zc+A;zczAdi_V;Il;IMxH_uESVg!{P7{_Py(x+jLX9&Lc8~QBD=a z0E_`yp)|!I5(WjSlAsy>49HCUnq^VMH_vLz{Z5s3pzv}iW;jKn3<%K-$5@OLFaYeD zm|mQoynZzSGZ<0SY6T=_DTyMK8n`Hi(+H^rMt|+Lfcg+lgsq{7MP3x}O@3E={|F-- z0wN446u^`tm_%f~L^0a~Aw)|OQ^WvC0cDV(Sr$>mbs1?V$O}7^3q#RE7y%f^gh2_N z!~&1JPR|0_Gi|kiUF$WbYy$rFcL`saHYiylMfhg`0AVMPZ^fTBE_cUZ0=|5$=v@S- zDB1?BtZ>&p-LhG`BX6_i6s4SzLqu_kLXeP<$~hn50MZE<)G$z%%u^U5Kv@bIny*FC z?@0M?s1pLtsY#B!o=yC5LsPdUJuiz~03# zQG^&OgUG>4U@rwJI2eHEF-iHB6Ou9*Gb6KwI0Zj^IFp^xkSCxmez#kyVJ(CeuP>J{4tMCT zfuq+{J`IE+wxtS*sqBFP(>blF%|BaJPr^{vz_AfAfDsKT6LSji;h(NGv~KGeI8QNG zC8D*b!{{?h;fdQ0=Yvy?1h~XY^iL9_*5&_9z=z9ItB_ppIPf(PG>wd1{q4zxY^5bX z6j!D>ijh=C^irt+NJV7{6MM0e3!Q>sD0mLp0%Vkr^#Vmpu;TjCG(uFAOdwlKz&E{b zO7(ba3qskR5;7dX zC|ZL#WDCTlCXTs&Ohx}hJ@w+8q-+Al#btVs)E zMeri%E-|X+Yj^c(j+TGna-dqMyhIG8OB^E#ZWf3WI-fOidhn_s&0-2}Fk67j%m3Eg z)NL`gHoDX8z)=?BI0q_iqT>^HDA7*In53M8Nll0_ky zA|Ta;um#j#W*8JSirRvn7(GeLe|CsY2(sleq5&8GiA0i&9c%Q$q^LK8$;sD=|x$;!-@;tT}_rX^%g zmB~ODf^SHAEwwPCM2I~;;EPxl3Mvf{#|))27>E%( zj}WAM-~haVDVl&w4r97bAfm#b!hH|wLr7?`oGyrPtR=K`pK1@Ix#dN=|Hmx{; z%Zd71SqR$UB1qa5b*E{+t}5U2;6RrE^5@z4scr3|rV;=h(AIifzdIQAd&5zo@_Ujo zn0WjKb?lce46ivQ~wyu>qy4Bf!>#DQ-%4rW9c0SQU6NQ!XEH@i%#6r5kx)^$xX zWw=}OarsUS2w)2+bZ(05O)g(;P#mP|giq{T^WT%}k60&#DmvraTE2;YJlH9~MFb%=U`5CXw#j|$wxz462jS)k%i%Bme0qrqJ zuW1j*d_Cxdkiia2gaXM&r)LdoM-OWUeNG5PorHuP9M4F)lx2A@KXTN>Na()4efRR! z)!UOduk<9FVHAb$(JY^I;?23(!10ODjY)_&6)Vl>~!cddm*@GIW0@s%LX~4ppYd*N05XN(ql8kn8M5>^p z&wM~J6XI6zFhz`UXr(0unA$eC2W_=2kjKV)>7@v!!2;QufK;@4O34yvyM`C9kQR)tmwGOr z|Ms^O&Hn!Pof@GLkT^gIqdi@(qm(%u&-urg3lmF@(2gqDdnOki9M3y!f%NO$mRuh$ zbQzNRk2Xam%FO2oqTfua;DF5;OFfbpx2dDULAX`&5!KibJzK{NckH zA9U9YCa3eMRgI$&rX*3r2SeLTm@D7HUZ+|Is(GV>pGyPDg^QiARcG-DkhK1uNk zM`&(aK2ik3cX71l?S79VB;~0&$r5JZb6xKh4Pc~HHUofD;4Kk|n`%K}M4U0HAC(Bt zP_PanRMjz4z}i(^3jNJ8FDdPSW48w&1uzCU#>|x1+ZTg5q?sx9YakS&tV3eeeq7wP-0XB({zmhY$0{8se zIlz<~v`_rgC$2wm-R1_77bqZcNGD*>S6>s9VzI~;-g5~_GG;y; zsP{97qbx<2ixg3gF#nRDwT2Miir39F^E12o{2<(Jpg*zuHtg<_?VkDF5B&GW@E3AT z*qYtdTHzzi(7o(z`o zGhSv(j@7}p`~4S#gFfFC^16bJIF=wwz*HJqF%z?b`e#)2#2NQnEvd0W$4AHAdWf-w z4BRYmAZ^Dp%%=vi-ng5QZz!<9f+eC9&W&vn+@zQ>6nAxVQctW?6H_D%VF9u}c3^^g zeAgcl7;>+k)$`JNQQR+Edmk;PwmL|p+76^VOMLtB4S-KPD5yOZ3`2Q# z!qHT&V`dA-w~`buaRgI+I`R!?$!|26jaW~F9|n#~YgzdSRMqe-X?fi@@LC@ySq@m* zDPc#f5jd8M2HoS!kvPO)LATr8wS==c72+$zQaU`s7z{L+JK7EG^E z$oIPn1qoXHC}HjRN=ch@Hk;wk61-m9C0e&~JFf1M0#(zS$nno8 zEt3{3WkeP(c)&WKQlep#O2Mn;1hRT;-6_C{I`Z$@TolhEbirV7y$8;PsC}8iNWFM3 zJ7eAmxH$P9E^)NhR#po{%hk_t0%p7@7J>uXE>Xfll%sKWz8dZE|Bme@usA3HfA`W( zT5lT=&625tO1BoMe2uaMYNH|1YF;i{H;UIp&(aF{xMW{k>(iTB)q6GEKDAyy)H3RRyP7UDd8+&DB*+0!N%0Z@pSss{P{csIMAV zJijc}tvtBCYKU8>u%2X$L^!^-X(#>hY@x`Rdk;(rTjZ``lp`RpfDYxAVwW-U8pqdV z+MA<)qAxbV*tm#+B@V;r2Byd!!SC^B6u#kKkoZ)hjF?SiCTq(wTB@-Wq8Yxnzg!8y~z0BIL&j#acETfU0^&K2KUWlG5$(W0IPdcb)c%8Sx9)kPrnljW zpu$zIiD-SMH%`=cs1k9|j^+Nw0%)A%+G3#85IlQUSc?~gvV0x3*EI1ZpQIA?9|;vV zp#)OyDZO5yh0nC5amg!WVukN0-^^}A0vP35QW2>HvPF&*2axN({8PT;$uT>JY|#bH zPy)vG-*etc8?0C>Lar}!mC_122ma#)7<31tPQL_6db^*C3-HcI%M4a(NiUO*`Ae>J z#yFX?0&k`OMS3eXhAdR_W{|B7Q$c~de0@=5moE5@FWAzRRCw%i@hCZqk3gc_)Sx>$ zay(c>EoopJRVDj6T+?9@wJ_3`fs`k?*tbC8fM!lz+%+vgDZ?{iUpGPqh&ySgC}qy+ znalph8{WsnMFltEyh0hLaEmUVgALZvF-tfvo!T%mO@hQ>p>!A`>}d)uvs1n~_Z;yzLJUc=n;$6;#An_GqJer{DK-T~NjRnV>L(-Z^%Qw)TVL7*dk7UZ$H_`vJ&f{wZ| zBV+=mFs8d&Es$;#eV%}5%UC=Q7T5yJaok^W~KMMCuv z`=)qp;`*e@3?R329L`&FLD#_lSy(CL)Jv%%)a z45B&;g&R^wx+3$s+D*G8mA5pg$oA^(DHn{SaE`#Kxu26uYX^X^A5kQ(YJci{+5_P_ zhD#i9wM@n};lvbICaEQzooYe_>HN?47oYYV*B1iQ@;apVMq1ZsSB0Nsx2A zLNTDSSF%&(`dKV2#wY|k78<*IASO;#p@a%I9&wz?C(D8u`-BgD*@z88Zk{?eZ!52! z8z?WnrzjIwaRB;^sbI+~`npbsV?m_}9-6LAzjEGln9WJ6ieUWn7(dcR1HLO5}C z9J6hctDVNYDCT>zvd0XwL?OZlevJit7nV? zYP|O35Np7EqcD*y(Mp~VA|u=pSa_Z zxkCy)v`mOdO`&L0JJP)LEr*#cli%S0tI_@Q4esMj{WOawRXg7XQ$Nk(C%$OT7cJ{B zKq!@hC<(z*Ef%*?b6X|HxtGzjH^niSktjr|^gofOvmpttQQF~~QKACf-GyZq3a5IO zc?K@uy?h5$h)l8PBEo|5U&7;k8WBN=5^fxNC!=X+ii-?qWKc}RKC>j1^d8;bD&t@w z{n?crgO@39GrQ(IM)9noX6>e1Y5NVg+~#@%XVy=;sZYh(((dt3y8ZTTIN{I21-~r^ z{FbBdjQlGV@`cO*%*{|s6UpElPLud1Pc^g>#II2 zT`Nt?_2$SI4l24VVjnA zcsUXu703hy!qR&Od!&{v((WjK@eVjAsOCs$VqO7l?UqK$(XelQl1FdLbw|f~s^BYq zVBLhZbXoThvzou0^X0N9wq-`o(U2!^oI~aFmNspGLS!K!v%0GH%d#uov?a=59H4GXQdk_I>0q5y#ak5KDk5~EZ9U>|#Y_7jsO_8twZ(UNdLzsy&z^yI zDG*18Ai|Vcq2i}7xXzMNE7ogs6vr0mLjJu)`@pu>pZLBxWN zz@ft>p7^r^CFZ@|memh4t~jxxF%PLi27X2$qnSt*lA?etmnaT}!;uw|CXXVdYRW4Y1Vjj~ zl(A04CgCg}V3JV|Iam;E`3Ukgq$?wuz=#rnW4;!M+hhwa@Tv47q#(^=zJ<0zf~x4k z5oRnx9JE1X56~=F@W$WZ81v!nYR8a}7~c@x535=h%f3n~&PWuI8xb`B8Hl*J*aI;9 zM@E^vLIWv?5tr#OUCVgZDh#^ZUZl|)OjB{`1kM;r!8bXLzv+tbaC}7Mx*H_f1dRIq z{!$$Jm|l{c~nJ}3|)C(DlZHQC|aQuMto{?_$F8fV3h7I zCU#yZoOqO@Q>~XJ3_}yaytZZI+xhYQt!lmt&RBz{fl8(&Zq?y{n#yi#bbzF>uprj)2iWS;YQ?L-=wStE3z=L9~qCZs>SrLoP z#cLUZQ%5zDp3mBTmc)SK5Czam?_*iD#E!r*XQ`bS@0Cm-Hk0YbjEAAXSZ()KjuFBn z%laK7>^LC<@XYo?M)4{)k(Bc_fs!k6o|q#Ph?iZy)wW1*_|(i{xm%N^zsHfe%2Pg3 z@*ZN`$_nfpWUP{y|F6qYP+!YuR}WxH-QJj5GN*ESwOgLGLCIau>R_jvmQq>hebTc~ zI_CfWRt*d3CTm8XN4y+7FwNq)Oo?1(;XLt}$BN@hJQ%NQ0;t>YjoI@d#Dtx2{Wj9V zs{f!u!=atksLGKj^uIihp|(iz9UJDXr|nH0VHJ^yDMFme>+_boXhc-J4n{zd%0`^Q z(0~FF&s=s)WLh-lnNA00M!s}FOkzt46cMn#w3QEiue+kW#dbxoAhpc_0{sPKW?Z@Q zz}No;id~c$pC1aC$}lE;#ig4yOcEXJT22dn1zR{Gz=g?1j8iTY4NqD2I00MX^%AEt zAf&An$$KKvTKO|5i2=b6m{}P_R>_wYv4 z)o?Tnpsu@!-MLYCM3wI#MdMKi#hij+v36Icv=Gr1@_ELUM&Tka_I9exYs7cy*NAdH z3b+cVLlar8%hrlGywc9@$}XrTB!A=Yjf`S0b$awU5$V0KHv1+r2epyG2zxx-t@IVH-`e6Z4?K}yo+vI5-Hj`<8|+L79E;n{MT0^hDXpa1p`6OXJ1;Z= zgW>*gV7>KW1f2LlI-aV+HjjH_wPO`{_Uu6-;0VAenoa7`?%W~*j?;ksBaes!_Q!+% zq2vQAyi17>ViS&J3r5H->s8?sz%~IC3U@LKx9@?<4km}LTX&blj_T6?D0(INV z?v>Zw^*!$Gbh0ERO9pXdDP*}$7LmC$`_KhWfDSAYk!!q#qE@dj>GtciC4*yARS7iL zlniXInsiI8$N;^SPGo97od+JPE-& zb8}}@Y5=O13tROfBKk_82^XQ19A2UKZI>7D?$=evtwc2a?dC;{7+nx~2UE|Blw_O* z#Ov6kb`p7(ZZKO2o#UK@_ck{)4s~WnQW3{FcT)+nCWm%AxcopRW^($2c`0&5X$)a^GlQ$SeNpoR9tvBb-jt1 z_02=0eTCB?MImi#o)6rtQX*a%jAhPxDeMJb#e^Ys5BtOW*B2_eu(cxaA$a*6XWlH0 ztOK|AD8zL8Zl%0hvmS|}kK3sw=j(8~eYaG_W*t+7AGvEJo|9X3O;&8!HCgzvy7rex zdgS8KGue@PS9z}Wa}ws6*1If;ZrMh^-|vq{Bk^y)-!J|<+#etOWiT3!_Q!+Kc(nhQ z{;)qBjsF7r_uNAkQLC z!=Dft22V1Fa-vd!$6%VLlh1RqyJ||e^=P6+hWR?Z+=#7utY82t)j%%vX#BVJXf z?+{I0ir%TrumCt%CkgGX2I^3YWBcVxMgMc(D86G;Q~xfPDo3u@nb3nf**BF+V;3@PXk7|5L0k=O_)hVmC*c z935rNd9TjUwf?St=DTT?UpL9j8`;3g3Z-z4tVT9acN0duODGQQpS3-d7Xt6Ilgs@2 z;T`(f057Mj`bS4e8vXZgEp&fJPkH@^QFMp3-uG-+|N95SzPtVpMuYLw`u`}8SpQX? zd6ur_ZOhzr=~xzImQrx0&RJ37Az0k6fM=6f>vW{q4E9eg$?nKELzI* z-&~BiHz}}T{tt$O{lfe|*dGs`=Ko_nV*bAuGr15M(o6;&zD_%vsAR=e6WH)i)ijp5 z7OW7N&}ze(c`1zN2t4N%_Q3P}#?Iu0Q4;c(u5y!?E^QT*%5MrtNF1ouMCa?*mMPu) zRt6ih4&m%bYNhCw^8Se+P~M|`u!*Q{}@lL{f7%R*8(IAm4ZPo%$+)q)khs6ZDaN^Y}fW0SCpATnkWngeiKR~ z^UWP>E4qSkFSZsUeRE6&c6DSWBmWJTQ8g?h8}0M|3I)_E($)8PylB=TX@}gk@TkVq z!crTTQY0f@{)j0f=~_khv9|D5d%m&~u*okdkXS+%EM8kfQ#UwWUH7$Tti}?&=4%Ds zVi*8Q2~>d8cYNd2R7W=kjpvl5kfHgS?`QRTxkB8)?@6C(>= z4rI6Vg+vjK=O2<#ezu4Jrf|a;WXR5PxBAtA!3AFQ9y4%j1*e%f+ znEH}S<*Cb;FBV!2*fF&c2Su}lpaJ@&uBSUB1znn@a|F6s3|A0Ga2g>)0;hqAN2RbT zsJMSFo4@*O zS^PB|pS?fSL7d8#e5p1NRsiW3^OgD_?D9KBF{2SxS##Uq`R;C=_20#OqwT+QJLA6@ zKDWK5hX1@ea9dWx$;IgBJ@A}G)({j)$jTxf&p_AY*0VpVemO@dlNVqIXhrO=tIl6n zZO~?s>{N(81DDPv-r004<7>0jq-eDc;zo=LdQWKta~k@Xp$_xSM?ffLKZ>ZzZL1wG z*@}#SQr4AM^{lfWZ^L)0itjKu zVQwLwI@`&od}vBY$T{x1E$TU5n(+cyiYVU{OrDgKj@jzEZVuPcc;@ z;I++cv%FAUw$t)a83Luz&q2yD4(2y}yVpnJdhBZ87zXcP=-bYwsJE912`?;DLTzWQ zvK2(v?q=k$*X)g5=l_VvFSb<<{j#}yuB?ih`4>6? ze`~81p#68dyG#M4cs8Cu%AN!UCaNje1v^qp;^f&ab(Eyu zYF%sU3lLRBUVTnDLkMeOaXTmmzc?Z#IEIp%^!3Qtdkv2n)(E|NC?1J87+SE)q~C;| zO^6bX*2kuZ+VHl=_7<#TuO5w<#;Qk60oI~3<394Ll zggG>?V>}K$VkgHi4>@0p87Hz1xZW<}xk_S@y2d@c@uIg%;%0ai1M6);HeIzj(R7Vw zs1;+IZGoDu+8i}qV*_g6WjG4+8-Yuh)U$PdU9MZr#5vIXhIRcla3r>xKxVN{7#`OwHc2rG5|vGqZZ{LQ z?*Bi^Q@a0uo=1RJ2}eZ+yW2(s5UY^i88BG|8yx_($JqJDQ`^19gsBfuVKL%bD=%%< zsvYzT*fAFb1Ullo6pG@-u5#rQ)l}R+(dm*g$ZFT}A>_z)iq-%Du~feCZU1shMK>?$ zI<{%cyV={zYN_pMx2f-+q^u*(id*gC;qaF~l_&Kd^C`=JzT)5S0htt zPxAj!o~`0P!YH!VhmU!F(|f%LC{<36i;&>Vf@hHJ1th-1jEOLn;%1BG4J2KNRECB3 zBtpNVi-Q7j_sZaxJ6ss7YGLd9ekEyLhAEPd^3UQAeFRtSilhK?{rGOf_Z^Ny9M7Ld zal2+x5+M}`6ejqGlw?T_sff1o?rS zJQjVAA_OVwzSXZwsz()ZHLiIX4_$|qn#>>1bGW?z%boFkY5*J7|NcRLTwMPT`-e~K z|6@FA{YT)!lO|s+;?+yFwxW0zV&&Y*isdyg^e)?EPAnYo(Y|J3QgEDMl+ za%6L(Qs}P?@`ySi1wJ@5p|kven(Vyrs*9~w|5T|AJPo4+gwvKQC{7v z1N+5mOL3{W`KQmNsl%+Bn6mD+--Tw$O_%*@c(HidZv!)yF8diA9_X&0g?g#Ux~qP= zo_*D?K+@mts-Nk>(@nqIJeBJ|lpC%4Py;sU|A(dXpYdq)6#wf{9!vkX_t#tR16)^v zvhB_-(UlN4>>C^tfp`C)SLf2wS=vbKR$&s~J=coIm{4e>WV7+wdKv}Zy5|juXa47Y z3iq@J*f9S``@=y||34f*-T!@*=N9q*E);{@cLZR^K}HpMzA~!1np);dDvf+PXOm;} z^9dF=fS}ch-;oLVz9I~tpaB6(tUMp&g11{wU{X9n!AZ-Q;;#K3!SLr4GxSb)`0RpT!7mxH!+_>#+Z@m$ z5wMduUSP#Y3g|EyyVIH zXEDY9CQnKKm(KA$>#{`e%DVe-n;pR>{eL(p#D5$PhNGwZKacWA{a>s8jOeUxh08J| zZt1jddJ6Xdj#XG7lw0vD(!b5|3dNgqzm;yyc)WnB@8f7&U+-IRk|bOn$n8holRUA! zGU3B86eGJ?V8eZ^_rz*DV9j*8j1zev2PlCu+`Hta&6IQ z$0kwDP8);we{*q5@q%gtnuyx(suT*5)upacS(>3X zXfH_?vvbH6ZP4!U*CNwyJIE*_%Qk4QEZh_ZyLBWB%X2_m^DQ#f&aSFc4F7@JMmQA& zt3SMI7iEG6z-`Z~8lF~_Tg_r`yW5S14oJ~-G^zqfe({F4-3X_On6=?%OQWG6^u7fz z5ku*c%XD#5P3C@f&Po5TxKo`Umr6ET1=@~dg;BMeX=35+6hNNyhMMrCyz^~;5IEZK z)ZXH14?JHG%Iw&|3OavHE6@0LmA?k12eDCqB6+^M)#_QlYn&GBfP&g@nkq&1xj z8^in7%>^sC?;Yks)!)Ch9`vvJG}QlHm-NnDakJMZh5n zU_o6LK|d)la{qS zpm_Bf(+!J`E>tu=>)O(UWPXWFlPuh^%tcONC67f>_p_|+7-POTVQ7rWx_vIrPlVYC z&(@-;o~%A2sWoN*#VeeWSR}An!4z{%q+NAT>AN}LrHQViNO`>np05NU%YDE0ba-WV z(r+44!CW*Xiwi-{>U^DbIA&X|L7)vx_a#nk8(**O+z2TtXO<~fZc^UxeT}j@vlK6d5zqc4{cbH^ z+pcFEW!R=_WapUW+qkCXzJnBvM@>s#7@y&sCC$E09t!9!+ywMeLRha$>7s|jtCT`% z2hXPRvwHWX=8jDn8)K>!w>fOP?UruKQtN88{@?LRz=rjIFgPsae;@Yu564gI|6@F6 z{ePFB_~ZFo5TuB+4Tcd_W)^Bze;M+7i`Bnm6zV*}Oup@91mgfvcLvz8C;R=~OQ_xR zyTmA6SCC?4!u7^O(4KABh~?mG@Ea6y5qOFKgJ5NwXP=@LQf)xEwn`m z!#JGW0)o47E5K{wz~U@kj&p+2?B9?OO~CMA%ohQMmTGP5fNQii`l>W2G4kI8QoO72&xBRUU2Mzb!mu=9d z$HQ9&IRnEulo2X=Qyll`Lj2tc#6L7bC;>R0;TW^^W~A@gNb`WtX8CVAb?eI@8{~ig z@Sr6BNByV!ACK}>`G47Qbsy9DD-W?-?fO*;-0OGzGF^BOuP@&+_rN}1Ic;h^zP3`v ztLDFs!YuSZ73=h&^uN()P@4bar~KcK@)-Tk#Q2uuy`|09g!#6DSyxYBUr_K$lkKU1 z_y#7ozo*sF4LUa4tt_^>U4!}>E~5$fRi5aGjl0$W7mOuWk?{JvO2ld6asQ~VKF-r5 za6if~Lf5tLgUoP*WG8!Une@ze(XjvaSdqFBxyD)_3L=bRlkq1@qluHvr+8H(NMVB1 z)GytzsBUjg^SciJAk!-|O5MWM1_l`pT=*i-pl}!~TyTg;0HXz=%)BjLdjY&LUpxG{ zx=J8hTwSTX2LB;83>8-h{>4lfjpYBs?*E5F&;GyvB>x}fDa-%6?*HwjpuGP#lGwBV z*WWhm|J`Cu_Wy2;JMRCt*wkC=+#hjMZ&>2KHuW|=9)455!Ry8#)7a-mE>~T?GQa2{ z7UV+G(F)on#}?fgT}(kLxr^pHc+FcX70yh)i{N_RMMEi&Hzke;oVAzxuOz z{WpX9Q1+j};r?OC|K}G5+K5u>UmwALFUg|5Pf{$5j19I#NsP+a}HF7n6#zO%fE#%%-HgeGg^U#C=)qhF`O-GV)A;rOlJT>SUN z)th%OKfHdm#i=o;-XHV8nDftlofRu8Jp3_n#UTT4{~AZp#SLb`!foyQv-hulK6(Ax zZms?9ZQCmH{@sVmS62h4#Ncq)9gMsEZofAew*85&B{3_Q;=@#7__(2IIW?bNyXqxu>hKOi5!(cu(Rt^sO593jlVkfMNgk z*HznFt_yaHeY_Xqk3Ga67pOnD4fU(Jl%!zChn^O@8AYj>?z{En5=iL{Nkd5)6tBKd z$x`|%NIgy^2?d)oa~5o}TE<(*m;E6uuLs*tCpTzx=>n!G?3#j_j1n37wT4qIgNHLl z#!OOjzTldUuGz%dftQW&3dM-h^OQ_QL(Yq){tlfDtvsYRMI-(1VdH=F$Ae+X|NANa z@8diV5dWjNckDb=cF^axxM}Ly{k+Pv`{ViBtCJ6xKTc#s^}@2!MC3LTx4(kvc!c8M z_u=MLH~)=Y`i>UBjq`t8_WynI|9PCJ%KrDW9{YQ-04kADFE^}X5WjUV$LWstJ!7&f zxknZ-acq6N4`AW5`rPE zxHhH-vAc{K+FeF|yGyx~SFir-^!10AuU@`=b@}tV_di`+ot=LimDs5azd-vxzs;&4 z?ZyS#HKxjDX8uE%au5qF<>hAH{}(grZ1I%zKNar(KJNYNXOsWO;r>Cv|L?FreA@p# z%2S*F6&A9;!bm&ezk$iU=6=;lCJNyLlo*|5QKa*OY_>snigy~`z(m*1L0P3rIcB@= zC5Bu_QW^2P{yZ1zhNg{^ctxy9 z?)MsamQ1>B5Qjoz0_^={*420y)9F@8*$w%0HMo0BqAQ6}YJtDb%d#W_I~v@sW5ldl z7n&^#)$$*GW+;tebQUv|&R~G(gW3N^CI7#}!IS^@qdZ&5|5u77fZ>ViMIfU%p38jU zrzfvpfge7cZ5ID!p36PL3um=hG;hgl{P|U>wiG*ADkdiINvQVq5$y&s?gnu%>tfPd z4cba(Db@IdF&HfPhVvy7@!v3sJyHyR?r=d?OhYbSnryNo>o} z1?cMeuQQF^{Q^k+{2vU4MgOnC_+bCZ|MyXzt@Xb%l{oGpv_F$#>^^iq1#C;r&(4c? zXT7hOWbb#N_1RP@>wNat1{$A*;PWKKOPH=NRIb0t3oy6NKy(Vg(t(RfP$R1sj#-|= zjFHzkzP@L$D%|x&o&>&%MT&$kbh9)7?)RF3@Ssp04^N>6Efkrl)S6C=$Vpj*Co%0qE}TEqHmy&w=&_%^jeS`?1J1ex}(xS-fN9Op==7g2;-- z1%wolo6ayJ(dY$((*UnPP`}743hko^lO$AEQ1{9-oMjl^q#S*kC>^S;P;UeG-n%2l zPB{zY`!gS?7nW@kfA0L1vqBY+-O^6ThP^eM(75nQa-o+sLA{E-xn)rDO%7O z3xH+LehH}5rX#X>i$;mluRVyqaBRDKK+NO+6jQlWwn)1YcJ1qIiqaS{M1wSJgIyP= z{QRULItG=yHk|K@-5qja7?)KeSR9t6cSM$34#u+CI4tXiV0j1XSGQkD_$`_%)4U)} zJ;N_V<%g}<4O5G%?X^{FF+b#9CxOMY*hJlrvZxe1)kr-SS&6#K zRRQP#ky1Jjb7}!Gl~vm5oRNSCW5*Ist>-SaJ>tZcsX0szb95?E6eO_98DjVat7k;bk2H(& zqd7GKD-ZeQh~=$|OyQnESTL64!z!|Y+rezDLuZ*O+!{S|*V62Vd|GO!Tq99Bzeh`T zvzcd`;kAHjc`gGI=|ob~c8VCp@s_9hRu@%$y**l>XxXKUo_6QzB*MYC zJptDUCB8%pci#Zj>8-cSb+K{3y7iU}1_7e<4GEFSC@D4(rq|}Xy#alXVEA*28G087 zs4cEeSxTMbGY3Q@GGuL+C?lzGFSmAb6#vs{;Q09X2iz`hNlS!Mprl}GgB>7^-ImN~ z=hJo`ktvMY;JIxfu~Cc|9~xdl;PTom=1SomJIK$cXD zFDAC+jziyWk`hJ&61hXM3)(+kUY=hV6K%bPR+C*OtfDknAWo+RV+pOWX-Z5qUlbdE zOfZ`_4h$SG>+7uRD90!r2T5 z`OUwaK+Y#Gr974E+O%=J5W4Dn7|->wSk>1_l{Be>R>|TWcc?ZEMpZW`qFmyh%w+ak zS*GyPRkM8+>VZl}O)qHqsfsFoI88`WDN&3Q>N#~8mb9?G@SnOS9WemaZ2FWqr0|IT4o(|4c6WKrM2iix39W7t(oQ7{V2jUaRKQT5{q_Q z9MD&Myr}$od3tWS2k7?`aCv&(^4ak75_#u6$QBR6ybzo=@(Q`O<)P1xP<5R};w=fq z`2b&5rPWHVtpd4NecatOoz$@sT z_doZG`9BAThokY6{pT?rVgGrLSeC{r*^=0D3f7f2AC<$wwfi)-(^Les*wIFrw?v8= zVJXuHa`I|3)c>~sO8>Y0f7-?Yf=k9~7ugh1E<&VRVU1i!6q95KN z@uPY+$p6vd;jnc7fBa_bH1&)!bv;tqw3sfv~TrWZQpnmVY{`; zL$(m_d-*%nZ~>G#t`~i9_RsuHQJ?){d$7*aqTi`z0{;3kiEPc5>$IYWFThUj7s(4f zuk`N}<^3=U--=tILTQ(z6|QF*`I5I~PSO`(N3K4y(600|tb|#&rLyBfiKWwj4aXS_ zpAT}me);l^zw)kU1Mys)9LVXrAmo}uj0m~T63|`^+MsQMIJE6{+j)(4-Y?6goOjIi zB`@%qDQWA5=H&}-xgsIU0!Z~*NCykDJsDoq)zOXU%ME4v*mGt_iGXr38Og!!k)tOT z5V{4N8un7VcQF@=Gr{^^5Sq+2(m2>EG@YX<*A`Q8h~#g?dwx{eP~vaI*UY)k-sbAB z=BtvT?W$e26R6H0W{+E0dNS8rrqmd%3|a?Fel}yNDsZV7PHi15j;+NM1*z)+^1LJp zDkf86!ge_#(Fa&LV3z=QI-S<`!C@rOf-loHXSO95u9QTPGPR^I4o{+F0pDgza9}&y zXe0{8Q^#&BSx{naHIoo`thmF`zedcD7{CVyQ?-#m?iY*d1mfOa>B zZ!2$$O8S3w3Er-~UCdRQ z#?CHAnz-SxP|AKJQRqZEw)}Xi3cLO>zT{)d6~=ozsqGZ1YNX&btM4mS7SC@l?Rw8! zo1y38cDq&`KP7j`%1vKI7b&&V$w8Y)_q(pA(RS2r3j}2+^4^p#eC>Mus+7}7Y0t*l z60RVQFn2EB)WN4ceVfN3674Cm(q3Trul>`2xzf)9izbt(GNu z3h(;nu!x#vhefm-s1?Ld2yqG={Djt$5WfOOE?A1=d7fXuSy(v4YqYL|nBo;=s42)V zj}e{x>3Qg9!}@<8;h#3fe;*u-OZmT_^1nXLqtAa*j8+J6aoU?fwdLgufM+;>3;|44 z(6TH=VfEopK}K5+uMO5RkJs-G7oE$DvX=-YrzBZhR|gY%iV}k-k5QYwtIS&q==%J<=+1td&{VQNO~6Kq;oLRa)&_*cW{l?fH=cYPk3uh z_}!5bv@Ps7o0+xWw;1IV-9#z5Xl+j_Yq9&?(dw3@*Fi43N?6WfQkHslBB)yIZ47)Tz>H>Eo zlWW27yfK`wh@-_TULVo!YTyL%)p;~Tlm8$%2JJo2z6ImQPt%^S z-BY`g)oxd}uV<ZP7Icw^K`V>d3w_h)4wNmCq2tAGL(**PLUp+= zjwyq2fZU$hZe~x?_0Rg$$$!Z@4<7$zba+_Q|Hq^LlmEw~JVH*r`kX+OV_RJ1ATt@h zg|k7Wc(MhH@&G2W??zH_{c{R zU}w4(L;UjX1uu)^xk$RZ+ijiAKq^-N2}I>^rivTHJFIfSPZ7u{$CCmmkXP8&vrO(J zWU)sRDS?;?lbdzG={o_MVUuFP+xA_bn)z1z%p@_M+gUaVKyo`ZHQU2=-tx+O5j zyl?r_nz2`xS93;|6581Y;i&Z7f~~;ns3mdK-??U*q9hXj_5ZI8+E?xE<%{lBQLHPK^&|*L z7BemqxCE*133ckcEzDlaZ0i>6%AjD*=xJUp83{@*gu7KxV>hT|iFHkkB6FXjA)rcw ziE~4iBq)v6Ab^}HG?VBxlf*0~QG`+vYGo6Hn9`T)#A8UY@{y`?%5OeINkrC5a}--J z1-&eN{^ADgsRj(ulEf5Mz!hIF(AHongAC2GNC5UhzEA~xusb!^Y8ilF1tT1SVw*dE zrMvAajC@kLa)IXK+Lk=||3JGd{%h{Pw889`Fy6G}{SwCcEX}1rmrH?06TudV^4`te zB!t%g>hyn#Sa$d9&ztQ(gJCKD-{U+UmKDQpd4Bi41#eI~m-8SZ0gTiVs2nBq z)reHK{kHm9w*Y+fg zVtY@9qCenMC;xQ-(1*4E5BK|r#rQAdgTp8L|D!xYySelb}F3J6Q!W zPl*&N*UQ>k8AYk5$_`m#mhbpw&0+xjCGT~Z*Is6n2}uDq>|f=YTRkpUcm!D*R_rDluZYiMXy25o(W=aMmkQ!f?snqDULes-zrEwU}8 zVH4J^ZmAjR^ZI^9_Ty96ZqqS=75wdDv|)gX++O@rH7pOq`(F6ljziO#;BBl{sCZ_9 z)2yPkjAE6`lspMUPG^y@L?)9_6qXYirDd9aDQ5=63@s}X-H0~I7GNj#M}#R8=EWVI zcF(%Xx9diq5b+8aT6SY6m7Z;!Er0(~4!&TEIMqv8Uv{Q=zV6a6L@T_Rd>e>l0ogzw zS@L&Ip`2wr%cqsB$N=-)_RZHzJ5z}*fo>Pw=o{1)*?Z14h*va#k(dr8SQf7ficz>ifM!V&p(TnLjDAQ-mQcV55NDSQ z8QDkQ({-1i8UBnyRblc1@Z|y=jE}5-3+9@;CGxK!TK!P`s4vHB{ z`7m2OP|e}k+k=XcPDprB7;Fz!{2hC7TPOwYJxLP&MkGq)otm4W@BrD4k@JE+>g%Bc zgFYDc!LXcm;PxnrOY=XRf7mqBbTJFW#rm69-WeAsN7@n)kw$Xb<7wfWu7IY!4hSI zcMb-8%hc~wYs`DUS#NZeNSdz7N~9*R1-DL(G#L`Dm5ipVUC&qwfVQPOWpoRBikly? zdYraliJ@v|$crgpIhy5`hPP#jVFR8RZeohzUAbad#R-nmQ^;Q=L6tU*b=;wp98soV z#TQu#O3QQg55q$+V`K>#4qz0mMJuN#=T~oEU0!{6_V(q~#jE!p&rV;Jm+MoQoP?og z!3{FX$g=XYkbRY3!*vXoIH>%tn|_&+q^|9X@4E4d&w1IO5XM$Ve{~ zJCv~L^$V%;S4a`HS#i-%Y7tjoZ;x|wYiu`4LxYgWbD48J`2c>cK_zyGK4d+1&9jX;u5 z@!NQVZt(x#-#;wGe;*FU!>9aDkMf9nE|&{T^AM*ZIXnfB3b)T`lp%RXXGT)-W=XQx zmipiyWD3{<3L{~f#jPotkyPK46Tt-{X)dnG8fZCExeR9oW)!9|=Onpo51mnA+{!EI zCFBjq+RZaq*2zWJs?MrAMFm|JH#Q3O(_Ip4uWRneH;%1BK`C8&w6^<&E-8zH#J&1j z)7P)9jtXyHAaM%-yo7TV|3UQ}MhTA58GqkRQ9>wYBwd5AUndoX7&Q62ogq))Ng{E31E0pFZB_LP96DGC@Laa*=_yWjlVmoMeK zFE9-G=T)MUvwe>vWcW@bD<(|lgYi^R7yB?3#oIvSRSp*9CI+4N;9z_-IT#;--YSWE zx`lrO!D2~5{(b)cZrpF+*I$9`lPoiXSSPbwC9#SUy(ey+uSv!SKIZ*=`~Agg1Wrz0 z)BjI&Qj$`J#N#vYY7abLB*Fw)WN-^x&U{J^eElkOuO!Q^lt?m}3e^!^3Vo=?x(wy( z*LwUnG;Dguc|hu!vL_SU2>IYctQb&E`Bf52xN4FZ%qQ;XR@pjTIaxVSPMgJK#!jm~ zs<)hUY~nM`rtU}eA_q_^;lch%d#!pl>VGN*07`Fv52#-M8w?J{h4^2?{{HAG{^O%O zU*sLZORm>J90N1l`U+qOa9q6EZe0|t*5f$1Qw>dOah71%oIglR-&`*#RuEtE=vZ!z z^DK(aNrZ#7qtl3Q-Nby%7j{Q6P>Z`~rB{+k+cBw7+Dy}2^6}Oj$>XG^{PLwn!Pv9~ z*JenKCi=`$c#_VkV~&LKg{Z~<_NqRjkb5R}%Rb$yM-EPTcYb@s%n!y~4q{9(4P_yY zoloLTMc;}JHPw3Z7CLCDl?cyJunx4L%>2ANWX6@$SnlDLh*Cbq%$jR`e3O5hSfjH& zaBF&cz*{rhXG25rYT_s&=O4~qsu?KE*6z5eVd(NwZbZNw!iS4j@2~C*Q%7l9*QkC1w3$eD(g-$;+#EZ(slS)%$nv3S-qCwEgaiDzpAh+3l&+ z#M_T&FV9Y{KAv5iefRp+)yr2O&rV-m6xvx49Og|~!nFY9<@>Xbuijsso}8b2clP@1 z@~i|2Mv(_+1LyL8Do5(_f67rh-E|{gc{VE7d*Jy>=J0Sf2F82j`E}ugbX4VER;8_o zdvNLQXn*~a}&^Y=b>Z4#E*zZ%aEP%FFCsj0GqQ*sH z7xR6~w^q`2*?4MgK))cVjmX*xi-q)+7FGZA`UX&&2mTiC3W7!M?UUE_#2*so_o8wPt{T|J1 z^4jkw*4UVK@*X)b;BsQ!+(a6uM=y6*2GMb7m$sz9OAuhm*NN~+zxuq&V-X5HHee5_#pf=JiTQ%Sx zIvGtn`h%yQw+?^#`xN=kvr+yhB)n?`zzyer{ZYRd|MhUNKYo(`kMYR!zt-hKgh!K- z6$>d`eg4;NH97!HNNC6ZbBuQ8ln%9Sps()_>R5 zw(l0lG(Qe9Kb!^JDdKKSD|%tUIgK*PQ2ISiDf=0-#gDRNVc%I%p{(M&SslVyB^K=x znQ+pj#hwK(2ubwYrU9&zy19lo3gvl^)2~p z`$nukrBl^~zKa~IG_kq;r1-hPx#c{C0Xj!17P5lGp{Qh)_@Pvwg8#YrHEt7T^I5l3 zFFDLsh@Ltamfqa7c6Eep%x(!K4`h9N5GFQt4G1n5bU^(xdM0-$Ug4v5FZqDj+y3X} zug=|2$9SplSzoIp^4DlhYnu5LWHJ5){0b;ZnaCKtTR5-EJ#}Ay6W+nYp6xDzx0vcSfK4MCl$Ow%)vw^HSg~rj9&}+Swn?yRZSWST<`d;u z?F?}D{ztIZpP&x&d?3A_w;xU)m}b+p;YmsHkVL)B_29gn#(S8P2tz8BQS0a3_kJ-6 zkx3T&^=r%ieRt?^CN}kA?&`nq4waFFL}b3cNKypDQxa2_LaeR9~F^~FQu)VzGt-s^QH5A-OAh|ojmIu*mh z`->DU;)pN@)&o!T7T{0x$anq@;PpxC9!1* zFxTI^_Wy4FFXBKRBmj2h|BuFfoBxl7U+#bUBp=ED#T)~fONB`SVzR*Deq3LL3FZ0r zX@*xY+bI93wo`3pUs2!HgPwX_TzYB4)K#}SMR$T{mU}b>knx_fm&=Wn+^8B8F{HFW zS2infdn$vG)KhtSv=>DkeJz%S$Khe^CjMHC?#(8Z_gV|ClV8iIgo9}EN{K`Mcd2}V zoLH0n$wn3FYISG!rXP1YhC1zm%8TlpNi3#Px}54#7Fx5ffR@i_io&`m(SAwBTDf#Z ztf#dEN)vC&c^f5>H(hR!H$lIYT6Ip}+`R5o8rO`R*?Yn9>w2-S#CAXw!hbuuB_rPY zu}Zv_fJPsdsI#B&2laS%mW-t@5IgDA&6?d>YZIx6p7_&UM^l!{9QsO{o(ljCmxwDo z1qgwx6M}QJ1r01ruSs~jor~_bxTP@6|n&@ zK1VU!mlxGN7VoMIP!m|{%1x`wbTN4=zsmd8`|}sywUiJ{`V<9!bE*5U87q(0M2_p zodN2$xxfE)K&G!-7Uw1cXi4KJ%7&bLQ&_3TViSs<4sC}5`o%0Q_*9#XvPPfm$h;Z8 zrYBvoSwkuHP-Gz(K1lk+-tCS=!y;awsx{}1k5>1PJRarFr zxpU#@K5boGyyaXs)u+3rY0E@?@!mhqXHWV6AP3M6`9Bzr$9DdQH~NzQ@ku_y|Fc{E z@8t{1&s{D5wPuK>q<1R-xkXj{>~M9PT(V%>wq!TqNC9t@<<-XaUHD4hDzPgQ@au|Z zQAYJWrVJ+w!RX6u?)Wd@G`@!$3epVCQ3hZF%FXdSPo$xU<+p#?XnwP;%dYJ)>DoxV zW=oXaV~T)8gAp;?mv7IctKRC?rjWOJeTT9PN413nM4G&CBDh`>s!G)_W6+mtbbq4q zVvjv$#o6CswKzdypDR_I1CN1_rHH!vwg-4lGU-*^hS1J8>XgzVbydI2-WF@C$gdQrY6H*(ebuq0{zcq?_f)lFWm9srKcmVw$$i9AOrF&G_GW;T}E z$hACJsEY!sE7y>3kXM8O2<~8vBTzx%sW`o^(Jc1!+&#Jz?*X4${ojnJKmJ)ogoo5e|mLsdj9O^?_OV* zO0bm+4Q($Wr1}ao6j9@$sI-&D5GR~R*7kb!`t{Avm#5d)KfJy={}|ot(aZ>8-4s%K zPqN6B)&4nET?apQW{@sBN1)S1Vdp2K)G0^fZwjS#!f>3Ux7yHOVi>J(0=jEXGUzTl zU;k>(@oyc_O^x45Gw@pnq&QiCf94SX=l^^Rpp-$jrvH^gjR>GILMiC$-y)Kry2`c} z^H+pjW{9GM)ybFE@jnj!|1S}b+*}6i;Qzy+Z~K4z@t6BQKFz0w|LeLv6hM%{BqA%I znS(fm(DDH@tr<}O!;DZ0)@dXb5sEOQ+OHtO2Aj%;f2pd@MJUXIGfHmG5g8<%E#r1l;)tx0tgSnS_3@LJUTbLC#y`E#gLKi{%2) zw~W`Yu^MJ9sETH3hVC#~%Q#s=Zr3U3-1!~QkqB7y(G-RSkpfUhZ~3pI*(Ib@MM&u% zIa4bCEXmQ12Lpp5a7sb?20R7Q$7VF^@%M8Sa=Fm~hu{O4jRp}4jm!Ls{`Ub^l0-ES z?M{Uq(G15DoKk;#0;}MtIc}*!Suuos3yEZ|SL+oRdi6t7+o+aW4Ool}O2TrfG&f;I zZ*^~$#OykY)mY@=HowFt$H#xVJNeVy|M}BhSM_od1l~v-x!M~{{r`rdOcr!gNSF7j z#oFR@JV7h_zr1|DaWcwb$iR@EUPAAAA?6!1C})T57xgmjU-PT?kipBg=1wKHrpO)IS!xGVp3^Zhdy2ee6G3Qsd+K z|AxbA{NMOX{>LZz?C1ZJE8vm*f29g7b^brqpw9m%A8qshsl~e8|7SMZ=Kp*B>c#7a z`u}8KP5ghV*Ynex(`TpG&&{4|iIxB7yh;-DpXtPtq+v)$aI^E^6 ztHH4Zr;-29h2zKb|J6~u!~f?b>_PrN1-4`ms-J`~En9@9Rs&bkNo<8s#RF~co;b9w6?y~lcY-S5qzo6+F#**!j6`A>A& zJ?du<`%l;QZS4Tu<^SuCD*nH~|5E?!lYI8_{}t7pAIAk)sTSSX$}1prK-Gh2z^`#4 z7EibM5sOCKU5R$P!khTnJK&U~ty6pLOh@?LK)U!D(+t6A1G;ZOE#1bSxgh!NH_%C8xP$+X{L#qb|9yY_CI0V|d_FJ#Ur8{u zb^%(#VNdDsDII~2;RD>y{g*C2hV#!5p}YKl3W0s0sXw=Yt?7J+>&}601)AM?1F&^? zw{{HXV^-V5MgMls;7&SquPxkz1#Hv)G=3cpf_}*Y-L5`tw?k{+-OKydO-LoIOoRBm zF|P}E+;`O7fselfEjyiXTeQ>9&f<*a4s6gnL$}g7h@f;)C83? zi3Xq=`WWr$Y1h-fp2o-N&E;?8YvLnz>2f-LoNntqkDnd$Z%vmF5B0?TQAu++T0bfm z`{Hx`1AX?e|1%Wf_QwAn^}l^Tu>HRS|4aSHPxAS^?0>P;9%A|n0JT=X1pRv%{G#`V z+x!KX9cF(tyAVd}$v64^2pz9u4TkvF2pfGQ=YRma&44dA*kNQ>p|vrqYr5QKF7L2+ z1vFD7kUxxq@wB837{k0n2goO^eeeSB-L)Sc$8OpRY!6FCysyBtv`^%SHnS%Tv>U_U z*NS*ZA1>Qr*Mzp}$Yn7!=kvIZQE5ohGztoX2mOLQWOL5iEK4z3VeX9<9Sk~sqjiO{LOSx_i-;y%ZN znmhN6g~Z>YJq{qhM&%Z5I-v9I>(`y)ew3%;j;zkJ)2j~u_a7Z~LyAj_bo9^_SLmZT z$}$w4uQQx1uH`NGI9XgQ5|aP?{5=ZSqKxzb09{p}6D1+iC-W=F!sYY#X@=xA+vbVA zNap$VSI{e6kjg(K<*GEvPQXQC{4B{dlZDI*(mnaO42kz6il&tWc=>gs+T1n#(P-_kfAZ=ZtUm4(Q0; z@=<2cya_8MW1Ft$o;rR&j4r?3e;r|#d>K1RlZSzT62$D9S2NFq{si5|D7=0 zd_GbVS^O|0tCS=tVfkF3_bh|o^F{ko8=6YRv!96SnGC&Wd7a`t=E*=IH@I^oN+x6n z^oj?0+X@oKD}ts&P(`#oYc58eZ)&~qgb7~0GdE}3vP)TR3PgMg8$ChZFxYriNgD6 zD90XeH1Nzx929nRbG7ChI{yStJ!QVx7ywt&FZqc$r^64 zeKy#ZE%j)->C>nhvZqJTGz?kzc#4LxrFZEWpW6Q0X8()W+y~nJU+r=K*T}cx|NYU( z^S;>spW?Hh{crLHwnQM!xG^Myw}E0Ml?|YlkNB?xp31`i9r5*w5M~^jL$>TO(ql^` zTZ7IbCNmfdvAKl-lzYe}U=gdYE8zF?UX4Kh;spj5RxAF?2f)a+xFS1mSzH2fB7}$4 zlK`~Ua^Qnkj2c)|4xRrf7kh)1nR!-kBC`Id>O!4F#%WJ8OTY1%_6sJe>T@;zO zw1_5J(i=G!OGy8YHaV!`-DfBlW zk^5Qyu-JFHk^H{TCM;p~h$D!&b^sZlL*+_=#aT7oGE9}Ree}UHmHXWTRD;j&E&O-L zf2E~=Z29jE1N;8>(Qy2w{>vx%G?4#)&y5H`8B8K>bju~;T>5GS>E=ecFJ}NnE$2{n z6(fR&k_1F3jmbt{w5uhZX-ut|l{&Gm z4}6M#0iABA+^BL5vBKvY(D`TQpPf$inm-Nc`t0=O^X@;sy|y3%!$($zSj2+h_g(c$ zSB#>#>JBI^upAt6SjE5r-c7uHPg`Dl)_6f)*(G#!1<~@#)B)hlYoK&o&KEU)icnxq zohDu_QYS41y}RG2=`%O8-k&XD##GWcsO{iE^R=aKMZLW~Yg^S1#EzlZ_G;aFPOz@}^pD14En?CVB7R4TTGIQl||R3rZTpg+d^Hu2%)bPkS5N z)h;ZC!pXa!eAi_-S#(r@hJ6yl(pW#yM=roA?uu8Q_VoFVti^Fy|Mq7TJGpKD-@`1y z$>PBtfF1ka_kw}F|NY_c%l`iqp9cH?2e}*ooRKwCuIr4%v2bC-#kP%~uO!v}1}?U^ z|E~yP+xB=ZG*d+vN5r-V_yfq$0=@qhClTm$vw!|G`d?pvpi9^vj!xwDxj&p7{=9>#x9cJ*zrEvf$6*5lDq%R&;km!_B74V9KT1AENu2a4twBr5^n%W#G4!? zkfIF4I6=LG-ud;<*NkN7;0ZVrOBTF6y9N=?=s|CR*|GRnqJPkv{X07r|LPx>i(~$e z{z~tX;{wnOhPUff$Ub`Tmma-O5B}1d!P|qs^w^63O)|VV_{;x)@C3YtnaGE`IDbwL zdTB=fg+g}F!x4hVvUx`Sb8lsdU%r0PTSbrF$JYJtdqY34 z^FR8*m;8@U^LYZ!mM~eMm@NJ}%l>w7aPU_sViUem+E#bk^LzfF^S8eq!@nIodGZAO zSbFf&Q>~3GFk7x?LJwit8i}-DdJNN)il94~p=0ySpx5h_ARU6IeXrl|dO^28Iy~Tg zaqRexJ@|`CEe4T1F_t;XF-S<#UBQ2mOf~-&zvqovw&Cn-j^Be$gd?F4&bi`;-ltNV z>vTH+ClL-IBN=%56JZ$n>|6>AA@C+LAf7sPrDRA|=VgX)}_C)5F8|t9|Mill_pW8InnP zNT%k9c-FlC05Jn|k^!7xCaLd_no-{$xhH($pl#BYwo#e3NiA*d7&eR|u+Czk3z9Vh zzr+AiK*XPBnx$L zm@Jq9GL*^F1{cah2g>`2u^N;IWt4~8QQl`a`_ugvo1P+nI@xD8E7;BUia*`5S6uo{ zYxTy`ZcOFIAGRCIhWd%WO+Rs|C#|#-hA8U>y})LE!6OjuHC#X*UqG^>a}rX`Tb|)8 zdImGZxe64A78#zcx$4LH?`*vgy?K-UM4|4@n|Oy7PtVYb+#&FeWbdRIO|(%9v&DLa z63M&#QNzVM+Ol|E8e4mXtvrvWy5_ZG1m2(-z20C8y-t0tExoq3X40EmBHtp&#Bz#b zat~G{L*Vkw#rg4@i*s?PBpfJolZ4Wt@q#~lad9rm51MH;UNCi&@6zL1s&Sq@-QHI6 zXX{leqU%z~!ljz^uE?UI2&fXH`7qHX%uobys)k`d{!$D>;2H+cF$`Y2VVLy%ahYd( z<#7nCeg5p~`RU&;UcCU)a{|8SyI$xkD7ow2!Hfd3W)w#VkU9SiP$d2NVj%X^x$}YW zz50QWc-M@Ce9(F*3|mt|+BO#4%)a>tm?4}jz`Z)|kY_d#w`-JI!xxQWkC;)AS6HB6 zo{^OtybP@%7N<<7X-ef-dClaW=Q-q_B+NBdt(c{F)3?T|V3+-Ff6|6s`qO5Dh_~ND za~;2w4_edgSv315%|mN_ge1#Q$oQg=>;Z^kZWikhbdUB^xN^EjgDrH|aR~XKCEcUS zTze+ng9@*VNqAdJEZ+-ZhWJ9@k0meVW?+6Ur^cg^iNo7F$7AGL2cy>OU}UX>QF$Ho z?eRFJ;<)qXAL7~=nUX96CIqoT!^scalRt7z{;2ij4^8_>LNbZp+G znxvfjGXik3$PlHH=6)kb7H{vQd01=3$Oo-y4oWl+4MV2i^;@}k{K>QtL+94m4B*eUSLToZ>r1bLkTWEGL zuVHKEHME%5u*AID**X4X)JVhS?e}$f_>*D7eKXv)Zyfw_*qT2MOqZ90WR7R!6CFwO zpy3)COb=@raU!HEhB3eiVR*h#_KO_YW`bujbPJwAty@k$Xg#oH!80&CbA3Y_Z#J+& zLxvQ%8PdQdcm}Nn&%hEq14Hom-N0{5vw9#RtOWi2h8wl-FhwP@F8bRFp@AiY28Iwa z>DOyq`j6kedV6txar*Pyi|dPLFQ5N>{`~F5+4JiY(77Wx>L`y?Lcoj5Hvm%rDa8wJ zq=^yn8*Vk<&8`P75jAKnq6U_T8WpmBW1TKC7$JGwR0IGz>2ZjNL2D5aSR!Izh=>wB2ItmD za{@FmG({nv<4{m?wu_L!#gc>8EIF`Pa$vAz-!OcdEyjk%?|6&x8@O0<(3&L&7E2CF zEV~^Q9{%a&^C!tG{@2A?7PV?4D$|^72+4`qpOYmp4n_VgL~dr6@qE6Kd{DgXpUz)g<#lF2^zYUAdaAm=9UVOqy-F!DQQ}b16}KYQA+uT1u2}DpBt6B8$jzGq?3%>~vdC>$AA!g9mLzdwC98 z5!y^W9JsQZ1O}$6RQlaOteTJ{LepU!7iZ&UkUAsa=IrcBV%yLKFc`?ZHhFb+J$#rU zP_Bt_ckmYw#t0_sR9>Ww#m1G_1%&GivkgeOfeOJ4Go70u=@qF+EW?Wh%5(s}&L?zD zL9?7B-rlr$EMN@-w+4ghHek*4%E2Jm0<56{Kj@FQ0c(g^zl52Zs}lbft1v<-6@^Lo zvRf=enWvVJ`<`>nyVS#WS?u}dwoC-yR1s_T&?By_M;R5D0@*ILyo57@6pj|L=2HH&>XI9g;M^;l?wDfBUR1=~Yx?MpUERaaBOd^z_ z$jHBw)Hl<#gKdsjr_#}uddnl_o76jU2ql3nd1(35R(;lxLK$m0Jr0xLBJ4MLsUnpc$4NJqF?GCgUIrOPf zTYYL&)~7~geac=MI8j0-DMBf#(qk+nRKzen&EWq@udLn}x8?#Q7GjoK3>!+Hp;P*d9NN>Ut@bo3Yfqz+_T)P=^eh4g&D7ao;8bTv4((~w zR(rA%^hYJ_$z6iTBCug9=0{9 zhh>v`STd<=(&&ZP7pzktZn(+oUiv{pQ!)^yq-&iwG|>ZTqUV^hiioQp%lh-9VcQtp zVOa=StH{K#Bud?3sn*1L4OfY`WtH@s zmD%I%ZQreojF2}c3FnDyE3;8mP9IJdt|6|M@~w+nST!w%B`I&5rsi5aC4zmb@# zSOqDDB|%9#u!qHq}&%SguLj`vNSew9GVG*{>16Gb=8c+|QjL?#icbolYHCu}p&<<8c~A zdis^yfzv4~V!k9WdIn>dgeU{2d|VXy%~Zg?+fy320-J)?flYxG*c6z7O@7zg(_h#h zHFJpeM^1-m;0kvNT82A`H^&x{6O+h251jf9Lo@sC(9FOU;}o=xaSE&$r@)MHGKth7 zYK1uil87*I6zPlI&6SNPp(K?qQX>VlKWe5H^+!&_HE=~m1+Al^0xK#iFr%WpEjJ>l z`=5>rmE=Sej_`DdTZ9*gGCo41aWI|_MshS7o#@1Z_KWoZBnvpvkA)s!5l*EV26^XzcVtJef*NmhnTVYCt^cN#B zY-Z8;L#IU(I0CqWwgFs0&r)Eg<}g(K)!eeXgBj;3YFS8&hGht@Vw@ll&A>W~DS!)S zNO$0fhzi<9L|MW3fe{gzZ3u$*rJgs%-AO9ZPOD^q>3g zP%Kx4t=0v$tom9(&s5b!Hhw)CF14t&R%9tf!G37C^nv#3KpBnxerPx)d0RAWIldnn zE`ixnUiR%t@%BN(Ri~(RnIfx7QNKJX11B2wlhV3ykX1LRU!D{<8ugRXzFdzz8s0u= z)L&mRX?uOiq-PfmDvyRM7TsCKr|oEXr5hb5#XTb1@$g)Bo!8o~^DMj0GweEVDg%5S zsMPNlueDL*Sw@X#7&SXksh=LNwaV?4Rc_Bvxwm6dukw2BR9@wm@XMNuSLnSQmx&XX zdd1aitGIe)#nmemSB}QWiAKHR>a|r|t@>A9p}1~Gqh6hCUHr)K3K zX(q4GgE$&4Yr<6@sbzVje4P%;xCHy*;^HIi*+?0U{(flGOPbcDg{;a#ULk3=qv2v@ z4@trD?N#FK#%0V=u3N40K^ttwmfVw&3{-skvey;7MLmslz-QyTtCewb&h7Vs~tdUH4@nB@=Dh?EHD^I({Cz#QC_jI3HW$d~Azz z-;thik2ADb!z>c_fQh@o7Ko|)e`-TUWLGZiTWw$Qre|SqZs1BCh-7^$bN}96zEbgm ze0@R&?h%Mc@@FOv44!TfI|O9S0GX>R^_?Wuae{GcrDj}KYR0xwQ=y2zA0vk1jlPI% zovbN}a_WTtKHqUD5tmh!TFgnt$HPToow77;t1OMn3d-2hlPcsXnn>)3EjMpmlVqrN z$281vTJIkpJM^7#TYYC-)_2C1zEd-4@}S}_P3*`W7ru3h(YUQ*G%hPfV@ok|lqVH$ zInZe30pl+Y%4iI?4V&UUFi8j#=|V3tWpag!^b`42Zez}k(u{mywShI^(#l&NwdXjAKh@+|xNYZ5AFdmC*s^s?0dqnk+3(;^kmAi^rJCa17Dg z#VXCnorrJ}e<2Vha$@-wF|W#}n}oslSj}FeXuqi|*l+Amwa0B$ZT_OAIF$5;YJiL2 za-s;lbYL&nGvhi7KF}||JG%laoMmcihmDeFro)NjTHk1$#yI3lM{}Z3#Sn^AJWHc< z4WCObX|I)(hp(iQc=jSKZYq_pSVKqF8CN|^_k)P{uh1OIWV^qpqit0lGlm;3{Ta~$ zGcPtIw;AP%0mTstIT3O`8ij{UT^Cu69X8Imt&KA-+c;y(#;Fdbs5s6ADc6Lc2&=q= zY?;?-k@9tpVmsbN!|EHiwfaWZWjJHY;w!2Zo6GbHQI@SkCW~H(#V+o?;k?oakS&I)SjrLB zQmBF}Z+J&sUBr04&4ihK5 zSwWAftIDy$vYzs`Ar|sguS9xKwr4zN%}zxlLzESvOISwyPMcL8nYs#(C%+tuJ2i!>V$6X6iz zN>K4s-s;Z9ulhbGLKA_2;uVfz22#iv%910%mYC*!+(QaxYa9#FoFS3av4S{ZD1p4Y zkWdC@h}|QUNWDvf7v3tankk{rvJHUY5~Dkg;)1}K<0vn#Kfn6#9_O9lN?s_%nI%0q z`1^W>vIH?iPr$psedCLZpS#{W(e&Jq9tQ^>z!gdf#f)Sd@BxTmy$|3m%D6QEJ{)}L z8lMlP|M*`5;zgbgC+HBvbZ~IP2Ln?8!FMQLftPAnWOnGm52shJE?&Jj0XN@WT!XXk zPOomj#Wi^K`UZUe{PfigxOokpJqH)Bu5V6XzI=WT&M&T>pWVFtZ_(qm%!fTV=z>d; zqX)tz3U7rW@Z&FQ9Nu>M7GYqq#u1{0C@A=Uk7SGE6-?GJKK_5j8`u1eKlQyA;+2-<{0Ktz!Ks6C%3A#THmxNGsc+l;34^HD4T;au%QLb8|><&es3vS9w zTm=dLK_sB!|4S6Fy2^F%=t5vC|M$ItKO9^9KM4Hs7ykb#KAeZiIAhLPx^Kl2I5;rY zGo~QT@Cs%)-UucfaV9Jj%8gj}uTHO3JTm9*y@T(_J-S2L5x7SxdseoEajf`11(d-g zf>|Vcl|A*qMIzaLe$y9+fLFpEGcW(rq0w@|0-OkrAkQ8&Qxq&y>}gJc@Zrxkg(S$XNiVv|>#Iz@Tap0>AHdB& zzz0BC#yS26@UHXb=B)D$d;r&of&6MyaD!Lq-y}gCvSGRwcb|d}%2msO{Q8@KAZ|(B z0GMoQtz8P1C=>aA+}Pz0vkkxut!NKChvBl`M5ar!j`OS5sPGltqD@aqrlOWa2oo@q zhbKLaH8(m9JUQ2&Auj(v2qvoiQDV|mnFb0dUraFO?{`T;d%UT*=ug0xu9S6#BCt*( zl*t7o5Gp$Dg(Q;vI*|$($VJVwZs*`Ra^FsDv$-Z6u^U!&Dbii>$M*VBAV{DXUOn-c_)Dc5zp?&qQ&64M52q&PXD-)E&$)?~|$<2#fB-o^yhKDJLMG2Qlzm z?I-}M%a2hcLEYmx=IczF>x?M3V?IsFzh{uCl`YLu<=`t_-FQ=acg6KcvA$_hv)p>=C}?>+A3Mu5tI=lPUj_I~xpD zaMLSzFCb`WdqR2!DH;uG;K>JFl<+qr8*~r+utW)%5wX+QZ2rLzM2Z7hwWaW5ZW&^HoA z|aBq>Tzq%xIEhQ@?ubukACVKQq=t_ql@@@1{zsQtVm>x89n zsduR`oD5DNqZ7X8txReX#ORWc%BE}~^m0&z#A6v*^Mx&bRu}o^rCl&vitT$zqCKTy z4c?7-dXC{PhHgM_$IkPfY+i0cek4ww_tlV(=kM*w#nX(e7{u`-ER`ITu~c&XC?*T3 zTGJ&Kw;BlTJ|?%g`7+TRRkW8}UCB|YS5|6)HCb~8{OxPbfZlG+9(YcB7r z;hM|eYq;imVo}(5^R<>jwxn`_EJT7Q??y5^2cTPABN92NH&-t?pqHXW@#N3T4eVmg5Tm8l~-g(?SRe+m!?M@eW=|z=^Wps$+3R7 zQ#|6vaOb4MVF{B#NFx0{lMiz+V#Qx7n;WX)xcJ{l#;@pMlPgP{oJ);FoA7)IyuEzY zbCc7{kKxOLyM#PP;)f*;mtv9WwZ-4mChknh-Le7e>Pz_pjQ+%E7`lR7ET#4^int0a z7r+e7`I=yvXvv7|UG6N%mOZgJ3wN}&2l;MOMNcZ|)-#>vj6sCpHRB0=ki|M;9J~*Ga6e1k-iu0Hy#XWW8A0h}h90TbU!5Te@?@MWiXNz$$meDqBW}9adCq z-T`mk18-rBBfZjvO{HHt0(wSBX2e{JPUmx+V795*1?Omv6Ke^E?2PH}=R#8PyuF4<)3;wpgj(sdkPk{E}UZG16*McAb@^(te2D!Y(7 zfU7N4 zcPPua7!$@DZ=vl>ZNL?~LI7DaLPHo!O7e;Qt6su?v1oT?WU zoWe}qx=2hnkb9w6z}hVq)4Z);F?Kf%R*eCCkB;j)tFECzuix|Z5}Nc;Kbm-bG@Q=* zqv>$qO-IB26hd!;CczBNqQ2)1A~+fi<_JyUY!ps?9}VV1{^ww_2UdC=X-j15Qc{hc z(!(7Ks)!_XEP*qvg%*|f4UdaZXt@mS@nvT?`*lmD%Sy>Q+Y~ylab$3dHu>?r5=MWP zApWdy>XmU->Qk?XO|Lt?I5nPf`!O=SoB9rcTCfphum)c7mS`XXcN1ovTc{A$$bs=r z+mM1Hc%JTqthx%KitbDKUzwaDgj%slYM;p}S+xv{e!}`gPh&ks(aGm4>c<1vz zUadtTVloF2qL^EmDT!$HvWO92!Z^yZ%GEu^SO~ z$~YH0gk+^vCHfa$gfp1J8ICc-$lCNB7)70vAAdUPL>Wo>UxE#s6{pl9s)4W9veD8D zO_*fOxKXJs#uslc__i)bL2z_rL~WTl{P}I6QDQO&+^z_L%xeMez$0sj}3`#mPQuDB~+4O4KcS{rOrd;P^+2joct&s zc1}8?T5IR1BNkuhq~mvf`{}4d5zN9RqWQe&<3e!$>RO-w(xY5?)!}in_N(j$tl$P@ zh?4jYfrQ3{+^$o79zhbB@?yA8C}QhWt==f1H5#wltLHi*gb~m=i`SH)>|2~s)&Y1f z{5h}k!w(?z0kMrrO@F{_`JHT8_ZAmw5)&!blp+5TC%4qCY#b{^Lne*OvSrGh;dUe! zH%>J&Yt>s_b+2uRPr#pl{T1}C)YStb9`m=~{tV8F2I7N~ zyKghHQr`gR_4Hhb-z(x>KfFof8anh-5iq3QuW$37p)7&%MZ!=vhasxkmv1Oi5m8v> zBtynTXpT5w5Rnve-(wA=r=vLe-oA$!IsqaSYPLybvGdyr%@={jBZH@P=B+SA`2$=q z9<7QNhbWwB&NkXW>4D2UT1>Mvi6ZA$yuU?EW-#u}*Ky35LT>nM5tArkI71@Cg7<@y zLTymcFjdUAx>?L-`*a8sKy(vLfxH36hZ2@y`Rg%a z;W2MXK^LrGnsT%*E_v$=QS~Z+E_m$2_b!a0uIj$ah;U6I7Ip;&-FwWI;?FLWcpo3; zlxn6`GtNI02_WYcD7|U6$zQac52ZJ>UqF1j);9!})F<&sXin1GledC$1o$FF zkZwSV!&_~h&qd;~KL6$B`VqjZlw=Gh%&{|dM8-~E0)JICMmyaJMZ>nAg4v;>yE}&!33>kLo&EGr|RO-O@i@GZOP>#=uDKtm99_)mkKD zM=~l%_~yk${(P0n8-=O)b`1hj_I-=rqv(4aMKR*soz|GfxmrN9o(_|oKZ6y2SG`)_ zMI--4zGiG#^D3f6cwxANIO)zH#i0x?6e=*8OYGDO>L{IM5Y6$e`Gm_b!3k3sBF$C# z1g#*$p@=d&6Dl(mI&(hT#kiZ$L^^1iq9l@#Wu}PewCIKAu{img@}VK`*1CK`*&xvP z73=RQMJdgNj=R$Rq9hW5l+}?IT>D4wC-Fy_b%-t5MepG%jZrTq zA&dnh;Y?Nw7uyANY~&oj9G>f7As@U5aDNM*&|wUcD3|S+Yg3$|J5=Cxihm z40YDc-@XBU&mVNXeLB){WiE-MH3zx!_0|@x^Fj}b8)7QYl^gUbQgiq2RkYr_SM{YR zBECi0GTX{{HXT5pcak$Hl`BO}!%8GcO{+LKeQ`AmTD9GmH?Qj1j8=Q`|;8Lf0AlRq{!a^`!k*@?HMiY(h{fglf|aU$<|rAK^g^8XMEd%fOa z4_pXkIzt?pmGmaT1o#@jk)b&XoJkUIipSzDnBAg?OHS2!4f-suE{Q^sxp{e=t1tNw zJmV5tM$f*|cl}GvZncKR|>ho-F`8yBlo&uvws-a4yu zLxg3|rr1j`k#>Ug%?KTlZ%V~x-(0=C=1tcW83CJ|fb(ZPv&XGx&iOT~?gM8NOuN%& z-ATQy3MXK3pCJ<3TX=fa|?&&E3a?a0bd=EFY zf}0h0Y)?%Yc7wUmFYfBF+DT=41aDz_c816PqH*X)gJ6y#e-h0i-ye@>;}HsH zqj?yNN4_7-!hs(Jg9!EmFC2J%IG7BFyAU#_=bmJ@`B3h#u*=Qs#6$&X4{7VYEbX}3 zLNZ;#N;ML5f|X)nfoX08TEtaA7LJ97p(a;S)fVVffoTuZCPlQT&J*ZKpbg#) zYc+nGxdeoJxp4R2!$j3=5e4!RpkD+bfAgrYPSw#${+yFn zaupe3uLhwx$wE}|Y)HW%p6R$cQ2iu2&D z-LoW4>nqs`Y8ZbImRKnlK&8JZzeU-$=#>tu-yQ#z)A%!)|IC)?XZhma-W}zqB8-4P zcmJ%S3#bWwwr1spVPqIO=irfD5_(rVddm=uL}Yu-^44q_&rPB#c^!bm=oUs^O)nJx z+gei7>GTE8(~6*+7&6cKhbAUNzpN2uIYqS`%hjuS@n)T?PW2@ll#5N~urKD~w2d!> z?zyFXVR-zB?*KpXM*4tj5u;rqF~$$qLE)2~kXu1SS$* z%a@CqZ>|$@#ET;E)ad$9Y)J_;S;z4aNJ#Z=M6U7(_Kw&Q5T$!`s7MV3?%`k0TpRL@ za%zPn`IoMQCH#HwN-XhRPpv_&$3j5Yv#xN=Vo@7GW`JwoZB%UOyh12uRF>y-U|5Z@ zO7B7)TvcV|qIo5{>ZG_B{Yd@!-Q^KT@4_R1Rw>(@!(KH*ICBmfT8nJ6Wfmz<5asz2Ud3~U>P zS!>Bv#aKk3%&;@T?mI%6V5+h@0>Oz<+c=MbEQPyTQ% zrjF(EsaHuISJbDH7E=@`G-8Q)Cls+u<9;Sb+>ba77MiJfnUjoz3zy_Rk+;f-i>hn8 zlA71vi~m|Q|Ac#>z%O5@3WtxfA!@q&y!VBH@aM2S40JyFE;0HlZW5VRSm7)f+)l5DPMtdOsizM@pvqP zD+@I^kEj$dSEh4X^|qrQ>AW`%#eVJFqD|+dqpLu4jykEVyt3MKMcw}6)ux+2{p}}9 zF<0G6xZ7<$3zh!>v&o{!ZA8n4TMcM6kb7CrR=*$FV53Wz37>xb8B(4orX4uC6Gnh| zH7}E1x~Pgih`))xBAitf2#IZPg(AGJJtxpXhpGi5pz}Rik!;f`)*A$DmCh-6dUg7J zcLoKI6bDNi%Fyc2^qYyfQ_fKhatRsWZ>ghd64m%!6`mCT8|fU`x+4t^;N3O;H2C%vLS16mO*vI6%cM^k*g;F0Y#M>(JFont=uX8t>;{D zE3`_9tmLM~t*-C78PpT?8BL==^|PJCJD90TXMc#jtI+-YH?KzYbDsEY?bKF3!+Fov z$sc6LD`Y>{sef<=_#>umrzASvStg{WW`{0iS$@A|0T2V&%l&I}RNiV{cEbR1?JjZl z?$^$ozTk>>=VUmV9O-XoqV%{7lIomvUW;q?zQ=S0S-9*Rb;Rv^=6m9YHxy;+yLkbZ zXjkOAm&1oOazJCJSH)#cK*nI~D%mJh&EL!os^jw2d(~6h0_e7g5mj%coMtWuR=_nX z5eaydEiy!ZsT7peT<@}Iu{FxMfby=sur}q6O;`tmSc|SX! zYg%}`s-*)EYG6Dz1C+zse2GU z?FucredHxt9A8heLaej_S^N(yiorZ?b8I*Qui#^^{;52r5>8-o$AG19acN3 zYMlMvpr{D!kA37#qA-g5XcT(W*?c}7Ov7LtqQQJH9*$;Hggig!&nMAjFbe$XWHg7c z-w%ePKCDUYun^MfW;TP)b*sHPK-IUoBC*UQHoiZ@Nu;aOa9F*tc(&VAFWa|fH+Aq- zUk?Dg4O{hWt4V)a^#<$-{Q+PLcrCIanoOOj74AUsN<7RQtRLg%XlN2Ff0L;F+ooCw;6; zWXv1oK)GZ>NtkU?l^~@g>yeDh5T})*bb|=2xx*BzazilL%t*A6o$FaNj`h{W0dpKH z8LEqITC;lj=HgsA&fa`~dj0p#Nxw8Rm#PNC8;UY;aSopH7Y+eR?z(p{1G>6SyeV~3 z@9z^)A(t7x!!cT*=QM<|Smw%?cGNKofb!*2tt5KXN%i|t{+d1qz9NKun>)Srr6|Hb z_=*TWqWrCiFR-SffUXO(SM9F6{@)IlbKdS@mAiC>8xzrwTe+*$$u7;f%J}oav_awY zTe!k8uBkJ_6;+&qxqdFTR&lg1(_8X9I?vLKW8xhPM?h1*b|a zGx{;wAAw7eb8^0hvHC%k@5z6u;_|pfdrF`mIbF;-XY#hDz4pbmSzHMxbCRv3$gAuO z3AF9DSTdGw+ZF3FosEpG9eIN>2`Vw zRMP!Ji&W;dWH~&M5zmP@+)A6Ph}MlBm_*i1-wLB)#UlZCN4X0=(mG-yO;SulXN0XP589biaFZe)+Bkq@~Y) zP&R)G?-KyQ&DmwC>fr*hVyB8SwS51)xq2y{ihXSyDs3Z*!EAxpu9aKVTr}ES&K2qC zFR^+t0P~Ejr2bsgG!{>U8{u66@SR99)YnicCxW@YG<#A3a)qomJPX$G_q$X87Ly=~ zCn^1k4^gBTj@HhK^!1$o2^WTIRg}+5>lvWI$#?LF?!0G>r64%!=nyQ|fnchc7K)S;kC}y`^JD%~RZ?w6RPmi4#GC6J< ze3uIN-J*t*K2T?@Hh{bF*1Ea*@AAe{*Svi65{3wdOMoIQZcACqyIgd3IA|3a#2c>GML|apWoWJ_1NPF zoS_%uZpSU>9%WGN4nB&G>Q6qbJ{lZ-wA6QoBD&izSS6_!F=NR zlVCEOplB3~r?b&~G9QoT6Eq*p{n=nVnDzVp*~A-;kvH{c(3=g=a6al!r_-I7$y1Pn z(>MlKc(G&@T*>QSBG47$_9k1SGeIx7%m|;zgRj1PKCh3wI{H|?`lVec8nQK|bAX_h5-5 zbaDVd7cdeY@Lvv|6uxI}0o`GAe{k?uamB$hL-TJsTJRP;tw*xO@y}cU;P9Ab_-@k+ zDeVX|=bH{g@7b~Vo}u`g4rQAd(IrBx1CIZ8aPZ`bsQud&?1F!N^5hA)4q?K1$~tEB z;Nalk19(Ni_n4NLJ(nfxB+_^HaDI8x-Szn(dMsqH?vaak5hP$fs>9~@p0+QaFP|@; WFP{g0{%-&P0RR8EvS4HYBm@9<;48TR literal 0 HcmV?d00001 diff --git a/incubator/commento-plusplus/0.0.1/charts/postgresql-7.0.79.tgz b/incubator/commento-plusplus/0.0.1/charts/postgresql-7.0.79.tgz new file mode 100644 index 0000000000000000000000000000000000000000..f14a51d22a2152b897fc310b28ad0de22d2c0775 GIT binary patch literal 93778 zcmY(K18^=+(C%Z~woh#5#Cc;|Cw5M3+qP}nwr$%yF>e0f{i<%=t=g)s>6+Qzo!#kY zyMId<0fh$i-}X%n^y`m=BBP;%47;=&7n=c#Dx;ASo4KYE7rUIQD!YuDmBk+$BR6FQ zTRsV6D{G+3t_$Z4&U!}fo_}bo)05eSE>y^!zJ(j49KSm(Lq%^L>T#2LFM9i-voTfMlfvkxRGQ$S*#<~gMdvmpINDDILeGm>2 zdEY&N0s;clKfuc1B*~~UC2k($Z^hf|b(88Jz3cM&OBeMQ$;d~@m^Nl8P6lLuZLq;? zg%sG;Rq)C0hykOU1B8gokC3a5aQiyI4G(he%V?k5By>QF7`vA93Cj1v5z3G@CXc-y zU=$>a)UYF)u=V%rpki*b#IR^I(jhwnnj zxxM(k0fGOjs2wQPe<;QZqL1BPaaILj^VBwnAbvv-24bp1s+}v8!*(OL~AKB!vFJ*9uu{ z-FF<#&C|D+XC`=d+-Fl3e}>lH>fJ-KtgHhl60Oejq6_|oGht_H_uaultjJ(QSyhPX z`)+!Mt&fy*XBEjnpai?4e;gSO$+EQ4VxHASGw}tpDms~PMk)?+o~X1Ad#-hY!2qz^|=m}UQ0kFld$hC)-RVS-mmI`_hPO@GKzl$CEP)q>` zb_&>?2no0kBoU_QF~>8pz`U8ssC`?jR*s1vfY7d-p9~2l89S6G&%R?pF`yAqAKqfZ zSEGw4yzDT2tG-z76A91QRWzoLO*rF5IQSoSoshpF2*J8hc#6#jl>Q8aY4-*9_9b(z zUFKx!lT&uCm#icY&s}t=ltKO4P`StU8Zs%;6$B^C3?g*siL6LY(aQ}cPp;$Wch?L8 zFgBCwpdPM^pMY;sNKM^=!2&rP%`-=d`9^fUG3S9!t*s^J;j$w z>#MYz5jp%6kroAMjCcL;tx);U+x0rEw?%@Jh1`>xP@k#qO#XGqauTUEIVJ>CGJYLC zEIwBtdf8~%r#__<&;uD%Ewzc?w|vBgGQq>4u8H?4A0w2ND#4n&8z?(j+v4Ry*MoOwrZ(02ryj-WKq7 zzO_G;&m9-qs4*gOzcI)D?38+kruZSv?iGv`%z@sv7tFXKr>&as>BB z=`_!{*9DTW8)dp>D!|s_Y?-wN7j-Zg4f}l=;4>@!4K$6m`6l)EK*ZtA5)El0ZF_!4 zXm`g|Xig>wxnT z*v5@Rltts&zRbkQzvExsz>NxZ`An|fS(w$6r!iXKWOm#+$Dv??#+Ii~5;swd! z|K!3x4BxyC=vs;lay0SaGV<~Kcaaj~a(<;FqWU~SB$@`s7*fIgRw?yuB z?c4pa5QgLk5#la4TenE3a5ULb9wEi{yDes*r$cV~8?|Kljf@M==wrkQU^^q9@Qn$u znENITOK?nsf_LqLeG#+%uO46*9cJJ4?=VrsUFd~U$ak^T)0oige5O|yse#}Aao zWSJhl&A}Js`w17S&XlmV53fgq-WP`7--qrqRWd_?8{uyMmi-o=fk6Dh>sDcR{H=$g z_&^3l)ROM<=IM0qIy_Jan5e^W{a|^V&AD%z(5C_8sf6!#r`MU}d-z>y-<-ug4)JC7{`^5f|%u(9{O0vrw>EUoNbSFD)p*Unf3kIf-L^`h>zs60Egd= z^|$5z+hdE?2fp zCl(c+m!8~1$y4W2uabF(cCVxJU5K^F!Z(f+8CI6Vn zCStdSdn+`+op`uahlX$Zaw@C?OZ)-ay1oU`UOrnjHNb;B#@d_C@T6e(KjJiSOm3*Ohw8&o?wk2(~ zftz;`EqX(=zIb?d)e+I!{85|cw9jaNd;ak&QBf~njO>}8G6V{U3SBPvEO`9clY7$j zI~eJwn%mwt~s-zkgk9Lr@|B{g*|^XTIg+ z3}>_Ebk4bnNAyqdM8FtfbBXd`Aw)%YvzlO2T+~VLW0AXHVN2OQuXdypKeNP}j+0Z> z_oMi;spnC(4%qFD9B=F(0~K=$1QHz2!R0226a#4fG-%UFPVA*<%!4Lm8m=wmLRklV zJo3R|fB6p{cZ9g;{MVD#^dRm@&XIH%ZApZC51Tiu4dRHt;wF>vAcz66(piXu$CuxFF~h#$=(`?p@%dmNC?G3$qpqy{+~5Cr zpM;s+fe_ZdfNT+G{H_A$%y=F4q2E&q1aLCG5hyQr9z$NOguVgak=0#e<)qz$eT#Mg z);ANpEwBRHVTx`XFP3P`zSE3v7I&cS{n@(|WLG;!yr^Np)9(cJJG0AGFge$b+3yoG zPkfDT8M7VAn{B+DtOnUNw&w|23iCliFXHYd&yVki0FIexy)0f_hRdpGg^uq$e^w{M z?+K*q|AZKU?*P}6$>2ZJo%Frug1J+zN##`+w}POO^-HhsD=;4c_uF0I7vqCHnvZG< zmGOH_V1zLvd`-fb5nMig5Ja`T&loXB?QpuSz5?6ccu3p(UqrnQAlkdH*|ojjkHWXN zDUk8SrB$=``DTE8XzTCOxzcC|cYOFqLDpGGv)mK&+{Z${`8WtkQ20h}9J2s3-=Eea zbE2mLKQiZ^oqZN)X$}ZJ-%nErG_e4fwcPCY6-RHd1d3~^WY4h%XC^}J*1eIVuO=w| zA~$#AhNp_7yyR(abG|Si!|&BNh+01gNqqQq>uwsHQF2!Kd)8TYv%j^GUc|&;CqWGd z0R<}~yD6vR(7s0>UFZX)dUJ^((_+;bQM_jCiepxXstskv21brbR-?J$Rq#cLnvwvg z#CQk=m}Gg$aV404g~~jQs)_M9%{-L_f;?-AqM&tw5R7sGk}RbrqDRe%^BZSXk&4_F zxryrHWzINl{)(lO`e-4Fk`_{B$;&ok)KjG;Xyq)w=7<_ll2VhXY*qUu8|s4&q;kKd?C9FC5bGhllAj|l*tnPLzUsPr!yLX4fkrN=Y*=~h?ZmvpPnyrVzmnbz& zr{p2r8<&z}WVhcNQ~58-NmsaYFjbw)7_?7=S(=|J&*ct+DgDWY_#A9pzYiuZ@LS&P zSG~AoaEkpbN?g?|Pc0D?$VpzGpK8n(1SO<$8ctyzeNmK*WEe6N4X~)ATKc)QUl!)g zsxrlcUy6?(M(lI|s}21? z0g*gKgRM%9czzvv-T=dZ1i?#_oic*}uadcT-bF1D!WPhi*Y#DvV-b#+%XaLHD z{Ipi^2H)F+lSv-$C~czDq!5=ahO@v!vySbmLhJy9ApOdk^F7gqEPdV8VW%~vb9YBV zya!@Yfx~ZedxTM^<}BXP<^(A#9_*!rJQZoV2(fPkmg)@YEC2-}^H?EsSrW&Xi28(v zVis0BL>O_I2pr&z+d>PqR57bG79tF$Ohj4YmjW@Y{Ye@l7ja9cyTnmoCHv}^;#PGW z#1&4N(TYTAHpE8gXF`00Y@1Ph?fIm(&Bj7C~EB(uJ(}eC|S= zvORaael*18buL6xyRg&*;|t89{#c$U%0>aig)$*t;hTQgd4N0Q;<=;7MDFX)NRHTx z%L<0lpNp@*HMkLM%RHfz=kN~oW(0j6N8wY%h@n3M+d9^|>o@h^`?<3qAkSFU^B0I{ zibUT@eKTY8G9Y!5aTUGvv)V1rs%uDu!`l7boSNEkJtY55HYQm=pmZYN@*xeaHq>2s zfbE_Jx6)GzPVgnh0kMa2sh0$4X7g4^$ma*;DoTOe6W@}82<^lOsuG5*eE#EO)Z)&B zqNAIMgi;I$gS^nr_#119n%v5sr!5(1jdfWo>o6dgj+<;|le)4=-r{*|j|_C#?&~b= z;(*89fDP?;v^bqF+t&n_Sehyt<{e=0Nd`eHo@HtsYgly{XmMydw}q|362YCtPfKX; zfbo{A!FWg11V=7C6i|p`O|NOWKy+SD1R>g%eE9p2dhwMVIQriorK$$JVDQc)u=?ZT zbv{ZsiW2RzgQ(I)M^a5(8jjQTLbBvSbZCobP}cS}xY=1PNP^!58OAVC5EG40`A)GR z^@r>favRfe9*lNyzq>ZP;1)Bk4bSm10;aRbZKhPoN=^Nexq8<=njk7VmtPr2{i(S& zj*l6hVi{2=1xH#@sha0G0Xz6EHLFH;XdU!z3EX?A zx`uM*D$}(_WrT;AQ(K3b{53tz*p}$f=GHuVwGOBkT+?6+u`?R6fzByT`NX7X0J8%% zE3@Qj?Y?8#v9y*jB!y(&9G!4lb4>|oId{NaNWf{X?L08H8@J=+{lc17I~Ts@Hm$K^ zZ2GCZQ@C)zeT)L&i;3o#P%7&o<{y)Cn-e&EU4m!s74DB+RXBh-1)G&7FCe)@xTXWX zw55_gVgC0@x@+D!(g-2K{|0bDr*lu?5Q->hGA*7`ycD6a}!{LV>WmC`YOjVM$-OD zfoVmz9J;%FuVLImx|H6S0A4apoSgchG?f|g9Za7b(SSGN=)|IPn_{k zj(3d-4|}dH{%t&Uu3B7|*N*1SN)<$qR5)8;0K<3b)&|lPeZo?8=Bb({6a!H-TM&=t zt}LAwl2s%3$Rr(Z_`9meEp-l=* z@=)ap(rgK*Z}b9%Kc5`=`hOP7dL7GVLMtiivW&bc0DQ2su^=#OX)X{AHI;8TIJo|d zmVRlIG_U%cFChk9iauhix51nfZ3CR;1Z_ckJD8cg4v4a13K04QO7CNQQ z&^N4bLuH-}ZqRn0tRFv0e*8e|?T+>;bUCmpuI>M_{mNG$yGa%;wTSmKKf!)2MQl7W`;Z#|lnp z%U`nj?I@6D@?oILiu*w5Qh2@H2nvgI+y8kcm{qmjGYCvWZRcxGj!;^DfefV|Nj`Ws zTUCf`ttS^U&ivCc?Wf~0(9t;FU+%|-HHDUVh5wlj+TJg46nTIjSmLkPUh`QcictK2 z0i{jdz6u>(27W(-+h!TB^)!OeP*?fd7ol@{@n|Uzt1F^%J8oE7Y{8<*>lFRW*gOzT z8LO{-5(Fpy+ZwTjxR$ha{m>z|N24)?){kDhRM43Ed9n*0VZ@oB{#s4BsYU~ey(N0r z^1vpMJeIX@OBPfr_XI+(23H-SpL;(+ccBIyC_xZD1vI+&lj5rlJ;T@0auhW-fZ@xp zdUK^FR~ws!(a+Lb;^JrXGN4N=;3+b-O~=Orq&3H6|*5Sj$s`_=mJz~=@@Nav+X*uQ+b+YIx}-LuUy%3n_=fl$@qc3(mfeezdXE0Yh3lna$+@up5y{k?p7jZ?#CkqsWlqVR5y4${qAH)>K--4hHbzs-%O;iXaw3Rx%( zQ5oA2fl7*2Et)q{QB~a+44}EojhFnfhL!js;Lb5bLULzoD%T0ZtEw*l7%y_;$GNH0 zG(x7jxRslzUeLNS>XjZLo@I=~@K{Sl5NN350_@4{UkW*5E~P8UJEviIAr+W!Y@TZ7 z(NIa3*1YJ1%gc{-44wh@pPdt!9a`&z);o-6op~*Hv?04DSQrc}v8TkYvC;qu-Uv+HHcnpN1BZ*#5M?x*CS(T9;KEKHJQR6P{5PlR%tCRR zi9fc;C3>)>pm5TZ)7XS#RYoP*ILl#5la=+-$L!YiuXhO6cISZrBM(j24Q z!a*wzsz3<~L!m zmE6CkQtK-Sg9pR=ev-yaKF>X&sq`KX~dcw|)T#{I!R>pbwBa@xLmaEs6sqYBJon+Dd(h*_0I} z;E!O+?#gVlU$14y7Uy!WHy3&gaB0d`gYD5b%FSkVI(E8->O{eHT9BL|Yrc;5TTKd!s%%bUYEF;H6D&2x1>F{KWrR?~B zHfvb*+p$p!C0-#%V=0L-qX~kVEDTBqOi-WTVJAk|by#cc7)I9l@43ED@yfmPT#K+m zZCZC!>)pibCG@MNvs-e2QaPLcrMq`a)N8C`3XY(*CEYj#Zq4LPgd<9Ag{yjv&c(9w zKk4O%BI+@AuP9A$2$RVY=Jf{`jsvmKDdw&7&^6HUBKANdptgt%=khg5mR(Kh+{xpu zQkBAd&=cyM4TXnF_x6Ie!#10L(daPAPT0X^MG(`7`_vkv*haP^m8TMkm6?>DtVX3* zTI2tv@VM#?fo&`at}g(-+_WI>kY@;xn`CY@{O4ySI*({6#j0&%~Pm;ana zE?8j<=L~7h8H@ZzJ4lsIsh*gB=jC~b`Rnf3AyQg(IyF~K28FlF{%3ZbTU3ABT5%i< z7@Cwa{LD=tgQG~Wv9}s_^2qAklW6mq%4Jd^f&5x!#uj6p4HK2qvDSK7v3$Jq01;9F zCP|*gb}uO~?61)7te!jjLy7_{1DTT5(Al>6nb{~5*sF|Sf65=Y+OZF&C$=YAgA=8y z!|0`EBj}^}gJfXN!YK8vuEL&Z8s+jf+cWiRJc^@f*s>f;UDs?{^%jo2xhHs7)uXe0L`b?+#d>`=IkkUMND;6UPQO^CH)@m`2j3zj zT(8t=)0ghl_uc5S$`RB)_K3L0$Q{RXY6hcR$n`ny1xp0!0^Pv1T_c39I?Jc! zKlXCn0OSwxQYT5j!X@jZ=`l`MG&d`*R5^R^Mshi5)zlq7l6Jq`7ohryNPv52G<(>~ zvecXCU?E*0upfijU?Z~o*qMl=Z^>)Q?4YAjSj5g#6^WOMl>ZuCoHC9Mvq_E;Ig^2A zIE=K~meF5l5Ua8rZ6ip)bpBZ!@CUV@ZFgC4jjx+`UDH3ACi$CnM%OS=?8&&&ql3iY ztzBD`2A`!}O7NyD&3`Km2DmX1k!r8YTV^3EMR%V@7fI9zkDs%viVAM3=Bb6_u1UmG zyDven3o24>TE-tBD{NClZm59ec2wlrfLJ*H*iT8d`fMZI>;qg_(LHg;W-c8$GLH{hw37H4{vEMOCM z#dw?W9bXDU6{SrXdhUJQ>#I1(+>P=Tn9^W%Lj9@TLTbd3ixp~f_g!mm)ia7Tk4g?q zSF?zRXcT0y#%j*>IvOA{WNQ1o%VS3vGDWGiWMPLHSd^2h&gJ;kNJufTiwtnP&yk%Cr8di z)4JfaNBWtM+h`O@;o6W? z##_~C!~0>ztFG7Y!};anj769m_8zZ@Lk$E5S?o{usX#a!_Wg`SsN+eoqJgG8c$qi+ z$10Mm)1-C#aNLR(ttgF0o#Ul+)vGFRN?_7;7Y=Be$_xkt$(XpYM&#%A)VtNN$3S_K zNqjrefQ9#YxzLq(b!q)$??2mIJiw1R8^cCgm%E)w1Uipk=dS)KHhTRN8g=UXy3f`3 zX(Li(38fuP>Wwzr}5=W?3tTSqkOtTsfTs6qj9x-_kKL{fEYJ^(L z($B=$WnP~*@$^LB00)kF0AZt;j)|HgAjgu}ONND_3{!U>M2unV#9${Y?KA;sezybE zN>?P*+UR3M2@*$0QV#1zhj^1eil@_b1tqHSeXz-Cf_4f)XJVA-j#!+5EtMCbu5aS`Se1{!Jb3JuHox=GPq&t@p#PB1y|YlNLS~WNYl2A2D8lE<*R%Ii_#@_q}CVz-x4yNY|3l9 z_&Z2o7u!f=D@A*w0rP(k<5}_AQiDm8gOr!mE!iAO?Q6yZ=FNVZaoSSFNS(bc85WQX z>XY%0s8Lqjc3=1Q1dmhQgtZ)RAJVV;%T+wgRNxKqHoa9F1D$uR$OzBhzZQx zSf0hFJ#wjyH7R()@Eh8P+TEA!WzJ)H$($s%9or^e7xQFMuT8v{x+`_6?-D13d5`Xk zOSGpw#?JyPYVr~W zz7HQ;xgB3K?Ap!rRnwGQNMME{BS(*l5QS$?H*8JzeN3hUq{iC5MZ5M-Ja&nO8< zc1pPBD^D@iLk9J;)G`*SdC|=x85B*Yb)sO^4uNt|>q25b_IZ=j;6%j6yhi_+a)u~7 zBr=YCqVR$A{8~ks#1K}papCpFH%0#O0>%KVCWeB^P4H;UA+U|!9Dk~(s)`Tm=kk6; zojDtEAkeTP7cI+7bWUAsCSn^$hvajN4zt`T&A%_IY2LhY z^afNt0wt2!^DrIsBgGj~OY#n39((gVq1!LpX*Vpy4e1~59~>#azu#pOOWD5*iH`~K3jPh$H=2AUkxA7})S}~3cvQl;v5SG+#(~ z4=Cj_rU7XgI9D#KN0MlD$*$}Kx4#zi(Ig5plM?o_Ipb&S)Hd`+j_L(Fe&c29G9UBt zxK3Szor(>VF<)SmnU0>n*}wpNvygau;3ZDUEd0y^gHXZgn?t7(Y3!g8+lm659nNtk zOWs4~XDk#bLMUysyIt9JSC8o4eMA({;__?1Bl26ne2@kIKQ3)v`SpiOV<$2G|G6{* zUttqh+JxD7ROcEzI}Bq)K7%^n*i}exUdqnW_tT;OXpdcF1IqlA=7SnwE+~H$OOt=E zx=fz8Oi-?qs0)gfcg$cto%Xz{asGXsw+1Ngt4_9Ro!thv|M6|GmvnVJuXbnZYW;4J z121y%FIH!(Wa*(2f8AU_Heh3Vd(>IlHqY*0I@R&E zfB*i;9-jWY`@Hc1C^SZW)|ma&`3Z9%9dm-ZyBb}CAI$p^PXxMgqE54oFag+6c1CuG5o<^YkZ^vI%HWr8 zy8Dtdw()nT8MgGyob90IIk1<1GiD$tX2!K36!1_wfdo;=`XzT=Tg*9OD;|c=YwEr8 z+j<&iTIn>S&UF1-wjI~m0s|I5hpPF*^7KG9bI8y^kY);rX+#ICsPWk|~|scQfx zm?xNR!ocFloH+6GtNIJ!C;JZpoSo}0viT+|v%ZnV+c&7lI^JNMm(g0cK1?e3 z??0W)I65z9<5iD+?GQlAnd)lVmnVlD`tuz*y(xj{+#pYZ0Ys_12FwK75P-~W!@tK4 zo;ms#;djGDC(2U>W4)t>NN?2>K@8a6X=hI0o=%7A%yMLcD6qe+LRX_< zv;vK4Rn}hvuIw3uwgn3jCpYx_u^?GsgP>R+{myzbUfd{Pe;jw)cPG=P4xlpQLIYO@ zAwXJFQDad(0EKI&@{`YxV`n}z_CaJ8HWgyOyS_q56o=S8Yb54nzjr1=EYQB1yH6Zn zcj}KA%)Bigf~P@3qCH?Iiw>AS3F!iQyL1vf7HtS)vfnv=vL7*h@Bo;&+vYSxEOG6n zgIJzGF#dTgMu&|s-zzPtaySjdX@9QT`J8(Otiwr384DVbd*B?Uk)q>IO97^Vlrh1; zJ;PUmicoQ%t%Gpu7>{DtRd&A3!yQwzy-?oc9$KiU(-=;Zg)zi5B4PNVP{tJ0fFt(= zT-?{=V{7gxCVl5A?zi1xI~@~IWAR8MDE3a7YJ5D@YVT!noS5x*spURHM!A#$GT*G< z@%xs)KGeE}c=)o>W{WY9!DC8aOk+?v-Nylc>?ej*6vib9`=o@T5+XKyaVV)f=4>lC zj~A8K8WjTlp;_KWLj{wFpht-RglQwcK;gwWzaqXMT0qcgwBh=U(=NxZ65U=wSpn(s zEK0jyi!6G&AJJyIF2zana36f;Bw!U*^<{EE(%bedQ*zMLr`=fK?J_#QJfe)SU#&T4 zuX9|nR{4m(9?>Gg*ylQticI_!D|gpBGOuy!?j`&UqOtNiua%`40cLaA1*C~b8ZL~N zux1T>(ItfGafX$Nsx-TZ2daT7_Zf>bXwLp-c-=Q~Gst2P6lm~|am^~Gm9mCWVR^=_ z9^<62u>kcZbi)gGx1xGv7b+p>W{%#M<>6z{lu@@taI!_n=8H?VG@TC|XF=y^^;ZiB zPg2!+?y8mNxU9GOE`2!AjF$AJgvA#<=q++;_l+W2@oE$lKDW7t7jo;tLc&9Ysp-f` z4*?(b{`-cl{v?O%wTMHYp_O9B!$L{dc=nI5oY8!A!j6kga@V|wVDrRzi>MqS)cZ_# z@^=60{dIkKX@)oF6r&fv!NQEM7sqBZ;g-KpBcusud22=>5Qt9sf;8xtA(Pjfn_@i73H$$2VqY$Zk$nXw{f~KKJS3g~76xZ^EU%^TqoT-w zqKoXeYQrkz-J!=Q!kl0-65UP&)Z>{IuGIAw{%RML0}bRi92!G&+Aq3vLxAXeK80}U zXl!VFzU*A0M7_mYaTRWOu(1@1jDn)HaX5M9@1Rf!<*-83rD1LbWdDjgc80^@%j8S! zUng+@J0{59I9avsP*drA&c{zz+X63}7Te#6P5f1tInmk>aRA@;FX0_B<_s{y^TZs$y%Ah8Ul`|G$^wV z93K2mp_V1dwteT)JL!qxQ6T$Js zGo)v195Gf^6~}+YtS%chMk-6H=#7>yh9#?qEt?W6!fYy!%1h`NOpsrzs*c@T+RDgq zn=KGd#twpuq}|QMS4(G20StN<2w}@kh<#6CC)?St-XA}Fj3e%lk%GAs1-aS??4_%r zYLM$cr=m_}(PSJ!1H5SoPfd8&tBwh9F2}ltR-%aBA?2?PlPQp8|GJcwI*~sA_H?V@ zfs*x$iNC*(KYWHh?&zWwZoU)HL={&)eZoVXzk1$Zc!3yNr#^8jUNF3HjIC+~Kz;+Q za5|nwubLY7)$xD;-Jbt_*S}$mXmuBa-{O0k9ip&%6}F-9Q-Xlbraf4Fb}bl9PXOOG z-2vv=xCY&*+dm9xGu#+FK%stx{wcB)0f|n=^JVa9?ezv->s|xsJ-i7o@U>bwagjuJKUkXjCm!)wTxD3+s}VoglaseLnQ`BG^N9 z)+~RbxAeIFJSeTHN8_xQkUvO;`tU#7_6lk$`UK&#S)8WPS>)SW`X3RBI(#3mn3>)UYVnFC^m_Om-Z|txYvw7#`D~$fkEiMJp=uNsm2J$(8&p zk5>JO3N&&xWWml4c4CeG9c6`oMsEtPQ0ngx?~)^!!8p%0$=4t~e)TA?A!R7@TA1~m zw*kLTRnKGq*{hcjG$u=^vCTBdpBLNc7bvzkL1<6$hyyMf#*=064qWZ|3Aj579p@X-^r8mMVkZ^6VYg6|*%h186~X|=>K&wP5H$D5W^ z*k!8U0IVy_7)qSf-u}G^|L%WTFuNjdaBKB?FmL=rQROiTBl$)I6;7NYs*~lmw7m;n z#-0T8(Y8M}RF&0RBC@XEZ?CLms>Ps8eG8?n!=DCxv=i0I@!#4k|Y5@;x$FU7Wh!6 zhWaIu@SPYJhTl7mW&5C1g{3vq4h}9^s_@VC0ZwzlkZ-wwU%MA86r0PyP`}s2l>|y6~T?EuJmNrK3&gCEX~KnhJ?NIF;*DGm=%>c-hT; z#nYKvA4aNM4-pXy$&43T$^Oj)w6>y(r4P;e#=^}I)5D#dmpntujWaX1_oZyJZ?09p zA9$}{*}1Ia$37D7UvPJ1(dLD-tpc~it#7O1S6EQQ!)BWoN_oPUu`ZgXslu-`4-nsh%E~L9 zH3ye;03pVm`oD8EX6|Q-osP*~br8QV6a+h}9qB(Wh<2OS@plYOa7x*A?sGb{;_@lz zIjW&~*qk})(sYl+rw27F_`%SejLPV(7Tu28=>+oH2#280xy~EY(Y_0nJg&v-VlBUK zXZ6TbUarKo9zbo^7s(-C4#$2`hI1g?7_WE)k-P5=8DZ4p^(-{r+Q3b_jd}3LkW{n) zNsOg^jGDQ%m!Er-gwSr#YE%|bih?O=VtSQ(r>c*2TVg($yU!D}Xstvo2p%0to+;$b zY2*MZ2TRnMo93YvyZY&a?ZK1JfMWXmTySToF(1%YT%-A(jzJ?%;)B5SjH!jcoj4FY ziz{Sz2$G=(*u96=5!k~7O`l^2l&LOMR{ENjs+E@iHZeFjdi#@(XbM2oOcW{M&HTdT zv7T)lzZ~EGLm?FQ1kg1WyaIFXle?s^7&~M@Z|nJ}7guw>VOo8U{z@Qze(q6Y2DV1E zny%diCu(lcR*v6wMILMsmxa=8aMtR}B=cJSv+eKoZg0JjLB=kNn$t}ID?r2;|GQn84^6Tm z{aGeDOyzEnX*ojPfby(*>^7F}8)W<3>QwWjvGi6J{ybuJON-(u`B(alz-)Bn zF$rDJpWRhZ09kNsoCwC0B>%=t)2_$v1=TndQNT*{pR#&N?}`SiK_I`1Cb^LHUHU_K zw&b8chOUyJk9c9)w|q9FP_5pdH6u=&HPvWOv#|WIyH*C!fd3u_g{;vnVi%tP{c}Zg z$od4aa>71ZuAw?oar=wja{QcGEa%Ii;gdt4?PW)K-Kq;jUgv`$5nV+&sp&-zJMVwc zS};MZDg2CE{hieob?eBvb7Q~VpO1tUgf{G`ZYTU3m`P#gPn(*2o6#DDNW+oz!8`{q zp5}bBn5(lN?)@pVwnup1y9INog+A;!aL|K@+P|S3EH?RwyQLO#TB6bM!0g|3HzNck zEdvQ55;I`HO&z>H=%xWc*GJ&5pmBE#xS_3mue{t>xy9R6rgfKoWygkfeU zoJ9JI8{R8I1o_vMh_?NdUK|#aTMqUHvgP~R%jwXOkCd`DJszq#TXR2Dz49Cp!Qbo}X(d}*bR{23 zEtR!tGI%s}RLQH|3XbdbSC!45|AjF2g2pdr5kU+ZRBL3no3;@#!JDO5gPe!YT~>_; z>ikWcr=&s#9Rx@Keetoi?oop#&;|${?BvVwDr%Oy51JI$6aUZvPXm1wYS_XlHUS?W z!;Vj#ug+hx=_RSxuT_sY=rJOqPpWg%Og0olWj?$@2?VNQT0q$znR z@GIlU#3?}=8;eB!!b2)4SF`_7^UIw5XAxia>(?Z?)sXZ`jtq!yRAVpTmm!I%8WcsC z0Wnk^IuAxzAess>*`ymj^iSp^`YBxM+HN+R7hY?F{x5DbY+`)Rbh2)u=Je+C;(+&w zbizY|y~!V2t)rE*GU14xUz|@$0r(9mxRnqwUcY&tl7UlpsixCjWjufw3xfwR3BcMi(!@iiPju5OB7&r0kP?7fBrk`_~8U5*JJTu++6 z69$=}{bXoW>3Kj_A5-k?5l>#(OMpzmPUUHM#XQv363y|^P{5^# z4!v+SlFDvs?C8c7vg{&mw6=okqIzm^NK1iwsX61ndH&`1ZyBz{)^CrD$%nd+tl(nj zHo^~6+>4$f`zaEB0P7er8RKe(`ulos~qN$|XaLAJR?fcv3yN9Z+ zB3FEYVKOKE80_}A&3x;*%<*h5RI%(CoAn}>@OIfd))*E0qpz8N`QYh_V)e15SeS zIEZCt^Uw_BHG~`tw?@G?zH0OIff-|@Ifk8&EW{wb4v4?$m^F1XlE%{#P$rjrFo3=` zYrw{L?yB~fS(kX^Js-3CEzwAtImsJx*lWi9eM~(csDb6rZ<4F|`VJa(W*(!|LYQ zFE-`j`}3^k=5RPvlC@cAv3RpkbruF-{!n{YQ;h7 zI(;`}-$Iz*?QrkU;*hto&#U)QuYhw{E6--lzxqB`H?qdylg5sgZ-n8CoSq)E z68U7%C_2}yk!P1fLlFZ3YL^V0$w^FTLg1d0-4)hJjiHyGGeH2>MVRX35`cLXga zw%U=)-MaL_E`*M*F)4q{wr-y$xIicm*~^a%s8y%e-9Zf3sR4=H;4zqjz63&MtF1#F zD;tvjFWEa}3RyHd0IMIfP%UFnb#GFr>&nxrL%u8TLk;DM)QS|V?Gd{bw7l_^=EQ6j zia>n1v7O#WqezdXp$=Yz5S4$-nv3gme+bEf@QZw{#a;v4mYql|v}z#s%t25_0t-A{ z3*}Du!zH+G*yOyn`(3>R{fwz#c*4X3hd&K&dh9`!^VNH8a7>fs$F(hZx6!qn|&dMXfdIsQ?e#nF`K2emIeCB8tlh~eidug?$TJt%%qxy zK)0gDZPI#r&EnNV5_e=x`H4r5=Mneu^z!^#0pAZMDhu zI<^i^K?SCzXxw|n5%*w(3;k18gx86|PTQ(LK*Z-xwPA7?VJU1p&A2%}d$QKJXbfwx zJd`nodm&R|Yw-oW`xB+IeyeOET6PY-&Wbb1#6N06IjZx7l^16c%0Dbu8!0F)Y_02d zt@cjyINCRynYwJ7Q&Ur`h@mb4Iw@g>%WH!%s)7!kxC+@4=OW|7S1_&UV6$LP!ay?R z9CE*s678MEWs?1^#S^Sa=3qNfuu+0JhYc_3ZzYM&{ts*S7$nITJq)^SyL;NUZQHhc z+O~~p+n%;<+qS1|n{Utj{_jRCV)x5NR8(YTB`TwC-F(i;o2L>2)sDbReffhdS+zY= zIT<+h(j$YQt=fq*-F*aFzbxsJnh4$S>?m5-%{d=Pgvm07g?>LO;O0wMk^_zB|W4Ygf{EQ zc3BS^arkwl^j4;n*j#;av0P5pyWNYV`_pePC--Yz&rfCdw@Wb@Pfm@Tg%2aUZDM!N z+uO;~d&z{Pz&*9_$HViF`ewdvH~07Z{oB!)tHmc*xp+~S%M4<^tPZc&*Z0Yo)412m z)w4h~xh?LO6Gb1F3i3HE8FyFrCt~w~+^aaN`9w=dc@F&snBz42$UuC=Xtl%rmtYVR ziOG|WwV$1wVi%m%kCRIR<`Ok5s^W2Gs( z9OKb7xqa_iFq$mYI28|oa%mM&>!1!?&+~MSKWOiLT?ksp4}yN_x<)Vo`R+MjLkmt~smOPmk{nVAXtga_Lsi)i^a;y(CMLVpP-cfMb|3j<~33S24L z*WQ_L7@nqhWV_XkqTA`__>y2}=Rv?9w(w5XlCkbG*MsV4X{C8!!)DJ+x49Go;7k#r zEdJEUi3VDDRaMj>K8h_?i$|--jX9?@Ofm~nR%UpdK*pX9?Np$It>p+P_=nl43MXYE z%nn;)W$+yKj*7NBFdDqg3Hj97`Gizo%i+WZ|GNYD9#*c+o{c9<&Q#bXFBDu9RaC7&2)Zitg6&jzcojH1O_G_RPl>i6lvksn{`Vkdk+;K7xj3lR6y$w~OY4-0OR zy=N)2+L;?3vI%pBI1@{$!fZuYoIzP?UPj43-Yh)5Y^5o0Y^HC{iITF8T|`{%`xcD+ zBJ;WJPhz~aeUA=1?##1yx!appgO^XyOKJ(nES7mU(Tl6}8~JX#kn%(=&h;lxE3_0|F% zL3jw&ngIcExgVB4N`GiyTsMC*>ZW(({3zr4^!UiKyQBWR4!i_cr;A>lX;DNLdt`Lk zDESVoq3S|}?PY#Q8EN1O31IhgF*ihDIKehc^sJG`QDGxJZ9iKGj^fiZq(b?cVamr@ z&ju(7F;TA$DUlsv z5iefyGDtj@8K=s=m^WD@uQ|~8gFMS^>lhPD<`a}GoH8l&CXpE%jTd-UIFU4di^Inh zw1os@zY9XyQMFy^hu(ITDGyv@;qNU@DDPa?;$Nrp18ob&y%}siZiC%2%t9gQyrpRM zr~sWYbZ5|8Ro;9rg^=>-d0p0kL+GxDGOQ$@i6#F$W;G2V+q;+PQuw|uM&c`b=eg)(DCJpB@{xTlX7p>Z5pu1`YXz~#x6 z#F4>0@J8p+M4{AS=(Sz{D!54F$pLwC{vxCvX(PbgWv_9}F7vt0s?&_8Xc(~=ZQf8+ z?FU=+^j9NfGVOBN-V-zSp%aAXu2XE;t+ZYmo>UW9XhHzq@Cq++alJF)4+L)C5oSiZ zY5qfUvOVk_dXAl$joqQ_Gq=BoM++xQH?^&6MmM#E+u7yy^jOSxm5sCMJt9l=J*+#v z-nBX!e)g?-xVrHBs&CGFP{ZAC)8eD6q<*{{v$@fm&4dEPKtSF|7J>yN{akq9@9~P` zj_HBe9*V(8T(+m1a%GstF=6B-z+#7y>ys3)ba__F)Te6F4Rg)FI+UcVkeTM9vmG{()uq`X2jI7^=YFQ`Pt4Mtt z7t0THiW(=&CJ{RBE8P98%S6>{=0LE*fk+U!VMeKm5uxRoQtHJx#`Ab)0Ls0*S=I&5 zD{iw?y6VTSRwHmtgtp1Vl{yNlkpU0^wENRFdAyO)IGDj_;UMkML7bD!7bJ z&Q!&e#;qAuuf#KkUJea~PJ-fn-D*xzH0mnWzLA$!V!oXdgG%naYqZowh9{*5hv!;3 zm>BS|v**0mS$d%Q(qh|MJoMs25D5w@F&FhPQb@A}(;yubf~=4sZkO)_qo56F^QVfR zt!;>^P+#v&$KR$RrQY14b+A1E=wHj2m&b>N3WwrCQyK5QS5&MsKorT4oS_%#k9VG3 z_@m5LB&VgG)AU%tz$yi=q)u^(?C1$^#guswn;#dh&2-HG7K?XME_XL#fU z9KZXZowgMHW>18*@1~V?DPZ>2)OD+v^EPMglFSBpSw-0f4lXf=v-*W&WK%FzJO*-Z z$<`eeWnycwx|p4i3v*{{P-4BrCtgS_{TpWhz*AP0O&bKq&tuIIVy#G)d7V+k_`3>` zp~@0V#hDT;Rl1d7ggPYwA#>D;a&}o6^(lsyYPyDVaIqRsLffVO@ic#siE!VsV_crY zb#@SaakvQcAc{5nUHOd>$V4= zQyH4K6(^7Sm}s^i`tvMk0o8ubiq>se8<*70T#1C{Yh7HeI&{s;(1Sj-t(zQ8lz?v* z`!1oE%o_0vfX5X(o+WXtai%ZH>l3?i9%9)n_CiT@@y4i)*Ge@%ft}Vk71jm4N;$2M zidSAJTztZ_atvJo-*T)%sB|W;{Z$;UzSD?D(9_$_bu$Yt`Q){ zIjT-(X(Z=DlSYf1uS)3n#aG#)@GK19s-w(gIhu0%h&@X8mXYL`n4nTs<2V@Uh}}0! zVAFO|Jx<uzWCD)3Rj&hAS=JM zh|qY-hr@7Nd;<#y`6I0IW+2_jRx}@Ja~r9I3>p(i`JsY+rb(T=zUITvZI*EtJnufH zkIQlX4tP*ldJ3MBlFE>?qazx@;rlDzRLu2Km!wG0;D z0U_3w_c858E&S?E{6!ufuBf|Krbd<&7RER{Vhc*mkBdQfq+-ZSIq(mK0Ph04|T&T6?SVW%Wj z>#EtkE!wE#{K-qCz^=4Y^Nj|C>G4PFabTwgo+%;v|$K!2xF@~?x+ttgVv{Rt~ zJ#<>m*Uiz+%iRNh(Jg}>BR@alM=c3|Jp#2iLoI2T=C74qO4ojH%ObQp(cmt~O^(`u!froib;x7+2Nc1%=& zy)@)6P~YL{THiF^V#Dq*&3Nm z%NAPaU+Qmwj04XB#$mH^A}W4J0swuMb%Dv^O_I}>ll1YXJ{m9oVj25pW^kf8v>ul0Aa#_ zl~4*jvDLvAv^**kT6NxZW!V&j1JoTZbT(a91k_PbHO`%T;{vg13sp$;67!JNzeaEh zjrODGC>+Gh!!{Js30<)YYVJ+M|4e0b!Zor`P(P&ft>2b)#JFQceJRxhuBt zE~+oyC?|#)lNZrgD2XhG855XrHVRW?7SUQZl@clt*I5w;z-%&G8RIjlU9aAMlv4=; zAw7<}bP1t&Aeoe@=NFilMGLPh=UPyPlv$)l=fTiOFeyvK7eiV#!5^8 zv~rNnHDr4$%iN#PJJ&N5O5*G)%My})zf1Yj3iQAaEZA>6HAcraVAMkS;dp9osc;$&z?6vWf-J}nlZvVVdQF@rY`gSsQEFR?s1FN$T zbDUt_8E@x&1E*Hq?{?9u6Te@@$pC&|cz({+WlOO+I+4|9q%nO9|IY^yF7HmU7+P%OwL5q^yzWlLUS8y;r;?hBQ~0{PTyOg8>jPcq#v_WSeK@;4 zXu6{tJaL@9+=%|8n@^7Edgy;G?o!vA&G0+7_VVW_qBuqDbp2?qUh3szR1SP@oQyA< z&)xq1ZgsYujc@#aC)aH07V&)CT;31&3m+99wW^nT$15VRV>K#z|*XX`svH*=l(f zVN{Z93;0V?&DO|%Rt?j4_wR5h#4;zE*!vEZH=rb3q9FmVrw2ELd>?N%8dBheF+nAM zS4Vln&(==S(_{d>QFC2H4P&NLpY&;baA*&+k{LIB2_7g9Ah;pRLR z*AW&C1iDWa?}-xT*(j@mXgiz`GCZJVS3@{+ar0e+@u7ZgppC!C<%HS&4Tl!8a?6?!QEey& z7Mhda4`zytOppgyEkC_oMOK#FPOC9UNZ zO><2I$=bZ%rp8RS5_DTc^a7~FLS%crK{+Y{3QO1kT6#Dec1c;hyNiknr24@QD}zS7 z-fKLa`nE!+YMEU?zYS# zNI>Uy+@}~GZP*1h`gT@U&XN3v!!!>QTrPx&Lj0wuWW#n8CgG+M98!-ct;G#z1`_ov zzinP(dR4f$Wa-JNU4PKSZO z9}ytsZc5#=w&urxkh}9-9WjW#b>yS~+c*Z61+tpKQsTI1$~o4EnqRRVyRen4nFp46 zvy}iAa@|rmubH4k;btTRSkv%$!~W9U;hCSuv}$hdH$~{QB@-4{Qdmwu$x+1n1*(%hXGn^&J;^f25^ z2ba_BW$*BEetmxeZ%dc6%_D)ufDtR!*hKJ+F@kGlB+o^V*Kh)(JyN>+t^8$JdBM6R$SVUd_8?`>}-z<}I}T4D>~Qtd_bqxxm()l8OK_Q&VEPny>%d#kTBK!nb>Y_fDWBIoCCZ=_JeR@Sovkcifq zaK4fRLoGC3!-Fa&kdE=EMoiz#hpkevNQu;Cl1H(TRqe|6%Mh1JUXQu*B~wpr7u$1k zcyqSv64vXpvO>p0hdUzzGx~MjonG&~99->O#Fwk>p*fz9NjP?!*}}4LdA7B!a&WP) zcye&~;>U-z+PoXvLveX?b7cv@bFvZD+Hg4xSg%qb&+8Ls2{pDu^xesz#zs@jOgVQ4 zwRel@r3f+%Vb^gZ5q*CUcsjh_J2^GAzd6~vdH$lMtCDMOvi)u?RoU59PuZ@n%XA7* ze|O!w)z$9V!sXV%$Jy!8;k(k_vUdc6bAhdkn`3*isZ-@E0mV_%bux)F5br0Ka(Ymg zgo&iund2~mg%Uwl@oMB&UbR4~{F!I9dmt)qX(9wFpeM3Q+@VgM0iwG8U>E{P)lzvV zRr535HsIMKy*el?UH3HJudHuq++s%^A_KDS)%^*ef#V!wT0WLJqVVa=1$$yP3^^WK3p8h~%a z8~+l+)*BL`$9Ku)Fx*}Xq*+I4_1;S1dk9PX{5uFs#3*cmSaWiDIAfapqvST?T(Fms z)mvHpas$1=gN{QNE;K=5F9HHX?LjAya+NT3H3k~PB6Z?aWrj&2A2k9)`N&!``|(g= zCBvjsel?6VUn7F}ri753tuI=mer|43fkpW{QyU*6GiwIUd9Rh+N)UB07VBv}jHGvo zix(*tg-}ufG%EB*OO<#Mj1}X%qd1lz4Fuza>-e6}zPN_+LHbuL!<7}SlspUM{t;c6 ze0g9vSAPmX@P!Whw7|LxWX(T9a zf6U*$Zb9uxdfIFe)*TEU_fXpOswwQB!Xub zV-Slo;82eE0ck492*#B08^Kfb#2wN2VwVQGt-{Y)J~(wJST&a>s)1w~t>TP*(xDTA z9G?ejpi=4$GPIW-c8`f82zs>z5*qajia{$ZQ_WLDvzloYk_U|hy?~lNQBpt<4`PU)N z%|qnoVi!py&{T^uF23e-b|PSJ;%k=}C~&+)7*AQ@v{Ok7 zlobXR>mt_x3F`d#xnQ`rz%&G6k%-}m#);;70#nSvT`{1d*hY9#_zF0l1~`uEw1Eie zK>?sW#Rw2MK=7gD3zDE1R8W|pP_NuOe(s8feE8a-lHr=k2C$CnU0@@z2rv)=h!66-GAWCOar*m3d;2x2XI+I|fkPV5kDZ zmS6?f!7&Jh6VN0GAWXknRXLBmzL>(xTE3Qt{V(Fh3qa!pO8kWhV(Ib4k^Ng9QA9N* zNZkC~cc2fL;32Rq5J9@Iq$N*l+t6Bqf*Zo-Qjvx%HiFs-M3ll3Vya1$EVG0Ly+v7!0Te|)64Df zN7HT}Qi>zJVsxV)I6S<(D_q^|f5`UZbos2UXUCO9pW(PRM9ggeE+den-)fGjf^?lR z(7Z=&^dlp5Tqf2zXxx2+QhSO@ht^z#Uu%jO8N-N>n>GxJ8Ky)rUT``^U<7nfoe+rN zM#Bu5&6Htso52r`J*-}W^@)tPD2juDElyG0nsg54`ojs~2piMg+dGJc#+)q{&sVnV%{F-p6i}#LTNm&Asp+`fRKySX5QAgZ^|&iP z{!fdN(F>oK*kI^%t}t(!y^@S9p@+FSJ|{6(@a^Gl*_6?T0b^33%-;J~(`uYXFigc< z`%i<>-o;Gh-_|At)ArE%(Ry7$*#>F4L?=I;phQM<<)g-wyLpI0TX}ei)}#mY9H!O;Xo31i)qn}; zyALeaYq7yMk_e)FE6EQ?U%>jHayxQB{m$a?o!Hl}MwwOny@Lyzl;Y&2}JqIx_$WEd2PMck9;`v0mAjjV;Y%pT1 z$#=>0Qe1ab!M6Nq$7omRsKSYBc>vZ(@trlSZ~_SeA_7^;C9)z{<49RK*50)^iuYP- z6*ieR8Qev?%2{~SM&n!mky!zH14MePIaR2Fs$i?4kcV0fPS1~l(6OQMBc_U3<%6*2 zyJ!(2f26RVGpQBW*SW0MRpd(c%z>&PcJSLjeRz-x0~qVCo0dT!7#cU z8@k+E%ChV9e#lIMl8e)?YC1YT!rx_Kfib%AM;}IQ!_#=Qva1h+xSef$YaHAhZ7p0Y zts8t@-CWvV@hA@R1ivi~`IA8w5d6daRC+}lD1ltlB~6Pwl=|LBJjX}A6NVg*w%=WC zFj4L^(AIPiw4+LLE+ux-iNttRH30!ULqy6n%A@PUJkbt)O;vNp+z*?9V0UK6fHIm? z_jJ%7_oULh{da4&v^lu8u5`3bqX&z<7xPQ2cT0CKH?yo;+op1AF=A(I9RGQ*-KT?n zO|ZD#l`K>(hRoPAX6~Z=;*99=-ODd$AhCESYDrbqKzQ5H)|E6 zv+YSYdSNSp5s;xaE3zNAWNq_>!CIEhwHHg%HdC(s+U zbp!uOeW45mIhkI5>q!{8qj^prHKrFTBgxozd??l=)_b8PDDucqJD-SdxFe4o~HQfZBIm{)a zPk`bahgy@z1c~pBCCG6+M}*_aAxCh-V8S$`6Xv~%c%4)s(R~dhPH3^MTu%06dd>g* z)w3m6=ozTG5S7BD0q}nN{j`h85r97r zk&8W|$vsWuEWr<37gv8U*`wOu6`tch3F`_28uly*G|&=o0-;(CP+O(1IUrrjPG72@ zF7{ppG?0s6G`pJ&A6PU%+3jCNPy1B_L~Kn0%h!3QGZf-ZEgevnH#fcUJ~Xoi|KSX5surey z&mvq?>q;xMNE#5=2~jmJ#6BJhyQT}0(E{%1S4|cG?Gf+J2qI1-@D6Yt>!wXKD2_pi zA9u|&0i44Kz&yk|FYVR^k*e=gH5rd5Qmw+tQyB-k9;==Yu$$=t1H$XSKo+1l#RJKp z90nbZ0EemERh&wU;s(S7#ZqdourwmbVq(1`O3NOAhx(~5d!PtWnYqYej5CI%NwSWh z&iU#fg7cVSE0Bu;s`<<=55!304b(bExG%^Q&F};WDzbGtw(w=+0`5egO`N@C?V5P? z05h*Uoz0~~-3Ovx={8`7W3{WNO59c$JiZ{sciIq=0f;nhoV*d2dz?CAvHz<$p%;c!2jOybbXrEvGt}~q6Hj`SV3;%9n~eEf?yX& zq1+C>A>XOKSBL_hTaH0I){s*<77(k~r}{H6}CVEOdKhiuhG zDXkKMbGVKx@k5VR7-D7>ypB@2E1c=kRj{5dQ~$RLpJ5{KXNQeY)+OB}jSY z%*0;@j0-YRES1bmaP6L9ww8ZLV1Q=YmvZwrT=P%>2T(kC$3TG*Cm?t#OXZBy!%!f` zTl`@F>+}6WzIrcSOo>v%?9x1Rul@^C`~j)MU`h9Mb8IMV!(i?~z@Cv|Z2AENSne?V zKS2nx1%!fk_G9kBD(d|UO%XeQq_uwh{IJ~n;F^Nb7(^%(qvZ2l0h#7d-gwZF>_fcC z{P~=ZeVm6)I$#9Mkf6|has&vRAh>V}B}q{9swj+5DEIC?fOiE0KKw0kNhpof{aA-h z-hicbn!<2@8JnnE#1 z`&54KJ^d(dFq8pdOEBVppz#PK)6gaHA$}q`Rys}n`7}jQv45$K0bVDG6Ne@Yln4GL zh;P6jOA2IvK@r&yFL@1c*MmN0ii^O!KnUT*lB}+>Y{WCKMJwt@Pm(7uX%57KNPKUS z>m_2cV-M2F&s52e5t6;nOEN|TLolH1{buBiZACfk<#vE^J79wc*-iXzZ29){YZs;V zV}A4QEh}_*Ghwqcres@f;IAAnKBhKbPEdKhxLXLGQe4%@;G2iRm$l%J_g%hrZh#${ zpgBt96Ri%jmA>)#oQf#U6^-DCcL$;&1jyQJO_+tGj>G%2vUMO9fdoVl_xihV4Fc~| zZ4tjGN-!^?;Ik_4VckG?`0&vkmpBdV%|Aiwk=FfhLA(4F^j)N|B9_&+pj9fq1s(lY z&}^%%q+g=ne(wFx&jH_l*8l70l)ruk`s?Sm{|`UA{{QReotFRcbKM>_(YK$6|N8km zh@|BH_A{8d2!PfU_Wzro$^QD8M*p9mn;yw{^Z)ue=G)JQv;X{jNB-?+vA=!}Q>AYB zA3qO&`96$#xEX55tX%K zOG^5zIbm+^cNw2vTlQCYj=zAZ|6j73@KzEISt090;z>q|b)y9_xePD7{n%J}=D znfnu^@}Hj#zx}NG*UwBU*m6JZDD4WFR5%YU4h|bAE;7IU4E&#;fBf}x!pgC<;Tw|# z@0oOdooSunZ1|I$g(qo5&LOPqVn8YYvJ;KzTp3|WbD8{1cmgm6J`9BJWoDF^T6)>% zo~=;p*bSNJ@HXW*OQ4Snc&DqVmE4g-X!+nvev<4FlqyVgS|MtSppLDqX=iZ)R+g-V zGbgBU&Zdj!M9AQ%w00tXTQ|Mn02%V`;9FEIJgf{ z-V0F9v@f_7OG+L!di1{FU}!nkI5c(e>?hP4*Xtgl9fta{r_RYF>uw*nB!|EvS^@WD z0IUZx*v%jJQ??YjnC5nL^!5GQ)1622vvc>em-lD0A6HlP#pT1lA2P6lvAyo&H+1-P zv90swH`^2X%ZHKcI>k;N7at!GJ$-n4y`5n z8TOAFyt1W0h@Rz2@`lFFMSIGC(*3m@ih_=c%wt<;Ec8qtt0e-{DLW z7fT=3B8s<|@-LB(%Ji$d`J+267YEO#`a8Rq>lRmgJI9uY9NC;~xl6byxRcjKYXWe* zPGYh5N3h!Y-$xk{7xRI8ok#V1Vh%5EQq9#aPc!}C%46Twok!l1Ou-+>rlgxmZ6K0qki{T*olpY%=qoe&r3*63G)L2>RYQgWU-T<%IOK zk8{@J!U`v2Jr>PPdWSDFUn!E--@b6-r~SuXfssIC2&5?d(F(8g&9<#PwxG>j1`}1n ztvBV5pEcX0?wOPBmn) z08zTJRQ~#*dQ($1+cpDhu!N}7UO||9MP|m{Mf>-4TD>WZcky7L!kZJkKlH%xhd}x= zX*D<|mSlBmN=y(@&y|794E_`z~-#~SB|e|ylMG3d3SrdJlTD@ecIKu`)Jk1{*5coLgzbi9-X>fL*Vc(oA5BZ zS9w}G+zGkV*0FWG_%ZVZ;VKr-G7%`h%Y}0Q0TEZ60w2UKs`CTnH-H42jtRnPJPVU} zcE;_vKWz4EfiT=(zkAO289Xk7_5{y56X57sb0*kepFCH`OFoU7kWUoHEZ}p156vIh zqfQv{>WQ4#8sa;00lT+O|7m83bvFl2Teii&vjDrjJ`$7+NQC5R97b@%n)TwlG{g6jM=jK}&VH|0SNU#6cn?UP}G_+#A5D9x7o4!&uk zwbVqnv1r|c<}OOZ$`UOl0Db>tGNzhUM?iPx{W)s(s~z)WL?FzeiTC&Rz6qJh;JW~M zFlJgOku+pI8(&>hb57c{IcW9u3VF+_krCsTi=+M2DEg{4Bo$f)m4BK|6^N3Jqm1ZM zb88V_G3xu%s{CP8t6xEZwanupK><7rm%pj#q#THM<~YeLvS z@GxQ8S)4Dy)& z5Crsr3mU*b$i02u%#kSRlHb%c zuA_|y?%eU^_PhB9``4?9)ZTAAuE**t7u=c6kC*w)%R64NcD3R+wdMU=H`~yQ^SieP zJ{OdKnMHT|+Q6&J7alGWuHk!QXq_$IjqL5sd9rAmo5g=A2FWWvrSx**+yE&&f%>O7 zW3R@O$Stw>8x!wiXz!bTms;dbh!*$08ffhFa{Bk1=5a(kRReA+i`P$5(w5Y>(+JV@ zH75we5%WBm6xe!reGP;@1vrJ?qJF0-6@7rZh7$}JFS$GZmqbt~0DOwamivxaslHme zBvoZg0B^()_5u`OImyDIMSNY8XA6xmLs%u>K0+9y%@{sQ%w$=cRsER!Y|UY}&0&g&@+DqL z<${a4wAYXje&>QkTXEe+R^m+_^(Oax<5f&F4tyaWpDsAG*2@N#?Nd~bizfY)E6(*f zzo~c2*PMT>T2r^zmY&mI%Gbtij+;DLwFghfZw}e35v|w~wZo3sM-gw-S< zw^K&WEpES|pCaCS#+!Nz^*|?=XZMQ&8B_i#%F|F53>Td|aUISqxM-9+U8^6cJ2qBs z;gksTFoF^N+F3#ezGm$V{BakPZFOo(c?##mMpeHJ)wO9Q|CQ+T-w9Dh{;L_4mF9B~y+X@-@^Eq(%9=g4}M5quThJLbl3z@hjjw}FuIed0> zHEWgtfD&t0pVJJvH_wmn4)M1fxLQ&5bi=hoijPP{&iRw*zC2*73YVpeTb)z+NMSb{ zVRL-@{ZkUr_|K$3%&IyXOI~kWHIr9n?rFnU?5gv7;7Z*#k889CJxAiUf88c|>CHn5E471isSLv1)LI`25{+vqg%f3E8i2E7l8So}d_DX)bJgMqTe zIt%Y;L@HWTg9NC2f~9bo=}iG9SSWg0;xskgx$jg?fYg{9y=YCb+HwKbia#(mKa1SJ2Y2`$~( zOMR)61hTlbPhAspFW7wHhs(8MRox?s5gYPzw=fORv?&qu-gI01sIn;*Bx#nKlgxrZ zf&c{0pZ%p}djXf%u^y=z-udxHBa7B?gXG-cdG=|PTHkp_WYNiIs#d=7Y|)Mk7@4WlN}5bvO) zRI%{3hq*_N-7(rFOJ+fN;8x`kw^;oEJX4V0cH^D?HF$ub6oK|^ycj6m^T{JQRuh3!lx zt0UVl(IxxW#=*77;{r`>uAdn+km?j|uiYNNAjvv9^d|aUd(q4Ia5{2^G0u6Yj^Gt{?&-ZU330&LZBsZVWF+}L3m&= z@=4Vw`cek&u%Wu$i#W`hiVsTh=3c$ZN>*n;o-2RO*ZQmH2iL>biW z_7ewe{${a=Y3xI8$X4;H`)AEG$5-+_r}t4Y(-dFwLw71jwSv8yAdIHnMILcoFyIO)m=@Y z!m0<@rLYx%)|q?ukYW>OW!2?ZEbL;8@&<%f)Kty7MG2o{)5aV@ur1zHZVu`5z6S1x zS*bL`FdAPkwV5m|fD66m^>Lk3g|{|*-voIi`9EgS=R19$++f=DjrXL$ZwoAI31i9L zIuTn{>;+b@qDKAzIk-IlZ$b%8Ii`jVOaR|%dM8F~Zy?c5=$#@dV_rNLX;rtaE7P@| zjrH<>kGenQyh@j8&Zr|=hgLC?u!^$!o6A*2)l~!n)!f}2I&So6+m@)xBBJ#F%v-l< z>v>zdf;ag}fd=R`tc9vCzE=sDN6SpRw3~^(VVvd_;Gfv`whLr=CZ0_96}D3B3u~R{ z7SQlt{F2TEh9X*oZg#bcm?Qx8=`%VJ*C+J4*HW9V^ zCluDTCU8li5{}c#`*2yXaw@z+v2`|#<`c7G?d~yAWYjH2fluY)6wBRd!aD7glq9IL zNWy6SuXp5n7GyVpM_{$xmp60V74yw)VL$#5~ugw5ty z{}`-N_+Wb@^YiTS{!nkU`Ht?L4qY(hBq*)UZxOfUsVV^Z>uZv58rNwPnnm5|tulCl zGgbJ3p|!8NHvCo)kHX=pk&m=v=8vYoq7F4K{Cd&0vxcN|tsAND;=nF;VVio#Y$wB? zVD|=8^2L6_Dcf5~YT8_7Ek9fj*JWgdn_$E2CC-%sXjfwrP3Jm}=nr6)ibI%6=Z>e? z@M%S8Ga93MqPMa*(%tvj&qMf(z^->&EZB_~Fosl26?XJ%5=TxDK)NA%W z+(8I@Aec0DkVZowBT)hb7(z)NCQ>xPi`1PFU_beRTzc(a!SYn35cvZ}k$^$utVV_e z3+a#o9N=LB#!~~>P87)9@k+}%T{diQvo$HYS6f$h*<5b3vWL{-RSu(_Tr$cYre%z! zCeoreF+Fm@KxD{Q$M4fAy>E1z9b{(rW6s{GT@Hmn@Dtp8DWWSfzi`CKS<)Co)mcsI zb~lqJ$Z8s#&XL9j-wv!7@s;|tBimh3U>Hfx3C5rx$pRxGnf${cnQHGFs0Sg$BOsw$ z?hl)=g~FHFF^whFdyw>W8AoF23o%fu>^Vm==|M>#<_84~%Nc^fiE$djultrK_I*ox z09F7?ZkSv*VCk3Uk$SML*e|$#o;399(w)LPEQhIW^K_61c0eDZ8o`Vz0_cC2sEee~ z2ooUC2urytBth6mb&NE=d-c#q| zi3H0tZtylZ-K*!R2VBVfwgk8ib`lrAI+_xm-HZ}Swnt5ttQM#z zYTbEGd`8#9H8|~+Jr5WLAab+1yjG|;(dS?vOYp7ooDEKyB3RiMTQL>4U!YDN5$g!# zVOThuHgjqP)a7i5BsOA{=z>t2tNOF~H!4L&Jyx7x)WttswD_WUx43fWf)4n0xO!~* znpN4twhVv6a|D0ie)bZ>8BD=;A>K#^^&uwJ-HHHEXVn&Lq$XS6vNnx>+Nhiv(e{0r zf&Y}hH*UvH_f&;Q1v#PLMH16s2=r%Csy2Ta7%4Ihb7>|Bjv#&SV?=A_8l~!;JBkZn}E=Ph;sp;P1U&?*}PGT<5D6>9cZlWd?#Pdd;@^IC7bhWp|H#9E7_hUdqf@H&+Rim zzPJkbipsXAB+zHVSXJ&-|kr>7VYV-nhtA( zf}{x`cU()py66ZXYr{iFoMkXL(DXk+U3&^Fa`L6dX6xWt3I``Nt*JRS{aC->(XbVT zF=ba4Ne1yV&ANPE7G!5OFhF}D<>i1oFW`bzIq%gs7{-4~1z$BEG&3(YYP;pPJRO`v zUb8P<9$d&-BD|DvvO#(DZ>vl3ecXfMwRO`4mQCeBzXo-cdw5ca){wynKG7UR`mL_s zw4mM2Z3{c?RQ%q{J>Ixex>D}fpUQ$UA-BNyK>GgvNI^P4A{^S>hhuq)a$TPfQbl3Q zYIvuwt+;5~1ec%gPxGn-g#d$2D1#<+u`H6s%tHzo-HS~I&)5kh7SEw}g8n{IMJjZH zye~pWC&9MIglGX3ps*95fmmt&8vC;`|CCRZAzSBb@`q$huF;}q``jI0IRRqu@9k)_ zGf{2H&l)jY`!f$8l2OJOh<9$9FW(0TZ2WZ7=4i-cz09@P zcqb9{X^#DBo>Xvdo{;pz!c(#d0_$}cptznehK3->!lPzE)Z-voL&2V?BvHn*JX0GAP7U= zH2_|1p6$O<8mRo7TpV9~;+~qHklfeirarcCwgtA@KLdV#|IZ#ei~lNzU*KY=!Nt|X z!@ptV`SbG%N2vGByX54>=Rc6uzjE5p3#cG>ceh}7uj}#N-R|e}?d{RaLoEIRRZz3N zP#&^2>OUQKg-hxH07I~&FYx1UNmqx|Ys6aLrgN>UOk_Fa;hQviTod3Y>L`D~xajHg{F2@L z99{W_X^(+XZ})uTqI6>|)9J8Nvs0EGz6IXM+OQLV0^fqp>~Ywt*(u|LQlVk-zJrCE z6KZ65cNH5SFL)mw4__AYad>@I3$G`kiA6;Pp6HB|b7c5vbrl~k)5OHZ2Pe}cxpiBM z5N~3itB!v?@PemQBt^VU8JcYRC}SoG>hBj^e=E=0j5=IUO*M)H0ffc9uq>Iiw5+_? z@dyr?HZP4EN_Y^eb#}In^dfB^Dq4tP8^nmK<ZxwB=}xH)A?a!-%}{k4XHc&e z?PC2JT$YeK{DMhZx=1Rwy&fE*N-3S~xhQ=omk>Pc@2}FdGIOC_fA+c_hdXxB{%WFifbG0H3iy(gs5a zj94!SJn=n8qF@rCsgh-Bh@_TL4E4cpmJ6#%6sd95oEfoSHrf%7a`r7KBp|D*y zah1!Oq(T60*sMfAWcL&nu~j7>IZZKn#CMXp^4JnMhl$XLQA^E8mRZ{lMI8;CLO@_3Mf&fPtgnv(cwucnfX{_{6= zeDPhsVNi%K`+_$ile52*UQRAUq*Y?Qf9UnW8z zppc`0L5UZjwQR2whsp(aHUqQZ)nctv&E>b?=X~?dExoc37koffzUJ&* zGu2vCuTXvEq3!LQr$6i;i}m)Fw}e=5{T%?MeAg28T2SNf6O5SFEf=j%lhs#~^T|0Y z1bwAQmAQ60`gvZ<<)rP8>PIV>9n;MZ&&CkA)p#B!5p$#j42-f z4V0Mrff$AbHV-B=1(!Itws&7RObZ3Ad1AiN$h+RcxrziC$)P#xYrduXp3Mhs+W%$7 zkLIWBe7(#x_VxbV8jdQ=#sdNb{x}YY?96B|oU26MN6JOt-3cnsI${;quWm(f3J3z*H&-u=YZ?et^Jp+(|Z5_w$1R|!C2`(#P#wr()xP; z#U9}G=HTcvT7UC?W8=-P^WMj`w&e@dmjGzUX{J1KRhQ`<4{zHP%!SE-ID@Klg+a3g zMocuX(e@K8Xg@V=g|ZC}l8 zX#*x7d-TEKp*4U{Nu8MJO}_=i@XMdGk?MSr;UAMZZthLaBfeD=aR!*yKS08-x&eC9 z;|g4aJ)5I|g1>nQ=QztNb_^r#{8)}yy-!Sb53l5Hq9o^FO^69YlNGP5D#OwO-mm^FrLOy?J;>R~cp2+M2H_pe%=7_QzR+ ztg8|HARJNaUr*mYpa7jP=xNZ&MqE3O>2CdZkd{D!%Yq*>;F-+g4hl&n&Oy-q-dT!) zMG=wFcr`xkZ#F@ze4YMPx?|nkUVmwB=DDHV!1BzKmILH{VlY74z)4I^IaP|G&`8ft zuQF|08XzJM*o)g3c<%A;#5qJyx-E7x1I8C8(ikxqAP!xP>Y^d{%c;ny;B6A3vwF{z z^X`G>BCdH~b@{bqizpI)-I4CthUCqwM`A+pk7;sanl)vkiYgN@H z7T(xl?bp#Z5Q=;aHhE?i%VJC&7`ut)AErLa$w8u^U`EFAV%(Y~dF=I+m`4+_zaf_g zL0ZfV>%MW7?60xbKDYV1m4JYxA1B9ut@WP45%YXt!Vw2nb;qCPR!#RqxI)}%Xx(bb zwhg1^+o0Icv9m%)r_ODTacAB^Y12?#`=j1!q_pV3ly<5nKC;f}{K)+xfnfy-oqIQ#fIx4^0;8DZerRz^Jlo^AWnIjSGd1pnwCuPYQC^sGPq*Z}&sFLv=Fw9dI+MucM-IjZ!dP{Ag?D8FMOZxt}#q;u{;76?k6XE@6SfZ2kAL~ z?vwU6g3lkNCb66i{r!jfrLQgaD^AkeRyyMr*@i_b$h7RdppG1bF?V$yqup9<=E{BC z1cJfj#EM!mbsQ;CDJR1NC52VLc|{vt$`t!pX+n*)cOgq{m~YgNejU}M#U3o zm}A5AGViY0gg(Pr;M!-YWE2P{&PAMN0beP%(Bcqi@KNt>&rueaR+J^C4q!Eub0KLY zpM4^x5ZuQP(IGk1K1r`HTq(7nHg7slXPJWY8qQ1FMmH|7;Pe_6ote~teN_@LQ9Yy# zTq?G}Zh6Y208SU7rr08-W?XZHEiC}WGB-T!_8^EP86gl|?j;{i8YF={K&7!&_Papg zN|^<}PEQWbTxFg`Yh8}^ZC1w|n}O`iWC|^zLtb`OmkT=dmw+J8d)?cy+0${1%LT`q zyS@jSabpMH^ULMqN|Y4iUiOz?&-MFxYUiuFRP%a_`RmsKeEXFDm7BtS=x<9Y05q-j zNanZu{|-(IQ&n?6RrAlJiOG>KyA~*1K0}#NVswPvwf4x?Ko4+v-kWOwf><0DysH; zeX@}GMVY4WBhqNfgULiFu%OD_y?zm)#DYj*lX>w7uq18A14GxZ$<#Vfbwxxgz?)$ne4xiZb`|?gk>XLXAVK1P^ru(yt{@U3&*{H7-1@n7d}u+gVkdZ+ugQt;s5sGDN;E=_K5xVL{C8g+2?SB?~4K_z!R<4{HUPU1Z zL~jfIjx1gUMk>>w3yW%1`dSAJs;co3{LhGSVU^yyYSb5zyIY!k?A$V=!0n@)k_WT` zmhdD9wI%C9l>Jx7K6j$_0%e`@1maK)M5W*385Wr&^1ds$iEu`V z9pkOO1MjLTfvXHS37k8pQGOB8IBF!CV`)?(QB22NS`ZfPEJ=-D#*ia~%;iz3F-+I1 zvXV8<7ezf^F$CW6b88UGahjrJg7o}iuov#AkeM6$Wqf#nliz8M<1wc9HN2`P`Gk&~ z)GPPo_s80!?}DVO$36r=NFUJ6VW8L#@>|#kZD{t`L>VyULhmQb&Cj!qa#4qW1(2HJ zvjr3%(IZzl?({|fTI$N}t#t zCp=h-`WBu8HV;p1;FXvvreSyc49NrUV*afIPfXfE^_$^<4G6Ta@cd*Nc+`X%nC@ru za%@J7mOF1jjcq3akbdNH@x?Xg75W{t=x&zrd7yE_s#!comHuA#M?n$L1Rt+Kau6dK zoCo64)|#Pe)rd&fWz=!G*U8j8xQoHWaoTJ9F;Ba5yNR~8hni{lN1j=E$nZ~e!4H?W ziy8%Q6vb2~cTl2Krd;Iqh9c!;1_-?fNph^h*^T+<6DjqdUhaM#FTJC4ebdWRY&_kf zKv?PN_WdPmZ!0|fQK%gAKQPm99N_l!_Dw z%he_Cy-yqi2&yomgfK--#)L!o(BDX>M2BeLC;>L?_&#y{*M965P`6KmKVAqMjWOIh zbP&6l-r@}+8SwCg7&zG5$(Rum;%B9zQG`szm8kgxnTH_A(3ul?o$5J95g+4J_mVqs z)v^ZeFqfc^VUm8K%RqG7m`pZR%`mH$L%|4QstX7m@=6W1ZWWbd zpAJI6)y2)E6SuA+b(O9@*=>eo8bl- zuNJfe3A>9*&8mX-?N+!V)n0bYiVqbuLXUXU1LZNxX!DFS+nzpKgUc4#P18zBLS(&$ z6Bm#@$5*!ySHw1Z`SYUGh(Ch2ou~ti&+|i-Vd9(2l+x1I5}x=}_eIzH{FZq|g( zU2$bJk90)$m><_qun)18f}E?7Sle+8E<)}qkqdE$Evx+=zxiaL!CeVHg0+vs5W5#l zKIIb#v9)E|lQ((UBX}7`lXjttheW+irH|nneG`P42iPL#WZd*5+ppw$wj@n~$eU zm2Ew#?1XP(I<4%S9$0V#7Gt*I@Pr0RYg`Ks-PQPT&3E*3K2l=!#yvg-7Vta1w<3T& z*7(iYkJq+qTT?hK5Tk^Wzd zl-}C^!$^HbyUEw7_{Ug87dYNfzVT+4mi^vm@a*6O(Y7b~D}08ke~($dx}Uzho12^8 zBnP5Fs%N5W)81ayL}LYkFFaD%Wo^rtr~c7Iw&sdiLjYU(d-EoIN=Wyz*>yklFYW0g9pQ;WExibg zw`p}ZBkAnlFQ$g-E;v@(7Y4`y$aS^ogvb-MKK|L?OFDSD{L8n z%RLp2*sj*E+CYgl!Qbc9sIDi#{Uq zn}49bbj+okFQ&loYQYE^G#6v~YU{AXtTHocC*_^Zk-N~Z=3OrEpc+e_W}QASon{Ga z`6gWgsBu{c2dzpbelWv{0zKytj2SW~?856hR;wghd22bQ95_~1ptC>3x1J~N!>76x z20oH%W{5a@oWz~3`gYJ;@7C%ZF-R0rP=qz*dSq}x=yVd+S`4iv%uBy(6iPuF_D=dt zG6Pn?AZ~mtzA}DhO_}tOXC$fldjO^U7w3fPf{AM@k9kEt1uh+S zh2;{ol5}XTrbMtj7>OBK8^yK*mk{!!kq#J}jfp`uEQqJ@Ta1XoHB{U7eGQeFfJ&t+ zWX3=dt>lOEtkgMUko`>T^-OMcF7_6sCf|q@--aTVx75?j z)APaAspUs|MLc*#hAWCAl|e|ohb>18B&Zns9N%Im*%L(D@6bS7DW?iP;L=}F*71EN zl>PHHXN$_@>F4>wp81d0_=78BV46?|N#aEIFFewJe3&VBcGUz426k4>A(SO$El*2X zRC=$iJ==csi<(E2_hk*3)`ask;uVQ%1YA8nt0m(ERbE`mp_C$Y$(uJ7bjX!}9nt;9 zL`B0w_<22uSDnt7uf)Cz=+g*E{J++3Pj6h}1atR5csj&tWXu4a>I@I4#o#TlYGZBZ35T9#IcX}5yDl)b-x5IGjOsu_P z3?Vb^@$rS`N9|vS-Uf;n)Cc^sDCJ2HK}UN zM1H?l<$s=>6YUs+7h7rkW0&1`5&Rw>S^__L9Q}FMCKUvG&d+aD=iE47?`(shsr5fi z4g5C1p*>8<#y)Q*Rm%c7o^yCZF|l&$3XFZLkGm@q12B%guuq64#?S2L^*ODWG8y?Y1ggr{)n7DyT+`0t&LVl&S;NGnY|iY~6iXl`Af z{iM}!$s`8_hky+U0G&G-tZMlguC#3@$uPA2`GHAwzUA?YcfHH)i)HfH>uZF@D07;A z6>v$mQ-EL&)5v5C|53-||8w2)ZxV<*F&g%i1Pq6G@H-vMKBen3bzh*`&A|Ib<39D| zgM((z(8Bg-XiwEi50Njk>emNM^Se5g9rkJp!3)`o&JT#ZW3Vf8A!iT>5MCzMpFUL` z3I;7r(QeEpDeA;3@0*JklG&4bEN{+(WqCj7J?vOrp;6v)h9gi&0;yPnaUpO?2_b^|LfdP<4XI$I=3MkNyHS1L=yoeuDP22j zp?pml7}_d~GRkBwkxx@)5SbrBtbg$iwq^ClX!>`83E7kZkZ5J;TZx&_=n4=#CZ0E6 zNN%Mhrr*DRnN<^5d_OKEa@T2}s@2R+X>x#56_)#9wDxShfYaJve+yV}vVAa2iD7yJ zzUY4%a=!X%I}fyGzH{m99hzDUudN18qGEf&|Jk+Xgh`bOfe(^NSLirxjg&M7SjpQB zBB+mj+m9eKH~&=>pFv-@He(meXtLP2j}_r)y<@{cvk-u#!zw%cX+Q5jG=O-3!V8k( zb$}D|!FpGPuqp0UvM(f)WuAl;uj`u~yAf>0P*Fw(k`-eSfVkQ_DuT%FWvkt@Vlfy| z<~X6WRGm%;8Wn^aMLd*L+!qiPL<&iX!q~o!No<{1(jaRWtlz#xO0mJKf8;UpJMO;Y zXLX!?+|OnODL6b&B>X4oFKjHI{-{uR!9Z<+CZJ7J(auvmw1iUxhuP0MGeGdQ?DF9G z^z_8m{pob?2JlT!|3|L9-HtxKpq_w$-nGE>RrOa{)qlNMmmMA99l;}S1q&4;Z{b~0 ze0~bEbJKqhZ(o+Tw+{c~XQ7>;TY#=3@8z|Jyt#9tGi)2v=Y18|8mWp1YE9$5aZADPRtU#x;c& zTNjszk3g5EsIWW}Fl<3xd7s3d#u^y;Q1UPGp_Hn&K8Z^g{3&j`#k}LNLb8G5x#vz7 z(0}W1(5?J`ih*EJm({Ke_BcgOl-uiW($~G3I*EFv0`nG1zCr{7x%$(lptFMg$YO>X z8Z0;tWO)g}%o(j$f||l{9xQR((ncJxCptsQ0CrGsltWjbf)>S1Z@4r!(V z?xdQvQL-?{6NUn4wO0#U5tf{lk^{cV%ow@0$NxfsxPZ_cJ5CI1Owkgra{h~DVl1Q) zSrwJ0Vty;M28;PV2jsD-)JqC9$<-}-S}^w_No#4vg_ zgC4oy5BaP_j=Df9f>vFIOfwQ^9W$LV|3bab|3sz90;AFz|3#%0IL(?i*PaFjnevV= zf*I_%oGwNJ)8>Lh;$?XKfca!)=y-S{JW55o$foh0`n9zNbPwR*iPXTjG{S#zX}-X? zv=it*MPfo40_k_X_vpb8G{s_&I7-4cU36+2NoMqu2bLxYeJx%8rlvEL8}g`kOYCq%+bjeG>tRrcc+ zH|s$lGyj5w0JGjD5t{wxJcykyEhCu@z&MaoJ$ci5|622Y0yNuEIJNqptM00M`NeeP zi>r`Rcye`&)MXFGm{fF=%g?yvK#+?38bKdR{Eg3X>F!UoDSbnkkXXrC)#i;GHHZKe z+-Jy)jo@Y7vx4`Ohp?nK+Ap@)MS~Y6R=6fMkT}v#ik!fJ?A2^dw$SJ$psIQ3 z1B{9T>EB+Re;wug>quqm5zx-H1s%{_{Aen#K5Q~Ti1a4lR*EAA2?(#}B-AY@LH71# z7at|WHBn!78(8)ND6kIzuR?A4s zU`vhMlmqJRYf9R8`B`!8u>b7O4aaE)t2U<;oDySNy3VRbFE6pKbXgF%rkVgdWwdkl zSamy#j|c8qx?yRl4eUQqY4>u=yyP&7AbWY5A;2z=W(7ANmLU+9!o%riiTGO1S{olI zx7K_KdJ*R~g>M;FULMxQ_u>J(%ohE|i`jeA)96qA`|g2BF7SY;fmIG)(3;y2#Xn~eOEBB&6W;f2^leOFc4 zr|^-~-H4HY2a-+TgNs1b>!Y2o%w*9O`@N>+qf3G3hwjxRYnUBMa#-I_EYuVVW3n50lYVB~hP+w`V|by2&4p#ch;pd) zr;928$dUc__C1jdNdTb!ZfYm*Ujtce|t~J+FVm)xI^#hUh#D^P_Ym-!S%tluK2nXUO?vS zYH#^rvj6z2JV%gUc3GuXKK_S>)Dpz=_do024?MM2*$fCh#?g zVB6L6$Hu>TLW^?nG%5BON}5n6mTMpR+vg(cs_1sMtC@onc1lw_OpXdEi`~jO9!}TF zZy||CP~Si|(gS~!0lzaMB01Q`sPK1^Paiz1^QE7$OB|rxiA|l9NqOc4FFJyOn>sUe zVtP1&EK7)Y9^`o&ikxBP_TQ3X`aX-#Z)zw@zb8;s)nG9`t*68HzF$O-$wMmhw_IKg zK8_^X_L+^yX#kcazOT_B450LlKAljrmmuln;oR-Ty|WpqxX0@wZKG6+Jf67hzADI( zgqN@Ds$1mW{EUTN4wc{6q+Zl0IgAc8M!?NcFJ|WBF4VOAX)+s=z50@Ip1fn~iknDU zakkqRW)V|y_ommjlAK&kO2xVbQ*Mo3H9BK=Ql7)(U-xG-#Uz}i^>o+BkPq&Y7NrjL zS+dUnp;_c673TK1L7Rxn`srtB?Jt7%{Fhftp)dK%V<^=FVU@$ro4@p{XD?C-Z;>P` zX{DBZ3>LJ@)5UBU;1!jdq9)Gm4trBCroj@4`f+mNPW-w2*H)2~Fsk5r92prVhSL{} zb1C~T;u#(;D>&{l5CM}{kIDyo;!P}xF;zXHQi~9)<3#xghdF;766GaADk+T!7O0mh2EXQ=q&`j{oH&R;#*B7 zGqX9AOeIp(AB}#CfApoH%)i%yg8!fsSHTy(M+)8BBEMLIqvZ_T7Wr%pWOPUrvdeRD zNI{`joRkMM!!|7_Ys+|a`|d#YFm!J6#KMMzQ82A8*SMR)W->o7FSYb~QV+HNr)8oAfdWR-Rrs1|EsAUX#Z`iRu zP3@;eoy4R3h(*)6TQF*|1Baky{JdeFoh5vAT0POovHeKNwx!P*UhGW%AHjIOvN_@b zQ(I~~l3f*ZmP92b%gVJ5Dev!h&>xNdx1V>Lt?m3v{yy$M-(RQJ4lgVA z=O&1@x4Qj2QYwoKqZU-#K()~fp>K=JJC$`L-PAknFem6!i(t`ae44{jgnrKA101k$ z$`Ok4S>Mr~`B^Zgs8|u2hJ?p7bZXv_Vzp_|0e6vp;~?a{o?q10_(WOkNe~05?RQqAlLo@ODHF+{Q4Z|CyzA9d?w%B&kXk0U$Lc0jVzJ)X6Hr^hB|ReUO?vp1(XtQPeQS$zMG0l82pm zoL5=_P?wm&M=GaXyx4?5_El?N7gk?1(o8VB6KdZCw&k(=YP!*lXPbS4STY|(&(F-I zRz}puTZHi;KGeuJm;@h0a`Hr5`Bj{5pLFQgQu5d&C;uo+3k@f$g$2c&qrxlpB`CU8 zG1pdzFi246MuCTnR77QE&Ex=KC%}Ei2Ws^puNRJPy>Noz63AJ~3*HnpVE6Kh7kp(2 z?IUA>6_89JF4Z(NN@rT9I1(G@bHIn6hA04Es=OqCep~)Iuk^pO3zy()0DvQ5( zS>mau)NUcBc=qnP>vk^YN(nr``#OuuO-13}@5-D3NO@fWC zFo=4D1%WKgc1uCUg4otNJv(d|OK0azQles=x`;{=otVXx!r5?G-6k@H*C)BQJoqf+ zzP`k%%evt91#Y$U$Y<6t8qL;!M*ScNeXMwP`_u`%+SSc8R#ZbE`F;MK&pGB4jatsD-cp>fAOz+Lrj zO)uoTgO;H9O0R7vhuTSH2FS({4et1vWJ@J{{M1Mo?O3}qzfNOMz6h)(FDtd$W6&V7 z@-b2-<(LkF3nb=w=mXO;1p-BG*~RlR}WB5&gV{KY>|5v7*fZ%898VafbM) zFI1x7PFG>thP_3WXk&w~z35G(O@C|7)tV`uzt%Jh)}}YT0y2E``)i`@gXJgx#+PM3 zG2qsK;QmXr(WBZG{Tr6~tA2E+R%9xu7h%DS(^G@EO^P{lXC}1OQH>C^zy^Wqes)V> z0&ow->}M)N$UK(HMIq0j7i)$`#;^gLRCyTZm57a!=?1oG|6+$+F`#W;(O-%7^y5TD&1Y;wiF`Olf@xijjsbo;x}6^zKmdk)(G| zYRG(tsVOZuGU}mGH?pxTsX8GsqeXeivjI)@rgPSxA2K5dsUjDOqS$h&qnX@_U(GP@S`sAp|f1#m);1vU*6paf(qv3qeEL$=UW6oa9G1^YIYsPNx)6PY ze^-lU5XKs&jx3@HN;&tSKGQdlEjNAe8X);-SW!jPQ-pM(qgO9XmBE#b3l=)z5eXfDCNswm7mq__dWB$e-=$b!apI=J67RerA1b%c zkp+vhIL=)^n&mYrLQ=H+7=a%u z)Ohn7<5e(*r;j5sBnlii-7`EC%7)>A=SJXQ2q}T)bo*CHBI2<4rhEb;WNu=;ig+4{KR_b2~4# zZ~4D?r#;NuKR0PZGI^=b&Lj=w3>Wd6zc)cJM_yHp1Qh*uP!{a77@z)k)DYD*ih}cp z(F^=%aKHd7JSl`G|9gCfu*ibKZJlk2YpWnov@KAry)N^eiK_jW5!_r zLn3Ol_!z$*JN8pvQ@MS%UKBk65tJ<;=eO?HcM@l#XnGm|g-hgQhoxXtB;i$fx#2jA?%f?ie}pIHG6LeKjR+vUEyiX99#6s> z+}D@RiMDfkgnE|zI|ck7k1jVFR)`pPa`3MMDbA@&O~(+1P$mRLu%0zmod0mU4!i6X z3KA0NxstKDf;nSAKFp`ELu^Vb(?u52eBVxO5#x}@??1n`CM{Q6ZeLsMl?T!EsyN@D zU+)9m&D#T-lPux|lTEs1b)s>ON zcK;?qm@pN874=f+y(b6#R0wLER<58f9gjcx;_hS4oJ?~UKozFMP`UVQAyy(AGda}6qCOq zQ&)zP4t9)y0$)w#kT`v6GTM1R7V;XIB;ijNL!0)&vO9wJ=7z)lp3nL_Y@q)Gz9XUk z7n(b1Yd{Wk$sPy46IYlK^w)%jqsQ+IlQyAQcKMacKr5uny7E;oRP%jlf#a406n!!3I!lk?bZ)+R_NRH~m6$dYYSa(}r3y(P@ zo6PNhW>Z|yF^Z3>Q4pF!O<2N6T;P$=wU>TV>JRZ>#Quo%RIml>%Ky0lJ)5Flh}2X^ z@nmN=D^+e~*=#qiL=X$z)y=Vts4dyGy(&EH$V{j+Jc|wAZg%nJ?hXSIJ33z+$jjyUJJ~6Q?J^%Owp%oZXdlS=B_ioNl+Yhu7mQRHq$jPUZ-XKvWj1QS= zaK{mAQU)-pbpORKpcOABGEB7kHYO*%N-T>3wPAg&j6>_YW!ZW@8t^lfkZ$8OrdP9y z^h|MRd3L@r#~wjlBGrz&*3Km0cO6)h-;4^B@505JMo;b*>YBjo8KlV212?`Yqo|g$ z^+2Iad*QNc=X|~H0fS2T)E(yEJM~~e0a}2E@Z)X3**@q}G5Epl@3VcHC84X|*5_~6 zU*H4RJq}GeJ%R8f{lnhpEn-$%_qr9Ka|-Wu`+bgMj&Y@80(=mI>nRt9 z96EXN@9&5KY)p~)=cMqRVnzqggwKebu7VbRSh+4E9Z|r0BEeueZ(wp_;8Eh{y2(f8 zca0z4dC02p4p^Ic1Gi2WZ3eK;vh*>mM# zSI;E6c@RI+*>dL)V;DEg6Z|CdXQ;5&S-q;%jq-P}yQeR-=7oH|5oTl*kNM)Hf82V^ z;vu=&*p812x8$)XL1#d|MV6f(3f>d!ZYBCu)acZ26AgSS0o%1+q*LNrw}Y8^ZfY9& zGi$gN3NQYCZ}(^+-&sD)VF_vGTz-Q)I|bKG9{KJNfwHJRp`^yX>^8Xn$2|_X^GW(k z5<=hO%-vjz z?h;u_DV&_%9Qa*>Lj9a7FbjiL`?M6fgR8t;PkY2i9oJsII6yZngIUlvo*OLqa&$zQ z7^ph%2J@mK%Dy)^V`qr5#fO<2q=rR_yofr`MY~DoyzEnaAgel`dDsG=q2}d$SGmwD zYRXfrY1&zt8E^oLfxP&c&OJZi?V_u2%1E41qm>q8{uXv99mbNn({kpmfO1r{Cf=Ue zE~g5ftBTDB4>8$Lm;Ex^$!8rtxr}p&jgxd(EU4HXyA5y1BogfO^}gMESc+rP&nCJi zQ8Q=wCsif*J={$l#=YKJT|Ylu0Ny{mFArbh9Q1p9JZ(BVKX1*Qo3kOsf?NlGkC&?fL9P0*AYb4IPwv7ui2OcJmo^&Q9jdFF zh-zM6W%utcN}`Bj?vt>Nk!KSBqaxMJ0J}GTu5q^uc)QFAy~=QGcYeMMMCER06Xxo5 zdw&@tKWPC~vTOR6+vhE}uaBtI6)p!q56{~qK`%FFH`hnN(cR&j`u-p?r-g#8Gui0&1E;T~RDZkLwoU~>O?_PZMTi5Gvf zf)bws%kt&(Q-Ok&FG&rAA*CMBI|ZHAqjV`2gr0m7`ONNNl zwop_jwU8ivZt{-wBK#5o7$C*x#7s~~jH_V8;(c- zVIIK6xu0W2sDMVzZQs!rkY^vQu8MP}gl9uJFJIsgXQrAQ{?mc@2|-VNcJ+)V%⪙ z0VlYw_-sGF3~^YXjT5qO(@kU-D5cwi-r0!z;Rmt3^~Xt(L^=lRKx}wZiPs!4H)c40 zY{Sk$fNR_f4Cy5u!cOC^ic6xk&}^w`Hiqo@MzDJm(*Q&zXLSo&9 z7A_SzW#uYvwy=c##|d0*JBsMx|agOuCVk4`z#O81QS&0+POv!Mw6ZfL zjqoD9tcng)cL8)M)t$IZ=hOjp7p}e^NgbWmsjj9TYNGl(PgS+_`<#Y)E!_CDNAAzA^;HI(A0_@9X9TtcP z8cCvhBj>nTR*<${e~l0?=;q(3UV6VS!D9QhZ2FQAuaOh}>I$U~{x{x1NUKxMz{ z@MPH9>nM6hO@w!dte!TIp^T8$v-{9C28xX=-O_ARRdii3;Mi77O+nB?#;`XStA;f& zho)-w^+9iK)y>pyVp=v zjfVqcJcP2Pjx|-5hvRR&M~+9x{<`=!&WI zhlT=W-Rj%+&>Ro!VX3i}t-BdxeQ)A#z*q{lg0T#5UB=SlYcXXQt9Rtifb-Q-?ZJ33 zu(hE%kjHQU^}cS)##o0o?8#QowEMDcA$d3$jG=6*7V24jt8c1MmIsPvuCKZ-Unj0V zhHlCg6a(l1e}Tf#u@G@6P?H4N&S&7;tA0M5c9s(P>5o)ze--|=vby1k$MIIcxh)pp3Yo`U+2kVgd8uC=6MFC#q zcgXj5&~+@}6Gut}V2B9}Tz@%3Ui=JL5Y2oqLNV||5XCS?_S}sSwq>ZFAT6BXoMn*~ zLKi^K^JAKl6!;#YBZcV-D7#5rEg(XjJ5hWH{`GH)pSd<7e})+2p8x=eSAf1He~Pqh zPr)Jh@_R+=TsTH<6SNdy+cs@jt=N!@`D~0rEXWp$oDf+c@U4iBdDk&vbO@9c0yGaM zA+!*P;t4!zHaHe-36-rYWQGXF2s~v9>Ht8`0$0B4I^N_quwcyO z663mNt+_^}$S%DTX8k+{p9?X9f^hj%}kbb#z#c89xKgEbzk^dU2w&i8=+ZZqI0AIOappCcoP) zRxww?Ox9;J=vhyrg9HzsQ%c)Hua&JrcNu4mx=AP8M-L894|#ker8dUu?k-Mq4O)owjC2m2o_x77IflhT#Oohggu(xq?{*GsnA1CTH-3%+E9UIr~nQ6D-H0 z+uPW2onJ{`k5FhLFUHy&7aXMJ-lCZwE>{+%tv;r6cZ9-)V~>PkY%hZp=EKEnZsFP(s3L&Q)ZeoRh6eE z_Q5=2X33ciJU=E{7+W38nsFjxa6bc(B61?G0g=VDj<{R^F`5M~j8U>x*KTK748gHG zk75*F`7X6@gx@b5&vLv;CF8>}G!u585($g2{m!H?BDB=NUl32x9y}_l7XbzCuk@EV zz$>lTO6Y>Rs!auNNERP^+mxu3D@9zZNW7X8_Lns>#Gf(%Sg%C$@qdsRM_iDLG<4WR zW4d#TbtfGAi)6IqM<_^e3QG2vxeSOS_}&lis1=qN5oC=I@Fdq+F35s7EUIu+i-5FLUWjAOhEU=*PU+zlcwHW4-(QRqSU zj3bDI)hf1^k`ITVjl8JWW{XxQfU`sPH}ep*t*IHbD`3Z=yb2Vrc^s3M0QBeC=vef2 zMF|i95@>TfPVOkG+*P$4@RdK0Q5M8PQS5k-Mv}DU4*9=sLKk@^Fh=)qd6>bUEF6*^ ziG2|G!Q7=PJi?3Jn3@z=UfI%h>Cc(tZi)Nl1?vzHPa(0nBP1?z@oa-Ua%B>-1k3*! zoqxzYNlZ~2FKh844zEI=5HawUW8Yd*0_af+K6HdI3Sc`f>a-}aiHBfxbbbB)^6KOe z%$5>Ko9u@cYwlY}tfPe!`W{)zCYE^z+_0G~wVs}U>!laN&)mm!*m?qv4gg9mlyU>fcTc*lvN z?Pn~-6Sp1uvt$a!qns`gFwlF#D!_vOxm9ooEHv|AZqnp!@?~cxIPY*%6q@5J9y@GZ^_fug}b3iCM@$bER7+T_6HzShPIqK5eizExiP=Z0guMO%7-74{JC6^#YND6#Qay;7) zXS6JCpE z<>Ffy5O@mBqm}R%X$Av{Ej%PP;0i_Q>!g?jj_LX@2pylC5H?*H(S>^IQi$$X5K6cwf^!c|z*e{?7uTFG(X(U+h1=?$<;M}zSzrd2AViVxE)eh{*Z1${0iY*= zv1Nx>y5LPR)G*e05D{AFRE0%9QGaySp`uA@X;B5nmd$OY&6Wjp+n7(i^o}niS_0J2 z>M|pXkezkBlqzW==zOZj`uSh~3X%Qqe?MKJG)&(!Q4mL64ks~V&haMrqlcA=phqH! z73@Bt6OZFfq>w^}ZAFk<7a?n02Fx&w(3Vkwh-9{(`XD8t4==SX70JjY5ClH~4 zEVJBYi=UIi9L9wXfo=?10NlPkx_)yAWLf2wFZ8e(G>;Immauqp*kj*|(dW2h!XV9E z;Lqd8v6AKCtJ^c&=~*`z9nQxB7$(CC{eX2Jv_v;yYJ3xa9jhI%>JuA$L>(m8S?Y+d zdhQ)Xm?ylI&yqeC%9$SH2&=b)p%J&1o~L zXV^YS-JDU8`XF=`j*BLu=OaYWy7b&7uJ@(mBC1c5oh;%89&xzS$b>F4*%Abp0~bCa zJOMLvJ(B5@)xF|6HZqr{i>exy6cAQbH^hDu+)K|E;}vuEAiMyJFX4kr311Yvc)&2I|@wF$=a&ZVtYNM6!48#=q*W2 zX(6(7#57nAiOq)L5;!rMMICU8tIU+<9-k>(AmCudd+&ieL=5DcDazx(pJ-bx?%SjB zkD-Oa4tR}R!N3D%I^HomMItL&BKSeg+6^iLTGg&qRHnE}X&r_B7!@}CC8>@or}iI* zrB+=+ukhY=7RbYkUOX@z@>dkYFrEiefUA$X2dhF9$9$C~N#LBJ0znDgxJ)?~05}c8 zR@iB}_3dWRw&=1TyZ@cpz@!VbPx#X(Y(HSz=H7{>WD;P#zx3xJ=_HPPl;EZ+KGio2 zcZA}IM=OpIS-FCHY*yiwTW-f8B{bXS_RaCA-AWg}H^-y2f-@UH@cQOv#A z2vJY?dl&!bI+@xJXp;jNPdQ9k)!jDRHpJ#Q|CRVfF<+>?&V@P>*RuJ|tqj*X4Aq&< z%t#lRcoF-FbCUGLGfF0{W9qwB#4)lk39gMwaaTzWAe0|6(~4k%?g?_?@*0`GXGMoV zk=fS(g$|iybMLW+^yhK%L1*u6=(zI`-AqFiVS@3Obg$Kd&PKAH46|}!Pd-10v?tgf z#l4BRXW6!6c`rx)XA}5qIwv$1cQ%)l3wtCY-La@M+>e6ZM9@X1?O4pqQ13#>^TMpM z_fMWs&-V;LF9J>srr1sfGx*t=&1aY@{rjH$T+wB`D#Wlvj4+j89)K}*v^p^v6;b(! zsvbCo+-gya6=q^|vP%!rw=f3xQ^%yfW81+)!x!FU7bD+AKtK!F8SZ2~a34BxjJyu7 zj@pT<%)}58N0^C(j}i==E?)J!KD49|(bVTr7n_g^rTZjV5J}1bUSBaPh^H@67-yd4 zn0S#f_3!I9B;66_4tA?5e(@7tJ$@qYqfalP>yDv$cjKS?ljzbr4MRWt^artlM>(;| zPnennj+aUr-SYw-LR9WJFA$i7&_wp!b(edhp3qKe9Tnz_{CZhf`*1bYXd^M=ejpZE zQnnsngZQX~1h%GvmPPkYFqtfLELp z=9%E)CHqdk=PuLF1PX?C$inMgMgm36eiW$A#7a@0^W3(b&lEkM+i2H0QHBxO0O%5w z$t=XSbLmWwgz?e+^IWVdZwa1w+1F%$_u82SE_!DEH3HDr*5;twC;Yko9X=-lmM|X2G(*bEU4FH%TAnaI?FP&`feo9e) z!ac^0TOo@rZiH?~W;n-7j!IAuu(0BByeLM{0=_NOgG+x3NEM_vI=F{fI0xpC#fBaa z28n3biIXW=WTmvHROjU(bNrXhYAlL@8&%>gNP3CSewi6H5;?W){$a9Jh%u85blkvn zq;X0Q3uYk;j>5`&y;Vqj_0<}TeijrLL!Pt#{`K#cP-~^J%F5KSR@0)}nX3#>wYkbe z$?BV{oCO(mnndfZ)TKNweoK2b3B@bdrM#90w^tM9t}hSO*tUq#9V?w zfbfbKqnIJ6@>qWjJFf36-m(TA%QRQzQmdkvwQay1o$*CP8v-(ow7n zo;=CT#Zy0u(|K5&)5w=}kW$iL`w=+_MTpAo((@Ub#7qko7d=8oW_XFkW_DcPgl=jj z<%tSlJWYwh2vYkOe@a(8DP=$U zcuH&~%2K22uaUv#ERoRg_2;A(PMXtZK&%)}(Ghgn!KFs$Od(=X|kvnMn}rn)OCPVA+Zzfu<+7a>xC$pqYFJVBJx{ zENq#jKoBIwfCXa+c*f71K28okU^rYbV{X{Ke+b4fTqS8+OIgi6WN~N}AzUdv$tEQW z;x5pd+4Uz|l~HHq=6|p-xr(VF6=HR`WFu|Hpro?(f22GA^smnTm6j7@mY(joVZOjaZ%02VkB zX&~&!1PgIlW&5F-WN`>ciV)luf%Wel*CnP8SvPshB(G1%+yHbrhw)q_2Xqts?}?`( z_UU9r<0gD}K0|!Pmfh0k3>MEoeCqxWCg-DXe~hQ-BL)B8PtRCUb}j*z{7(9gO`(xk z(|8_dM+trZ7E?qkB*f8EHsA?hk)6fu4aXMIrrQhz99bj`Nur_17?y`=7qoIihYGE4 zwLj%L_Cq*9;5a#-lWOY>0^&c45IL&-N&55*SW6Gi921*mG_MI}COI-03EDXWMobXt z=a<)?o@GK`5)>#baU!sG74hLQ9Z$(=95+G~<-}Pa4@9(8v{6O)xko(4$O2CVG7g>r z&(DAoBb0>kknL1FSf+mBpC}`rRwCk{izi8xZ5GvY59z`85Y5R^9DqJM5fMq#h0g3* z+RH4AC;5&?T4qfm>?rX<#~25xeCf|aiJ%l{xMeOw)A#rp=8XY&i*kAVPoA#`_)3>|HqIva>7#_-IPL! zQW){$IufQLqAqxtH0=;vA!xl1ofutWgEejb%@hGhwV`h(H1by9nFdAamPI9RBIj3h z2!_MqDAIgggLUG5o(JaJdPS6V8(QEGIlz9T$m7unw~}PO@yHvmK{AujacHxWo-J zLzXiqKFc=E_R&tKF9_mUU`OET)zMpN49z>-PsstC13qFH(j;n+b}>hcdm6(=$=(v1 zgvfU?s%XVoRYNwvuAN^I{rG~^{*H3&6R;7C@i3XN92<-u&xnRHp~ol7bW70rm5#p| zK?hiCSQn%+#?o7XCqSW+_Em_+0*0W~UjiDdTy+^sIFBdIgGk_SCgeigVP_vkvMooQ{ znC9+03cF*+1Gev4D5UWxba&SB%{vrIcrog;M0eYW%#_izT4bJpo6D0+z*1zAHJ493 zC_j;i_p$2}Migkn*rjOJ%#VS~6qlKuWIu+< zEaT?NMK`ndYc9Ey;|*9?Kk=$QQlzzJ+e^6Qg-KZ&0q{wPv2r}iSvb}ly0~ZV_^k;f+fo!m&qSRT zb+7*@}y&=$iiBpnmn0Lw{xVIn618fyCZPB)pe#{Q}Dc-G##pH+?UPL+Fsi z=8YyXnwHV=CK6iE0Guw2B4^@}6ic3Oq3#op+<`|At{$}Tuj|Y)RzdC}0Bv$|XerP{ zQ${yV+E<4(UYi6xOM+hPNc_z~i~m(ZWb6mN>ra-~0UnaaTT;r;rIX|6^h`RhK#E8W zQpyZ$C{$G+B`HK_@bmQ@x<3T}<9IQepzwc*cyPcsc&z?U6o-yCpi^B95sM*p5V`DhTeO2dBREO_q<9Grl1g%EqOpB`F&!QI>8fgzTk#D?&82w-!Mwv}?x_FdP%CrR_402ix^X8>CNnMW}_ zLIWeDH03AAGrg6~ouf7c=D;c$=8dDjf)hd`5MdB!#v zX5`ko!7GR4)}p;A6jgEsb@{E6W>sXDp|c1~7KIUk2rWA0D{L7z*c#$8` z!F<>yqqlQ6h$I+GQ-4NAN7tW+Qkrd_U&b!+JM0-dx=)e|o25nIl{XYfL!gTFPHxDi3#SWxl zlPn!B_v_%wt~1Fy$f%RxL4pGtvdjm?Q?1jzEq^}Yrxv)an7CO$QZ|iFymMUl`re7n zso*^UQ!sC+z?>k1i* zlY`eZ2Pe;JL?fTM|19u8D`jqLA-97YGq>g z(a1s?nE&USH3XvT%o*uD;>F~F;oS3zoJe(+lU_Vl;>F2oJm@V~Bv2ReCvMM&P!r;X z>zil`0scXiMuvAnrRh?^tiuCB3==CF@@!X^!U6GF6#O$Uq|eN zAf%OKI)fuJNj`JhFmlsk;+~NtI8XG81U%mpv_PH!;Y*vv(04nF2-n!INEXDFIe?Hq zg>lla*m%J6{}g#yl4CqR7&3Ol7>O09Vb(ARc(Q9cEcg*@5{Lk&$!)|=h?Qa@Q-VK^ z;AV84I3Z04DH=ueoQS(*@eE93K=8_mg&RJxV#ihoiKZv_=7r7z#t2+rzs7oFt@$)@ z;*9BZ1@8$g$HQ>|cHD)m&J%-&fV_YaGBgQ!n1faxx}d+c%(hP$xPV zflrS0F^u3Ru8T7yU9+2dxY3t8ek-cOH1R}wcp^VRbk@$u*<@!#;Rw>695l!!lHx|H zn98ZBywgI5Kv8?DBD^i52xRgD@qDU`+BENtP>)dH$&&}kfI|?6$Ua3hI#2cuorS#_4as8#V5qIOmw5fF ztfhp;x~3ASZz(0XOU7B>5zW>`am~qtpUmP+8op6|T>Z1SaVsn3014y5DzjfztIlYq)R`jofTpcqoph zK0SlU$3^JRu?UdYUUIb)xo7F#iKoQo82Q%D#s;Th)!0bre28U4f_#^QBSE^+;7Fh! z*2nPVNsDFTj?%3+nuwg7zr#iutrAmU6Bn)*^K?!Y3Xq3QHU~u*6}uP3k77Lk{Nkns zmW6v#Dh|9Su%#C>^OJ{(^<|CC5Lr>1%ein8r zE-cIlxC>5RVBwvIuCU>Dg)Ap(-mDOV)oT$cy5C04uv}Z?=FMV&^%}+s@40EdH}N-W z8U?J`G+KCHP5Wj~PdXU88Rtzz1oYtCVvCu2XFm1-+VKVViZ77DFZGo{n|zWe*{tuJ4aK%zD+ z(3u9X4W!@kyo|p(Ht4*gri5^%e}@fNR*)9`b{ar(SpV=jzq32RO1IScz3^?&$wJZ< zZGGV1e{V^W)PjM-Ryc=1psu@6$0&wM>(244Lr^h(S~CX@p^Sh^VF=*o^$5~30)iexfa1_GMK+fU9i{wu zbbA{+uJbFIT}CK0v0*nsoE;ML=3KEobZ)=1pXq9v-LD(WlQ*=2qXi1#1PPU_;qE$$ zaFdW{i9c7ikRAx!Wg}Wyx{6(&bW)oHk-Vn{$ zo&q;xR${|L=32z~HLI37<3Bknv7r`NGyWA->E-NyMb>+d<9{Cy8UI&gBe zuj9cc?6Tsj0h~xn)i9=aEeI(xp-@L=rPwX5%PmF~0W!AV!OBa?3 z%;ZlBP)r!9P=)mS@2#YC_j{UbOxT1IGpQA_Thj9-ZzqE(rIAtj5z~b$ zFVNc-0o#;InKmXmsa1*(v@b~qQ*>?c)N;%i_hQn0`6>@`EX*rLvK1xvNgI5-(k>Is zvae8e{w1C|`aj8h`7rulRSmhI|NH8r{@=&5(*J{%TGj(Z9F;^Iu9Gu$C0-x4h1A6D zlL%S6)Vadk6x2nLP*CndspY=e!neW!NO-X@5%H5_EU{}wSH}JaICHCUCAv}E|F1AW zg(4k(j;EB&RYZy@cLh4C=@h8s&ZQ91jF+#SDE7l8%j_d8;f4Cj%2LG1{epyu8H~;8 zxzIJMI;X>7&rABspy;_=GxUPM08n6eRdr=7?_f4$s~luIJ;VFJw~mTDU%~erGQok9 zmEA2^G{}>Yr}#W4%5{h>kSks#TxvI@QWE%9NhdxU2@m$vn*Wo8*qa#uYv%u+*3a+% zC_Pzwod5UnY%>2R;;>r-AVFKl0!Ru!ngD+R6CfY-v1-(hW=>(?c*WNZPEXK#*Qzn^!|e?BaVs6YS({y z4{uG+KR;3-`2G2-oY$X=YK70AeHJ|a98a0Q-{MJ}ik^IGHu!N4WyYD$%m?C^f0|b_ zoKSXaZX0}iaInhzpQU`Q?_b)?`JZ%Ow!XTK{}dc#Yi8Yv)#&GE;M>?0x**TOxTxYC z8+4Mp^~8^?U70PE!{^{B;D*>g7ScZ!ZP1Qg+9(Ts23bBAWM|#BOj(_UDoL%YFs`L2 zXZI9(Fy&#HFs!0{{T2`kWqhRxEwtFkt|4M|>_2usXym(&x!k}CTy6g;vY}{s|6kuQ9__z6alY;~Y#+_;&6F z4*jyed}^!`$n;Be2>#V(GeG;_VsqFtAV8Y-pBIg zTJcTE!V^&46F@V`Y6=d(Q)(q)_8b%%>W8IZ9bxDb6jen|KL=PKh_^7m93-8e?~wwY zgp-{0tBDcU8YOPnMCq-@Qlb$RRlr?j{W|hQMigiiKGr2v#MhkK4MazrJ!%P!08kW{ z!pE$j=K$` zfE5!m&s5qWMx`CH(WI7f{|Wh6)=g^}I0@LHKP${^_~ql=_Bgja&TX|d)8pLsIJbSx zbK730wv3iq2pNV6a-O z)8lfTY9UUMrYEddA5&hK*(1-zQ_&`%f97D58E(?W8>Ykcqne^2zpLqK#HN7CSEL(7@0!yl=K?+4|C8N4}$P#N2x|LKF zH;u9zVTH!;+a9cC|1Hdi%>SXNazCH{qc1<6|KH0~IR8INGr+S8N68I#n`Q$bvru_3 zV6ZUP1_1JivC+F@F}x;8Q*WZ&WQ46&TsoPno}ypC)8v2vA%}dYN|C%cV4-{jjOG0! zjV?HYgnES-LQI^L_XZG*h4Qse`xk4&E_3&SunEeyN?` z9RBi`ilqKJpE~*<+W^~40PD{G>#CZM|CZH9{lAx|QT|8hy2AYMF1_D$rw0M4$ypL2 zMC33R86-vlk?(LGlQfm&WQ!0DL_>(!4GUMki~d9h2MOWXBZFVII51dML*w&)1#Ml# zNiHA7pUEG53$8j8i6O-H@pj$!!tpG}n>_YnvuZ-$MJy3044hY?KMz)LzQvP*isPnn zNZgz%heNXEO7UH1d=G@kHAu7GiVLwDLAoJFw?(gzi(rI07yNa>^r&Jkr!_58!dJD@ zlKJ`~hwIG$bgjI(1+ZrRmv!05&;OdNJkJ07c-Z`pz;($r`D_xeo~pSQrDQTrbT&o& z$LMK#TKY18zsyl_0%KkxtfI)R(jF_-;6!P4Yc**othA=^4>X zwe`=4^2XFXBbsg91LcQIIyhThT{lq*UTOoEtJfBj(&XeH-Ej>&EMVY$!p|cb6^Ep%~Y!8!|3}()9zMoeNWEVIgr) zMTxilT`MKdgj^*BpG~Q+r&i*v9WOv?jsG-qVWTy`n(?poR3#t(r|FO9fA{iikpJ(R ziNmfl0A~VZSdniRiK)(pR`MmJPCkBTQ^x66rdYBG1cgTYiCoCL${@H3@eXy-pEL1D8@ zRBEFhz5*1gflnzyPTrFyg&`98tnRkzat_6#CY;Q0DLqIh6O5R-G0R zuDEMoA!xl1ofut`2%iJ+8~A1Ji)ld9YuhrY$wk1Ki{lAZu^+-oN^>W2e$CW391dSO z?Xp_R!Z0Z|>KXth!<9jWB?HeD$UEp{uEf7k*_!ZZ`O`HYt z*5CbBI5kre1yp?=hx_`v--Dwd!1{nLKhl<@7t1pjKC~=ifo4D+ zCEN66URN{=;$^1wY=^W?({nh}8+KD~crGSC#a|2>Eo*_$rwoox>AWxLuWa|R5{()_ z%VaZ!Np2go<8Y4Jpgr^FUOa;Fv<=!4eob!LZJYBb z_GfL-UI?@?3JzAW%qorn?#&n2v~qM+?P8Q~sIA3Q!LZevSM9t`C_%94epSugs$#8k zue9D~y}=Vw)a{L`1d?A$)7!4aQ^m}c>1GSP!7y~c2PY^-;SB3^a#D@n{hZk+{eR?4 zb-G9N~)U$Rs`UEq)+0iul;t;^Q;$?bMHAF?TS-j$cQW zdwfsnih=-l0vJytARh?Q$)uIGCE-UK)6q^Eb5OC7R(C9{P4ByEEC|Vcw-^gmfB(^T z(BJjh*#2i0N1Y9Ub@4y_em?$B)BBJ1|6ZPC|1V=AI2JNt&Rix*KO+>b+z4D{5#wRb zuDnmax11SqCbTmSL;m#)f9!-P@FOSo!zK9r_rnzhV>ki7|K6rJM|0PuNuP4w$Sh2d z6eA98WX?k;USfM2eI^N#!nt=8-9{)p1Tz20!lvaG@)n0JVR}H`;@pYWOgg+!-ucX- zsS7FjMHWr8uq3#PGKHBwCPlNKDRjme^CgppCUIG}M`ZtmxSbq(Nvi5naN7@sJ_E>G zIHB*63v3oJbg(7TuG*+9J2_Cw6Ar^zdG`!_yC94#w*9W8!3(jG<*p%?%!OkTq!6T{ zj_28o#5A=U2x&p+$G+*ihv4RT)Pmt866K^CH7-duuV}8V@+L{3ElI>Oz<+KZ8-loIufvE{#TTK{{DAO?#qw!|302%{=W>6_il6n%n)I* zaiAM9H%pYv{xs!xgW12}6q5EZk~ck!kOV-i+5?ot!M?k52`kt9S!NWDD^NAEX3omu z$j>Xx8n8CT$XLI23VvMj{mGsU^*^1uccuS(h4r7JJf8p9%aiDT=FWZ^A{&LsGaYXN zCQh6hHwU>zAaK0c7dB9++q}W^{afEchd|X0JPE{T#^yE&+@WP+uTuABP-enDdiB1xr@sE@$?qCE|7z%e zLo3+-s`42Bzn3S`|4AanZJmEfTE$Y=AOBkB_~YN!xc#!l>Nx$f5LuUBW1k-YCJf-% zah=%V0aMVjc$Aa`E>3Sg9-X{ByJ$7=4+_aBzeew1B0anE4T}7Dc+VgfVCY#iLq&J& zc-?49{+3MgPvjyL0LQZ(&xx1oiQci3<^i8g^ncRKnukHw=zqDdm-v4k&wuRYsfzy+ z^Xl$1_$y7ZTOImUNZeZ<_?0x_L889Ornv`>`AT`SGUBU|F`9$H7OJME!jX$Zq0L9?0zDBn-^#NBV`>y5e~d+i?+X zWH+7#-Q+u|xcu~3p1ZDp=Wu(-bRFa+H~!2+_b_vtPyVQe8NvXufnGRaQC;68O3ym{ z#~*)8da08;+7QFoF|+u|J%c1*EO)@c^-btb{U}b}=8wGqTv=H?`1$xTfbsO>N4D0$ zKgfci;t0Xt%!RR`{@>;LUsa3if2IGZ|M&6~_5Zf(e{m`(uKyEFT(bV>-`1@Ev&HJH z|FaNVuKyb>>V{! z^Xg-0-PC{uhDQ{YY+?+;RR#MOO3q zAC$hKK92u=JXQ7|yNYz5rXRVERIvJ*Tyy#*xr(yw2gsv0n{IqDYKj7s8z@O-_fCi= za~N)Q537izq{3D$i(?UZ+}0?egnoMIxGdB4-__my_~f2u`kxJq?nf%PJ6iuM{rvsk zy}tH%|JPogD*exo1JRBKd=h|33X9y5+I6BB_;%^ix&=LpK*EyKMOc$k|Fi9^-&{yE zbNQ0r=ZBacV#Uwu-s6HlX>H^6ezav`AKunz*U5Yy=bAs)v!VXqW&Vd=-zdcY;Np+^ ze-BUL{O7jYza?5S-Th@B%Qk=6r!{-OnNoGOelq~uC3|QP_|4y3f4Khm_VVQR{ItQY zG3MUaxnYduXIFd0j0+FHO&&Ar>mltiJ$kpZT z&FM!aQ$p#h9mVL#9l5Kh?edGRDKjgC;xi4#yP$W-M<35d3oT0-t@g_oVs5c4wrUw) zD!M%Bl5&QWQDCIt-}3M5miuU7&?{+@5~VxwYuZ+g`#Atlg@j@M{f|Yvv|I-qlfT1FmMyYmQzWVj!!E*HQky7xniat3*em!UtSu?p0VW0!=2 z^*3|oe6n1}3&a=WA%v(0F-|9SXmp|}43X7I3UW45V(8Zuk}5bnGJTY|NeaOi*skG_ zb%GsmS=U)04@J=^^v9&4%!|754$_)h9x|F@L;G)+`9EYs$>0B{DUbPo_wzhJ{*V0H zQF^G`LBAE%P2I@uZ>u7^-;FLl9^Kx&KBO7dbJI#4m0M5U{szW|hCK7n5$4ov{3o93 zMjpVmKG z;NcV6T>DJdPWyl3@!!A$wATMqxc^&Mw8!~>FHbW6r-N%-4^ZjoNqs=c=Q1x)@^OtH zC|9nICnyKf#22I+gPb>rzS-Izl&(vzPe(^rM>m&O8IQq#i!Oz;(aq6|^V92(FOH7i zoL-z{N_uwOesnJt-AiAkf9cKH`T6zxvzz1BnLZ{VgO#opjksE}KBfopyJ$82E?T+Y zrP#=ir#~H^-=3VFT%6v#zr1>L{qbz{PAiC05r2;Ne|?`-P2L$f-qq&HdSU)5TsbH< z1ykjIBLB^tIt`v0_8+?dp!vCf{;Z4t==b#e{m;7kxc=MAv-18|n7jQIx;zN~Eev*g z_bb0-B9}gZsZo3Gy8M2S^*(4Rf2QFr3^;U(N+?yhW44n$#E{xZ>_+@f`8^lnk$mxc zr+6kJTl4c3cm0fpF9r1P9i44x0%*88YPRf2?flts$nh^5C`Y%dY z8WEn`t93~Ag3fk6pBA90+L?!BV1hCY)xH}<9n*6d?{ z<6lwKLj0Gis*mx%dwCk$e`oCCxQDR*k}Jk`Vf!&;4J|+MUc9aCzWgP7e*&vd+kS6mpsNfM**{;+Kluz$ew%8sIg-#0_pm!4ApbNx9NPA z{((iI3duoXC6uUq=QFb2I+o?4dl*vv+%6}Lo~M7A2jE&XXEWvy(>wbqqC%Y+m5pmm zj5z+fgwW?1-|jO&#_>PNP%f0s^R7T$`))o)p@(7=nW5DN2U(iZ{gayHB&2Lxak?tb zu8?!xIIHTxe7DR>dt}zIGiLSrVYaFZW?OK-y8cSWH>j@2^PDy<>3*UrXPFm?x?0Dt za)~YCN_c^LWz`^BQDIb8*+HSb`K4P)gjlH-OktQFq{};I$W}O{L?!>Hb4L}NP3<^@ z$ae0MHmA~r*R-KOkI5yAakvb8$BU!35QrQJAH+-k?$MZRi}U@}y448%%&HN4zOWCx z+OO8Yk;WI-;(m5AWv-sf@^3TTsh<8a+E193V&1i}TS%UoXua4KF6u6V0w4i$rF5F+ zR6vpdvumeQK>{R=T^wL;eVgTWi8>K=YKk*5p^J_YzswSV!fi7-^(Ov*ZW+;zU3%d( zR@iOlvx&%!)@7BY&XX&&aPWXF)w+%iIw?7oBoY<~I7qvd+y*WtvlTX-=}qB6?0%r4VJFV_K8_KyiZNj4r?ea>0HP6aa5N z8>5hdr&rY$+L5traui*xuRlr!Yi(6|mQ@YGW_ucsPyMHf|2J5e&6EGsx&K|x=YLds z+T;BndwClBe@8s9C#HG7j$P=?9>g0QEQIR-OI)>L`Wqo_&}v_8g{L-;3sm}Qv++Hd zP@ivuh1twiy&Kmq!{Yfdc#3{0FWHvbIVTw>w&-=_UshI`XF}SV#HHeg8FM68Yk9F0 z8(!|wm0GFD<>L&>mvOv0kxzb@)E%N2I$pzFeW8gAo-dE4$enefX_tp{NdXBkZXbd> zgo3h*7Pemit+HD;yz64^dbRPA44Nj2qPM<%Wmx-AJBoi4DmP=9Wha|jQSjk1subB#l!{IBZonMj`7{yRg#nc8*0d;l@I-{Kq z+llLsq1y)EiXIX{WM}|oDwOH(45>n~vU9>a+ahi<|8vuPxBI_xzpv!ye^pf<^MCB+ zX*~b)J(Y);@tJ_Fob|;8={7Tdeqq~awr`2c-#==~&(vR>#l^3cnDQ1(v@pr~R`A1< zBmkp8T)&2b(iD1!?eb-|6B*QQwh`$c2L~%-3zF}D zU}Ahpa!WqV@V66$e(amRo9&7N(0+Y$GrCS(w5vU|obB|&swgt22=i$g$3ax#)1;Je zxyV<3?nCPZbfIUWFrfi=gzJtwbI-xGpiXReq3inh5{>njoS=3(i889z8%!HHjGy`; zwV!!o+sE!aicxqrY9D~7G>IDjc)(`&m^h1)f<+-Q`6pUF`I(vRbA`Tq5tEc~r)P#V z9_w~NI3-85t6gP89YdagY*OV*~hzh#$gGm77e8|4b5MNe&l}nyC z_9le3?U?Dwzm!3lPo@tAWNNJ#EDQfzuiYw)K>ae6zqa;D7qbMsNXQQUE-Gycc^Reqh z(+fYwi<{+_B!ma>_lMx-c+@KM;io0i#+MMA-v}$kkf|dDNUg0B z{yZh7Zf26W@GY`GfTvaJwW4z?A@>fC=_$y(~FZY3z4G0=A;i1a;^q}f9 zo&XP+mU599`{7}kZlj+nMoIQF(U)9Ko&W3=?*Hs*n*8Yh*~dftKUXN8haS6Zi7YvZ=u)2#yTc*t_o?m6 z`TyDb+y1s~WN{eY*ZveZY%wq>xU;200By*9XH*}deO!tIG6zj^Mt{`^zfDNg;+2bY(*VEGRgEFr$7c(qUCK05=E5lI#@V+Jg z@czTg6CkK$bf?IskWdlA(<(QOnNF}VW_orz{lb%zwU?U2y7e+SB?R|JbF=FrD`J|9#Setx*qEFa}@Djxd};fK;8 zvRx*{%%?(*DNtCRAeH4$s9W<6C0;?JAZ{?|D|8F@jef#nw@Q0Io3rN!#WT^d0V?0F zXEbR3Gks#(vmezA)>&%iok}L4kFS$RwQQ+P%P4#bc8k17+USWhzmv7M!!X{Nu8`4M zA5ur^nMA&nZCMQIQ?Sdm4{x-`^9-FZt6VCzE)-Lp_G38OWY}_$%ios|-`GFivp5h> z#LfXYddow z%K}JH&7^|@SzQcItG9H8cCX&4q>;93mqr~2ct(yy5yiK=X^S45ZdM+5 zTCJV>#bG#5BbTYpo^2_GE5%VHLM^EuhbK`o_g^g+V5lbANFiF9g&&`u4@J=~+4rp(4`L?oKw1xd2p~*o2)9m0K z{qI$s%J2NQDgU?IE7gA(cZZMm|3mz2_CHKBt$4f4cFB*@Y@O_qOB1~u7EH4raTIEm zj+HzfS7SXt#&-FbNQJSUPV%%yu1<`sS$ST`*}OQtv}fIK-3~n+w`RR+c}lvd^XCK{>n!YKhjQBjJQR;m8(pN z*+1fM$vc&MawZwPf_1v5+BDvbhBGL|o2C)wW z+XW7Of@?kypFoDMvJ}O$;(h^5u~3LNa9ss4MJqpp+k*V~5Y@>ae_#4nTmRQD|Fp6G zdv|EofA2ot|N1~bx&M?ubqif) z$@<-;qI0n%*%^e%DNfc()U42IGJlq1L1Dd4n8mLtxS!yf@9xXJ+>IC&o#n~VDy8p| z6cQL`MfQJ7bs6O!d^}A#scnqx=+nT3JGg;sfVF9;9(YA3e04(!JOw+-X1VUSDWhUU zH;oimTJ?uYQFdS5ST!7)8cR7}q5#DJeK;-NlFD%_INp|_pFh;|+KU2>YCm8%PkuFr zudNK5VutK(TsJC}(-bfA8v>YFS4r6hik=9R7;`j7yl`@=$0qMi>)*_=-||~E8M%aU zzA7cpvCrG;NS0-qXe1U9U3(S6?a?^=nt$8cfArnKJ0+NQfB8S1QO~UZ-tYGw>;FE; zkKM6#%Fk)3M=AJ84d4eUR*HQ(FaA;Z;ufbj5%$A2NuW5uy;aE72t02r=gaD7(GPD9 zNqg1RiulTVG+39vVH5*zA9xL5J7TBXjzLZG{{S&rZ~bfawYC-j8}t8qol^c^=kflp z2l??k_M!;if}fTXC}L#d#xKm{pdpOg&ZTcHxpq^4Qq$99=4<;@{YdGzE&G=%RRLt2 zTQm$`pyV+6Ns{6uMbvmH;(jdM&a7Tsiz>B{TtO5+9_tB_gW_463M5`hT#s)PxLCpT z6fY81@$awQcK67$MB_G&Xj?DkATXG~%-6cKx|&?z&tY(r4+hD2f9ra~QB)Ug8GF6k zk)+k-+p8WyktLrlZ3R*vEzIV>dh%bKDX19%+$8@yrTAa3*L$r0^B_Of{uAew>zRIX zkAp5gS^tD_OT`gi_FkOtb#9wjPOhk8rhQ6*v`>;m%6GQQlNcwSS4y?e@+Yp+8f7>O zKlW!ZY)! zy;8F%%u^~#s>fTSYLb@IVFC3N?B-{2Ew829z+Y*(9DB}lBZXJO)B}@yc`p*8mKI{^ zn(ddT%Qyg|KKmzHTrHI( zp|kcG?SoDZ0TUSbO9BDG3&0}*#P6TuDa84`EFPas$liYEa+LtbE8%`!!jkis@`WnPixdKW$g zKZqMU?upk*;L7|~YGUx5q;50c@#Eq0bMrfAe;V2`PsuU4wI(nvyszZb=5sF&$!Vs6 zaT-iuVsBIGK>w(y1kbY8br{>8F3Vj+z6SYc+pR<(R-(etQVCmv2I?YC_hiJB_L{gWak)R+|AIto#Ut!0dDPTe9c5FtSNyr-G*Q z>T#a@FW|M=fAjM%9+>_f#+y{$?_pf5(n1QfsTA01A*dpepS!u6gpl@MJ^P=)Y+3jA z=gsk-Zm(4TvHN)c-^2VYEXyWY$^1U}9{dc`8D9qx4*W={K#?dRT?bL^k-rm?mw@jN zibMp1&*k~bHc+}cS!Q?!W0=yFS8yjtd_rz<8WMJX9KsNWRj@;tz&M0)fY`|t38szW z-&i!Is@D{Th}@||24Snd7JiESaB`>K1dQ$a!|@E?wLcES?C&v9^e6n)lmD_L=zYfj zd;QMXtpC#MjUMCw5AtKy?VZHC-R@bHYVayff&is?vI1gpB~mC-FDt)V5|~;(*~JT# z6&^qT(ky_#pj3y&*NY{|*ho5z5M{6WDT2D61bBDn>_#Uu^ zAi?2DkxcRuk&G7*)1UL9FOJKq@6J$=5QJc^}mP4E?CsC*1OxrL_>W8_b)qgZ@tWm4;FeRQo&>W;L(4ePpl+HUBJ@9m6i z$ET{_ZRf;y@VAc9h6ysc-F)MkmM_EmR`_-2VcV5p?W|I$SXP17tr%-w#j21g#U&8M zII{~&_+>I;g!w{-X?aXPmTv|`8C*Cnx?z2kBfwhij|h>Bg%@|_wR_4@zCFGA1glq& z!9_dPuF_M3v*q_6%f%N|5htkR-*aNj{dIi|L%2elhi}6mDL^)i4{!OEk5Iuf7WJuI zR+Iy?oc1mBrFv6|D&=7+xf-~*+HQ$h-)rJzd!AO7Wj@$?@gX@BmOd+m6o<8yrl^3v zorua739GedcIhBN*C*`jDjcjhvoUpQ3Zt{!_$}j}7aegjLCI_~Up?5=Z=sqvn2na0 z6=s9E)^33?(bd#dX_hyrCNaS_^Gxeui>cKnRwQ5+(a0D9^LFd5+}C}HTL?chzF&y5)@tnbq_apgl88lkbUR}wZUJ6QP|P!fcy!p0A_s3vwXbqBStbR?1vn1;OlNUz z(v{&;Fs)d#W!?Z@897hIqgApDMS4u3jbvS3EsTNF%%U>3P*Ey)ZDYWuroK|Ev7mml z-KZOpBwdw_NIAd?+$u9Nzadf4WF%efS>}=fR3qJKMry=U^!pLr^Hhf=dZM2mZ6<&f zXqJ2GHD!t37Ch10#1y@|az)R@37XMk++V~&m7K;Z?hr-}Yhy(5*{uX6_3Zv5=OKTY z;f0@}z>lIe>*e(1;@zv~*YBR4zdCz&_5AYf`RVhrx<2)jlQ6U>++ayEyl}o|vd{T8 zT*v+b1$4OmRed|&%g!CIi{9-GDl9tf;G-Xg4vL>P0ASYG-3mfT32+d;B@#La z7Z&-DyU5r0;px`j)#%TlRcC_A9<3zi>oY|wS#qA&*D++BDM3w9C~oIa%FL9nFynQ9 z^D9`3yU6yyF1SH)c+O%9MKvJ3jS6bFbnf^m=yrMoDlKyvX@#Pe63(f9%1wTU6cNsf zj($>!xOm$f=cF;V8>L~65WB~%0K2CYWu9Y_z2ZlgH5_!AC1i$YO3-o{=xTdYU5YMC zvk;S-nJFG?g2%v8gCT{T34}e@MTaROHBDZ6xY6O%1P<`%a`Xx~4s|BF(#fdVlOKj& z4yEkX+E#ffnk@xWX5MrPe+M!f8ZD9tUc5c^tf&GnW7*(dvI@%l;e_|&#RhPcQ!o5% zt`~rB6PR7Vbb;7Kn&gVXasbksdYis232TW#WhVui&i0L#u|9A7g8kFTM~iEj>h_Qm zxHY0BHL?LWK2{qLv((++3d4_&IiCMszisnB^Gt|?chogVibcOU8+1edf4@IA>%R~C z-N*Z%9^}W)xm?c?DN3BO%i#&|2}}E&L`%re=uC0So-FV(R;51p4NpKe_gRoIUB){T zIK`=W~ zZkYx;Z=S~}#GkrKtURu{%b#em3IU~b=uvU^4U$B}f#dEz*7W)FPD_+GH->lz0JQLD zqW*)R+>a6z!*lw)ox%hYl;Ly@K7T%TG|K$^{%&nb#H}04_=LP6Fg*qx_Mq61IOc8? zd+OR~P}`^`o4n?gnuzk>0JOl#%a=O!+S(({|7StLv%pTAXOI$PdPP1)9uL*8Wz zcn1>{ACS2x|852OKVdM(;JXtoo)X|Rg+WGVT$QBl_ILmN@niYk7e5T?>s2BzXZry~ zFy}jVSuxJ|eK3|!#KAs9SaT1sdzFJZzKuca5)4O&$HUPfI9Mg|f$ZVGK`>w7kiMV& z*RB2zeEI}9O}x$2NAfbuRT7IT(fjPw`5G_j#K)A*S3g{>2H@oMCHWslBp*s%5|6IH zcl+SUJYgY7lfe~iDf0pdnH-4xkTcZsSsJw#h}5Bbs5U%&(-*E=s2g2@&LCp zIVHzx5b}#pv0y;HcP8Ed`TMtw)Sj*Y!0%ZdI{ zJSYH^T3E1uv|e4m2KJw*3INk>&jD52f8FkIWY+&0bo!6=A0OoRk)IK~rgoi=VvtX+ zJOUU36q_g8m4kwAJC1@omC(2qrwE44_Xn}%Ti7M$2kcEz9ZUb>Vi`pjI6}c%vuW77 zc9Op=6uV{^2<2|k^g=SpI3{66Ti!L5e6%-B@@Q96e*9QrU~F>1Wf)ST2|r}1f0E9K z7LN4!1NIgDx7GAvjr2XShBV!YA`Pd4oIf71{EsZtIVj5n(~vAgvG$5RanNQa)VS^B z8a8ODmk3Q^unuIPEdTTFkTYte#@vTnKtkve%XO~u^5^2+u`)aLfh)_?0$y3!wip_W zSI3$ma`EQ;Osqf_w$|rOOhcQt(klWM5Z+upzkGLRAa@4v^U2jun?bNY?*p1m@S1xFDfGkFakRd~IHP7eS(6MdG^t$rgu278 za7;e|C1d?+^zQQc$=SQtuU`J|yUW+Fjk)r=o;_Vr+^oM_PJ1eK@#^jQ+4;%4x93;q z&t5)%clP}4`RVg3qn{N$L2%`Cgry|{sh;TaHY^wpKn53ZCe*{?c2?Wn_|(q1P|RzUSe6nC@@~J zL_wWNlrsrha9+F;^vb`q#iFv4*4)C`1_Waa%HD@4RpwprTACz*0h+E^hX)+Q6sN$Z zBy9JP=YOz&!+0fmy}Vy6Uh3NwKro=fL@kg%D)>j^p5hxT)2Pe}tbE#XaH-zQM()%H z*DBB)wFoKt+tIsaJVNW7rESScC|!9_L_$PjW?NKcvpZkRrYT>XP(V=w$ptW>du&l= zr5BeUR)utmC(w>{p4WQt{SM&8WB6X-b-IMFPOiY!>B-CIK-QcJ0n5*ir9^evgVpYm-r)>KW!DgfnKwZ$XHc94DV=t=WUqpvgg+#vot z$0SSqESTR<{I}B`4$b}lLFe)Q*N6E%@c#ex>$BI#AcPUjAP8}A15*&-MS= z;oXwJ^xZ8b3zDb9-k^7Qm~V4>Fimj^2+Y_nv-r&01ONG-8$rtZAjs2Ux3?ukvDf+m z9MG{oSdx^H#HY9=r`UiM;oyeC(pxz|HV0?bk1cHrR7HA6H4W&C){>+x`NHy@^&9%| z>lFFguYvqea9FPb;D-Ib&Y)AO|2pb-9_9Z-{P_Og&h?y?N8^$eF)8fc|7-7TwE>vm zP_6%`1?}=(x+`XrGi%CxR=I6aK3i2TQC?x#+v=IO9RWtm$x7DU_PaN(gJ60$DZ&h3 zM$r^B;Lj!|!x_P&V=PTOGn!TrAqg{K93+8^)2;=1OgE z3G`E{-~|%=sdZDg+!q@S@yFda0qq#Gw#tKJ@asSCu`88)YH#ts>UX02lP6VO$+O6@ zxF)uUpO~+=*teXeegH3EikPgxamYSWTD&MVaPU7Bzj@k3?tE5x>ZOEPhv=z-q1esa ze(kQXjk1PNibB@SLFBcmD?m`WAPefBlXLE&ScQ-9UWy4(-To)#x7yiIEqE!K3D zmV7aoLQ9#i%jzKx=xad#Zg-`}s z+BC6@&{N>^A`g~#N*}fms95ev1a{?CQ3=K#3m$G#yd_;zaKoEqmii&Ia>J6pb8tiX zZ9{G-1G)=0l%f4$+)zfP;06ntwYi}Lqaios>qr&F#>&@THD2}_l)J5Y4b&gF;59td z)vhDhV5zGBHqC5MQlS;v&q!5tXbnAsE)1EQ!ODDsD$I+C zw7#xCoi;GrE!Qn~O3Y0X@wBjmi+;BDVNN3C6K;$uf8O2qi*X3^%VIx&-ckR)J9K}_ zoO-r)<-hL^HNy#x@N9jRq|gsfaZIw*N8%WO^W}Z?8^N?F_^13?6ZW4VI``#&jpBc4 zR_hLsP5VFNfqDOHzt?@d|MfwBZ2#wi)gQ?Ne)66}E#S9BxR32}D|H3)N=A`h-pPKx z-MD))Kl`L#8L6wwMATss6;vuzA#15=!BS%mgWm%p3ekyY{OguWZ@LUhesv)HK)*gn zsgKGx&}90bQj$v${iL8nA(m0`Brg(U4v>DZLP=oxSY*Sfg?^MTznqVk2(@;v9JLhY0d2rZRNxf5 z{=5#1X2&Nf&TxQr*Pf;F!rzs*-jCPU7aq&kEkD1qy|_MQ?Rgf6czO)3PcKT@D#crh zcp0H``5ZS;O>G$p%=Pb0>%WQoXPF^26u_qQ|D$owl>hy~vh8KwPsQ$zm`!b z2iD}3P>1y2TKNJ#v8wpvjY`_p=uYiTzVVW>Lu4Siw9)0<~m@&abZo^965*3z0tSoXxXD^F6E@H6zK zV|p$CB$z{L@Dv~zvQ7xj(PlJcL2`wIn`$a5hg6$$#XPa}mX855X9NM(k2g|NA9}JG zu8ox>RF)gyM`tkd*ZDSI@Oqv?GRIL^hHbXk5^#nV5HB+) z%KG~)fhPKHo(WTXZHKs}A7TIJ{pkM&_Me(dwUrgP!T#&@J3}-7b2#cg+J6u6V=n4j z9vZEP066dYbS9{q?*8`I0jaTWUYr{mQb`Fic<(m%#yb+AXI>Em!RqBGdo8szr7nn6@=IF_IND7sIp>I zSSgOY@apLrN($CmT@|(JN_)cwf&xRHjO7jFUv;5y0#cm#GZyIO4b7(;pt^*ssn`o{ zvD_{wsy}9a2B*u2z|5=I@>>PkQ6+c5Nx==PAj=P@YEvU^j8%}8N|I||*&38Ni7hPF zv{+XqrlIehj3fIrZE^OMlW)pzH%(K;L_J3D@8{Q8|JMirZP5RN;n>Xo?GJ~K=RY3g z$KpSm_5W6}pnTueh+j*AsA_t*0g!uC#bZaPTa}W9*fur03WqCrr7W*>wpYO`d8@>x zlYmc3mW7V$2ShRy&zPXs#oWR7;3T^B*90UfoWd0NG0>Z%X?~D~z%0N0%S7{ORhKO@ zV$w2^c%98*dW#4I9E}XK*}iyt%0u-=w9_{APu%!;$Wy>fAa*xXkt1qbc}A;S=L^=%ID6sJ6@ScTBWFKk9>adcIFoV_i~ z5+1Y*=s)um@w`WUlS0PFjI{+kxJa_~8A|o_C7){LS9MEI1+{=7T9zV(#b#a(&f_gT zi}hUH13~|SFVO;-yL#46^2WA)*q^fPu|cjSqB$s!Bu>lgg^y-_G}_y9HQ|SvJ?)B{ zCwTH346;?_y*$W|_oSU|yyj(p16rGBJ+Dr-GN6-X}Oe#|w zb8F;^Z!FldfNbR&@&)n=XTS$5KSCiWp|Hz#uPv6vc9FY#58~b7x265B=GY&+6M6dQ zG0L{_0_x}g42J#3`tJ|&vz-5iF#l_<}&8Tjmh1jRG(j~wEE{^xxFC7GWs$$#fiLkvg+VFG&cS%_n3t89Bd zeTB1&6cQL`HvMvs`9BW%{~OCt-lPLI$p7K6YsP)3#`3NBj7Qvq#$ZBWP?5^=RZV0bmdz5 z*<#T)?94&fy>}SkMH0ab>V5rzBEKH`bW!T4e<^XL;MLUK`s#ko{6Ah~%p~V*e6Af(fKmMvJ{wG+oI{v3Ns*3-;e)Zz@UE_beuR8HR z(d*gC^~tl7tLJLZR$}@8b6LfS`S%Rs@p6yhq@6C~Qx0hNA6|mu*+0BJ4}9Xo4O%T0 zEO_!!ox#tb)nfVYy>X{IR$j`1rVV~yBAESA!MH!*cQ^TeKk>go$2|Wx9P}UazaHfG zmBs&Z-OxP#$3fWRe-_R1pz%Ld7u+fSrvUn+;(tOF-%tEc0NWV}4rq5joYLBMhda0^8Lhmh!LmM-BR zfpHd*1{h}%`C~A4#R65NZJcmFz1IwEO2OYe{>mt*3wWDgo$#L|sHVX>1I*ombz(MZ z2J6(ZXwb*j!MZ#4;|kVoF~bdeb4Ba!y+?bv?vIwx^=NR!?CxKz{5yv1?)BHm|C1kW z835cA|Lcv+_}{S8d945SAiu5Re+84=PYAG7ExNXsS3vMUIfAIbw*(Q3w-s^3qEU4y z(QH>l6TkWZoCvge)@x@x7Iy>5>>VO0^usl1y#ZFbm4D`nw-75Olig78eOoI5jF}I~VZaeDk#K%8? zmW@HUN@;#Sk-}{tx+0&(pxasH{swG|;G*K3DU>w~G1`D7DyUpY)Bsg8#%NAYv!1q% zG~Q2du6QHmi7(itE9m%Ty0u3hzdGUHm@cLs?8N<9Npl2Rzo-;@jJf`aevSP96ozP9 z=YNa(-`#HC^#8lv$NG;C^832{f5upMas3$ptJlv#|4|M<>;3LNe*tEL+aFHOnbUgw zG`}Cg>v+asu>UG)qxTdXU|_2pc)h^}C%X)-iCb;yvdUfF;O{bMs!6~fjQZmv%^FaK zd4mm*PgwKh1=_o7J=~AqR0(VgPlbIiz%=wv_=wi?Cls`6!{646xJw@{-(k~)HtNXb zG1Tbn(Wv`3`fX|dEi)96gLmTgI8^KUmyP>Bqh9I$ukPdhFAwu$^}knWam;JLp$Jkz z{&YcyC78owUJR1mWVLe%vt=3s9}qmvK#W6pB5xLCMjgA)amRA!zQQ*2E7GO_@@rIX z;MxP;53gT)#r-I|?2at&*~z6x|ND1O+>qk3A{{-n*cJM43eyyZXUi1DvnzfJK8k1O zvl!=(pMQYCl9iF(0iY!cbiz1*a%XyT(atZ161!1d3SYIC;`&F0xL=xQR`n8&%FhIg7r3gFAm zBkzHJB1_Y4KaJ`wn%6L01YZQ&wRtGXJ+t2me(oXVxANfa)&!dLUSQK&@Nu&ZA(ZfpD>#CKpD~I zqPZA#x~S#CV=lOUXKpUGd6&F6YpHNA_ubnIZFt2f?kWC!w*yKQi}Py7izHhsgSKZj z&8=-eN!mBd2~1;{LDEL}Aphu?S6eLxxYV8XZXQu&`v$J}!4tM>*o@mqh^U*lpxCsf`6joRv!@RqR>8S>aqJp7C`>MOYHFpSH<;ANO+})R(WwA9}YFjTfqs#IltGUFsSzr}Q>fTn(fE#LnyTipLO>YDlgz23O@=>I>&Z#(~Al?~Y(f+VHR z5KrC)LX?yifM6E(KM(Bk!v7xo^Ah7s*);dFc{{`HYz}#A;LRdD@gt@-D+GYvL#_df zTzy#qzn%B0B=Q#@Wd6)(MW1{E8NOmyWall5OCXM!@-TX0fGRx)I(WsXfhD2P=|duP zXvILvCLXVxzF|;`);XE%%^Bj?QYp9cib*MUkNCGRRBvfvO{At*&RooW@)KO=po(wH zz3QEoS}Go|WeN*86;r4*`jRs!*#8U%H!ub4;0L&bGeojhmKZD^h zSP}^IN#d8nUo4}De?1j2yWU>0?qnnW_cn`A!|EPK z5K`;F&*&VAP>NsdRg;QgDvj;E50+}&Zyq2EK7X|GudV-u-G0CNzccKc^^||3BqU1R$9oht%oj4B=#b!7sA8Qtr!{Kw*^}!mr9Olc6{UAxt8?<`?ZsO{cn( zEK!B50=>m1JT-r`8r2-;OBd#U^vrJetGE71hEsORv6cYXWdDy#`Cq-kxbwLFAL3Wv z{#W()73T+V8u`SkizUMZv_YYOm78LTe}KO zeOnlmc$p>3Or%w{l!UU~+~n1eRKXP2<;z?utrO$=z+Lz|@LHbUsB{gnz~?FO{^9+@ z^UBx!Nk~_xCoiA3{{F+20TC!MG96-(3xYnh#3wB_itMU8Agn+=Ib^Slfdjmoc=MjN zy!Nc}0l%_~+3EtK5tXq4pv^5%JXi2VjGrJBs8c727fkA;rJ#577nVMAH|xVG6~p4t zIIwnbr}?VrTTpNEr?r)RAT|s|)u%Ro5O?D_z!*cd=Wa;YngH%KbssChyrozd02=Q$ zS+sh0Y{K8g#M zyuI^=_%nEHvjz(G;m&Yj5U|H~Q-D3%+Sx95VF(mT-Z`PGE=BRo6A2pTPE3|W@{Qbb z0Zw&Se6rh?`#ZcA$DaM`uPAr2-ul1w(-_6Gnh}5v>%ZIS4@~=iG#Edw|A+Y1SpUE9 z$p`)fFEbIkPH_~m5Vk+7TKGBNi1ye1tRnn>iE&o7#;wp)6P;}ln-SnoAcZsd;Rh6l zz-y)d_(%9(Pd<^k-y4pO`SrQKoLs&-fA!)RTozP;5N13|z5DSaP(#n64iGQ+v$qct zW*X4Gg=j?l9`7v0@hn<{6jJo5PzphYfxp5iERP}qh;6^7I9vu9!ZCpH3Z*z+z&LB~ z{1=L+7|gRQA;$*?Ar44;g0k3Opmu;42SOUdlpM_QZ7ahEOD3~3KMq@>mlo}%rLehdbYZ z7|whq)^?K=PSFP#^1^2SvDXH#<7f?V%)X>3fdr-?LNRRbw9l^IU1d0hJKum)#-QNs z=@kf3N_N^alpV1Da`boFlYgZL?7#BCe0D(pBmX3;_@DqZ@q?RX!gL?m`MynVlb!F| z6aQxC`*yaV|Hdhr?R@|L?0f^>`YAgPcYgMq?6i{<{|19>r;S4BAMoZW{%xndA^{HJ z!Jk2ZI@kZ{k0-BQJb(H6MSBt6v5(62-|Y;${f@c*JCEl-9_IHAIGy|P3`ThN*Gc-f zot>S(`Ybo$sj#+MN9}IAJMjMY*8~4=JKucs4fs`i@y}gpjm%IsUrv}ElBG*1*vU^4 z##4!(!UOfoe!Jb)Ank$OUZ>Yv>1eZ$C#f{jzEm#*24b{ zr=s}}=mTw>rE4nArsxCkLKHHCa7qn7_#xreoY(RIibE9m8BW3Ouix}~$?W5-*~`!#(?$J0UOjGFbC#67v{ajn0F1#dsfWF+?|9WP%r4F6DeH! zwZDkOTy2L;F;~5cx$3$o?lz{lV^G|!qBvV8n410aGCt~L2r{?BpdhnbL1xEAW~V8c zM+TLhJ8>i@d3aQheE8eQ#8c z`rgPr;fD^|4x7?8(rG)i($-91`(X%{X~b+nyv)Gw5%38hcmaW*Bp}3)Fd-hH8wliJ z^=qz(3GFaVlX|Sd^4P zJ{$xXo%7u7kuzixbP9%WjaX`!pEvp zPw#a)4!y?-bB$FaVadMi8e>(6%U-K@*hE}*kLoER+P;Ejo4n*N8q?e{Xzr>s4-NhZ zaGJs(qfEiY17OA64AH^p9&KlE<#dk*6?EGq1b@+x?ony3J1X6SlB|qyaAPHwu7x0l zlo9A_E=#E!nD5Jp@u=nE(Du&p7`gah)R+%O1|N)cKIoa_aYER3=k?#&wK4oiGEbOb z#P(}We&0R$BiH1Q8c+UE^^Z6tmDp~{P6$KbFEbpW_=ZxA6Ds{P3{X5vAt9XRUadeD zZSSOcX!TUh@P(cv@?YVy$FXwNE$W2Rk^9|08O z3{BU%*Hf(VdIQ_9DUkYZfi!R_o9GcXj- zKv6v1R=-=DX7Pe$STXv0H5Y2n;fiu(UGz6qLIXny4HPA$(l2?O$B*B?dV79$e)8_^ z`PKQem(SmwJ%4+C`uyq`cq@!TPei0*3|?Hk0f+#f5HzDs8XJ*r&860Li|c_)MGYFO zsDYuP28xR6Hr#FMjt}dtg7IP1DsZT%L1Ps)FjUk)QBmDi&-BBEp9L0(Wd03gse~vd znIA>W;aDcK)DI!wZYmN0o%A?V#GtW?=o>0xpr{Cq9z}9Xq$vTC7?QvMO;NxoIo(7^ z-zAd!jYV?b5XpT-BzG0ZryeubbbiMb&Tro(lKYKCa^DcieN80y>WgGX^RS+SJ07|n z+`dZ;_Zy4hz9EMDni%dLHKTb@ljcDc%??4^Z!Bp0hM?_hg0?Bmy?V-J+&eONR+t$F zrclJ*3CuDS&j^rZ%h*nicnX#Ycysj(gm8rd=oSnPiQR83vHOO^?rRde*)D2#+^e+- zM%z~~j6y=#@~FW#K9`HEq7i_;r^`70;3UTB=QXC4&%zyfRP1-n%L z(T*6{PE7{vxUHL>Yti)@FS?$w=z991D~%yPe;utU!!HxSD$uq3be1RQ3ZiQ=PRGqS zJ=bFCHC`+|W3lw~#nLkbK!^jrfyxe`<23UlYQ;>^Y~k}QDRv_@%0S|$1hNBJl*f1* zHXx%dli1{djJob{ThFzUdW~07w=^If`+z7b>H7MA_rcZm+4(Cr1m_n&_zOfCL*s** zYpUbkPO$Gk@)r%s?x>kX9Fj@46_t)PYlpvRjEZidc9g`OZqwl3=&)YkW_0Kd+;m*V zY^Sj?+cAvUj%Lg@rFlHANAq}GL9@e{?KC!KJBBga(Tv%xX|}``*rPo$2KB`6XzUih z9hY(2X>8nf487gajN8tUWtTU?Gv;;i!>*LXQB4v@RU|spYNxSU?HFpcqp8(Sv!KCf zP?P3C70nK<+G(s+JBAYJXj-*lxNuZ2e}}fOpxL288s}~twR>ZOW}!i-`e^lzY>HDV zNNOVZ`yhoeUeR%2&@(iN;Jzr;C`&!@k?7SFY(1x7qi9=4g1%@x5}GchkkpZA=75a4 zH5FLbslX_LE}9!E?W1;YXwW=TX>Pd6J2mIIGv0b9XIOIwbm-mzrNq0&v!Ow7)b0(8 z@f@n-*~}mq)--~KZX<{y=%TryL2%UW^$nT_3e63p9>Y;R9vY6SWQE-Tpf4KJ+%stI zt27^40x&XbBb@O2`l#^a*Sc|f>ustGN6t+ZikyqyhStDQyVo`7?OEw!9 zziU`CeP`%S-=WC6#-pL7aMbQ~jPdBI5Spj|`esOQG8= zazE_Wvj~S>r$tB+bkMxz{+x~GL!IXCk(Fk_$kH%k37H|9vNX+%-G~pCY4jaot6m;f zlb5wR$*~9t~2(#&{sp^NF3NhVvnRMO8CSBJs>AI>(*D=L( zmaauv5g!o9?yQ1^bvsM(GGP;#U%a~pS?Z(MNs!B4>o&I6x`w^h9a#x-Pad7M!C}2c zH#n?XbS@)mOUu_rq+vvLRU^usUStqCt{1i*jGbZYBl{_C{^Cwc(PYm-BSPz$hXdE? zCWe7(DrwIZ#L5SfSZcZ-MaAB@nxvj#aD94u$+4{&0vHVVxi)@vwjI8oLZH{gSnYfd zf(ZKYGT|3#Bern)bpgRLMcEo8)Is&Z1ZDDU2B()DMaoh%o555j;LG!bt|_Q@CW*FJ zJstyC&BU$2;HU~%J-c!+=vM%%>A(+q<0@b^G3#lViMi6`H{-$(CWI9xp=>vs2mG8` zjBndco_Cpt%}%lBi`#G!x~hq2Swr{8S@$w3E(5aJq4#`L3`e4?8j&o-W=F?m+BLT9 z48!ioL_?pP`r_xyi^O}B9*#kG8K8~qPx_%@da9OZXA8@-xkPgi=(0E)8=QthFU-wu ztM82d+=rBP5a=?_8rx=uX*N^{?3w!>est@viO8_@sU__%pg7DXj_}|q2wrn-!$N46*~3aR^fwD(CMw z_4O?6epMjWX>>HD-iSzbRqCC=8FPB;WjplUhbNC5TUAF*cd8D}>Frnvl>1cYizI?9 z=Y<7h2wEf&nxcS}&=coopYi&iob;MI&VBce^PyvI51Y>Ip+2{V`rLL)QkP(HhMf64 zyc#izX8^^3z;uNI<YIlyaBD}u5sG|sCSCs$!{>oh!~cdE8CrDF>=^bqo(%MNVlg( zx;BF*Isw42^VSXrviK z?(HE%`wVMppP^Ixj2za}sHycd(ygbFW<7PCC-e*g2ldR^{=jL@jvUt0sHyd29MB(W z)|0ygkwIY1qj7!r(Ky$c`^HD^jT84HO$vA2g%=3SXsgQ}aB2-+dn6bsWF(Y5bw?gpV{ytc-&qZl%8>x3?mH?Q&a&4wrh^)TJKkF7;4z zsV&FoS=1LS6Toh`$?INr`!!w3K652qd|uNR4KHr1`e|Ns@57YaRvYyN?149jbKLRFxVD4Q!gZ%$&t6W*4eMipoJP&{)Dv0ckIE^1-av>0kyUfE5}t$2c&_!Q-f;9>$(P?XIE zDaIK{d_rz<8oFq(EAqxgDvTNxLrsxyyXDp!*Rxc5W2dF!DoN3}B85?qVyG!{OD%yb z?isK1gGKy;Q0hAGYc{nowb|yGyg7^w#$i37&^xRU3U;O6xKxEvsbZ)peam35lX78* zGK6D40)B*iLLk@sEQF939hz%n!^feXQs^Bz9E6OBtu49s!pSjR!GToh;Q78MaU zffsL2`SjDj)<0h81EUTEFXzXHqo(w89}st)r*3?lx^Lt%4K|F&Nf^rM7hwlVC$EV4 z68qsZKl0-Mrr?B*iy*(A3D|Q-O8c(FrhenZroNHb)K?Rmx~0rc1qvj4|PtU2SKKaz^*IZKlswHK&vHOj4v-(DER$tA{ zsv2rzN%d>;Q@@Iz>{f37uDMwqgV2FWs9BJHNnjqirP@-vsFhjkJh4!*ewp@AQVDSk z_+_hXglZnQ?YWQJ_U%_{@ByMHUDy|m*`Q~PPG1=vOV0lVzwoE^Jcv+2AV~Z)1HFCV zhknBLCRkZV>buiF0(r3t8;kC^-g@hfD{`2+H8%>ne51e?q35&3Z@EJ_W}6b3pTX%e ziU`b{vtc**`wg!NVPAHQ+32aWVeUnr;$#iYjAT>Z9Tz#gf?P>xqq&u-y#nJB@Eg!(|pVwu%g+sJ|T=E_dT%vDV=T5aMdYlT&BpVQqnMI* z=ZGixI#98%mri4+reioY9mT2HfQo&3I*m>4j&5>y6qCCe6T8XVX=d_@xI|aCTsno_ zOK~}L;$k;kJ53GOj&8Vi3d5D6F><0|H(WbS4OgT7Ri`jqtI@EVlZ}gCb<9Z_ZHI>4 z4r*MR$tca#DeNGMhRd69)kkVr9x3P3fsRXmJ6v3Hq`4T;(dcc5hF#M%E-hqK7U~q5 zrWy^GD7(uMtggu=oz1w6Datl(e&?45B_duOcMJ7dG%u}m7@s8}VjnYrV_*Jc=vn;J%A-7p#( zhLNK@Df`NSMxzKA{cxb8F{~OkA$$Bd#u+;<^b(Pbb2vMG!vEyUm`bB0#Q`Kl)X^3f zwT0>#grj=5ksrA(BOg0##&J`daje^nW5Z_LGB|itFFoLhX9wt2nNeJMSeoy|^TDi_ zk8#A)F<5WsizLM>mf^(y1wk0|iKR8k&-A7 zIfU#eo?+3shR)9OO{M%3W9aZQrKYELKM4E&5>9=7*zS9=wJpkH zM*f;={|rlonHL-4%ZyONfS?ctln6c_wbDb5To+l59X`&usgE<(eVno3ph3nTTiXcmLhJMHni|5*z4MsglFzj1vW2DRYguKG>CB|$n3K?Xk zyJqrWCCgkkCZ?W);kpQG?C|==O})O6aT(6o@c4>q#VVU#LXxG+Amc?Z7_+mxZ>X$P z5@d^^Dp)y0QtQ<_&voQF&NXt~s55GOqt1xkFQF{{k#ePuF)X=?!f8fn&yNq^9Fmrw zwdPo)OYmW$gx4$RapbCUEU>gw-ZaI6f7;PV@9X|d$62#e(3nAz6{$;zXZ#-3t2}b# zDm)?(bW+`X!jDX%9TTos2v{cKB)K24@Pd}lC9X+fHDLT8Tl!J7rcAfS?76{1ha9mccaM2iY8v zypLO-fXNa?Of{#F9qL&4D9&K))9wOHGBAPJErc<*yEu3jt)ixxQ2JTA27WL{a79s^ zVLzfc@{8-wF8{YpWhc1g7fMlKNp^OAT25dZ!wiyR@cwU4yX@lUR_8rydZuWPot;nM z5+<0S45w@G39w|nPv9*~sW$*V?R;t}zfao#=)V}m^ZYm*qk|38&dxO*3`BqreuU8i zycEO2PlxXOa&r0V{MCzNaQ)-?6*&Fz(}7fb8!CZ>iXp6 z%jaj{?ELci>GjM1Wj$W;^RPQREpWlk=z(AkgB#`u{QCP61vf3aL^3d2q7afo6%_Kn zjnmn|!jG4JbnyRYUtG~IzU_5hux}1J-PTDMqIlLSc;R3VOi@a*_D&02LCDDc^%r!5 zTs`dVw7_YB+8H7NPQ#*g$RD(4vxDp{xw!uEm+LI0AH7as41Dk_Q&4qOSqyIvf;q+n z?(MW%t(}u70+(nu&j>XwVY-4LXn|{;#YK|vpF{&X<^LQ;i&>fBq z`9JP-yN~k!A%0Yb@jPQHSz2$|gzxMq{EP@lQnc_>6s?&M4yh1k2IZRZ{i~BJk&jHJ zdwb_cd<$1F-3PZ&oSx-v{U{Rhp8%5iape@wmnOQuG1 z_5>(q5`phMNTJ9?CSz$z0gK^J)`ec8A24JxoM#pjKZZq>1Qsd9GZb*GAV=mC_z6wc0PgYzk^SJWGR*SpTK+X&Go7G9()2h<@L~F=^AL?4mygpNCSGDGb3f4q?g}h#^#T+758Y<#lTIuZBxCETrj?Y0VD)WQ3NR`XImin15SAu6U9@!pR3&r{7Shq#DP$@RJY-Pv=vvK zX)U}=TTD!AlDj1^Z;1gr_(nl^&ps+`c6Hz<5Fx@C=vS}R@|W4%+xKD|L+_uGBb9-q zy|FcdVhH?n#+D~(Q>G;-gvDK)t=5vjv=#c9-wIL62CF!3n}G=PdS-kna`4(9OF%s8 zNE{^a;A03rfeFTRGT%@Ah(L<@a}k$Z#&LNH3)V)lxLPoDcCoUpGgcg64Pd-NDUO+x zTKOrWeG+j4VbL91b58It`2^(izy_Y09R)yf`7sPRs9O|8l+U=ko?#Jo%%@4j_Y^Xv zu_Z++AADh}D_`>HF1sEnk~b|%k!vSlhBDXsew}bh!u0?(`T2VB!3&guw6L2eYgSA_ z6bAFD?qRXytE(UBs&V(+=12aybXEi^lctycErTGTZ3*d_PvB@^fyZC8U`)RZP0(%d z%N)jFg0s0YaX!DbcAt%NDiETG@ZxAm3Ij-e3Fr`AI%-#ZPq&QP^ACuyMz7XRqmst?JN8!7a`0p!(Ya7MXmLyxOML!0ju@Wmc<*KV2 zaeUp<4K?J|Uh-0b^*g!6=?#i!XDHPN`M^_^D}^aq0w&y8euP+)IDs(?#YrVqpk>Um zI-i0VXZ+L_=L$bb_{Y-15$kz@mvNT(bGb^HDW0Twk@+aP2Uf{JDXfy)M-iTJ)0)f?yVZbM_YuB9_1Q#rRI*-jb0tT`Zmd{= z)!{h>el^c2(3|mG-jm65D&%|OxxBBMJePl0ljquuDNMX6uO)sqC!9fM?0_fjh6_6f zpc`aSi4@eE%a;_;OV*X+vM`1CSfoUT7ea2trU>L_=2%p;*#c|QU zAkSZs!^Sy_?VNLqM7r>l1>Rn~YP-p4=iBhQ;?|I-Nc=KK!JILf4^5YD(XpX)gm=ML1cd++0m6Wus=Hna^w~T}=?JO2E9|rCu1xTmKhxo^ zSgoYq{~>d~Hyj=Jj$qgy9CrK;goFNc>`zCB-6;%*;b0o{y2D|2Aj=Gsz>hd3`NaNJ zvhd%is0%~jgCB8<{zboys0#&7#D@Y-;igtHi5doSGl~JM8MCPFt({}cZfbCi0(^^( zZJm{QXwdGpJCcPCd$1QCc6xAlH0h0whJ()0XxKaQ{mvmg>`&k%>~%VW&>xKkQwWdz z$tXDLcHv+;r2iZoZh@8LBk74$vXW@DOZGM}RFO&OV1ZLwNoOD5LKx(KDCS7bldjDiSm~EkD(IXly?YN z!G?b3Ti_L6u?8%0H_nWG3z5PaIxybo8xl|?&y#JC6<0x&(S6BZY@j?#aTLLH!%$K+ z4b&#W+AWHt9>|(c1ZD@J4;MHlFstarYNatZRw+Ds_a5C5K9OrIMn$$azjqEVMYXtw zqX}yK>utv2ZvCW?<(yL@s7>+-yzkOJUM*Q6Vmt*QB#3&M2@Xm5;}s$Z$3G%MCGAVJ zU?F+|sLw*<9R3wMAjDgPId2Xk-rj(TS$@hJmQ2}B{4_&cmniZzMv)u{g-CFzehQRN zt9l^IbOv3}i_tWIFZ>Tcd|3s28T%_AMU0o4bfJB(cSNno49?arxH{{CWim_s5Q6-( zA8-oJ^1jJFwY^a&oe^sJUdju|c7=A>W1%$-OCD{w5|eNRt$<#~XE1^pEPq~rZi6$% zq7(!`vzYm+b3{sO&SKW*RCo^JowmJF#<^G_IMuj{_0OURr+(s3P=qoBjYaSIVdx$I z`pg{`s`MhJV>wW&`zDJ;+26IUAd6CMqZI@(i7>udCUQRl$Nb2P57wC&7pj}Cup>Vqki^LY{$C|u1n_G6+7A{WyLW#*#p;qKL&5EPr2Y z`0nFJ(7qH`53qd9&!4{or$qzygYoKz6feYI0JPh3F4*&udY3P+lgL7ce9IDs#P{|# zA2OK6esmsZFrE4VEc=&l2oxDnNSsObvy7$Yunh*5Nx|1Wl0e!ri<7SHTR(-zfTcoB z)(J0mesf52CXjff{)x@KWv(cFfeOJRP0?Z#g$m8dS~@6gaFJ(=Ns-1;r1FaPH;eGZ zkJ{5^6j7m&J3bX^62=)yAv<9~`$2JGHV9~l2;o~^ENZiDI`m_JWfMsOzZo~*eif)Q z$aE>Qis_E|Q{M|~Ufc%<<19t|=>g1w1KN^+7FhU6LeVv(OaGf)>M|b&Ik&`)AANcpvQLluDsx8RuV$10`z9qTt0EFL~weT-s(BymyGn z_j#A4aHyE8lPJQsG8oKa=I{fRL?|mhlc_@#7OIMF2$=TJ1*!^IXkV&r@(<16gZ71t z3$VYgV_{0m`J%Cu@+P;6}RVQ+DuJ?*CGEeIKAjg44{8Gsnu5 z85tX63G`FZ7;X$F6b+k36Ba&-zmssNiZ#CIH(_6L)M2&|Doj;cQAKE%u zW|%5u8|$AeGaS)(%D`~xEb~v;)mk{s_IXwii_No({3)068-gE2~4Q92KO{XD0XxZ>QAE7L*izf_d^VXtpLdcADREYcsE!poBz08A z!5NFQ2x!rETiLv@iy3LeN~nKgAyXoGlO?O|CvaP6Ii)u2h8ZnDV0Eqdl>YT2=` zxrxl%Nrk{Sp;655c_sUFY103}ENHjedu?#ejOi3oWEMP{7*fqCI=7&oMP-&K44LbfSGoC;55Y64p?UV~D|y#Hx6P^S5`}W)Sv)D%w5}@y zKWdvzrc=#GjjoJQw)OcCqw$7=AzEwqiID3#G$AnaPGq=dFkPUSGbm0&m~K8pA}$N8 zBug9*DVoUikaQXEv#S+&6^OjWK0AII+O=yYeYAI5UL=Lk(zsn73Ac5%^C zPA=s`W8Y3*M(VJ%g47@?-8N@YoEq5$U27V)o7D%PZP+ zNuZLjNeMW6)>eD0+;h&aS#@tXt6-Y#Hp@=z?wSU_#x}F~ZbNUS9?E;m-A;Sl?#s>P zQGYz>Pr4mH7>;_A!|AB+Pr`mU^?QR+@8~cXjmC$;6i$xdcsM)?M#J7{I30FIqyFJ= z8catU@R1Ir%=oRGog$ssJv|yA=lq;RxBi-xa5M6b&8g90*O(jm;ieADos_1B$(Bsc z&ag8K`-6T5hU1_c4*F9Vb`Qfz*zJzTlko@!lhHKjk4N2Ze-aG3VSf<%y?!Scbb9{a za5&tAkTN~DIK9b-a)XDhH@B&Y63{l3-n*{tsM&&3S;9&*VsnCoVPSx&?*tmel|UAO zg}b4~IjQUmcx7NR!n95xX^Z^?a$Fb}Q2bv!Xu(2r#yC_XF{WgFg+pqFN8-XHC132` z6UAbd#=j@-g6`4KA4~=T90sHDbkYfWoug_0u+tw6dtEpQ``uAE?fK(ybT}FGhLfXUa5(9A zw!=y;e{BzK)8bbf-_1hYGEFBxS)ueSGE`jH%7f1)uI2n~;sV{~CdSX$@L;@4=!d_g zD1)!#fCoNLik5juzBob3PXx5NL&6;fELJFU&A27Az#+`NACbk+hii?OX?~%SI1Qfu zN4@3Dzdk6iYKfAuax1Jw`zL$Ov8YalqOPZ&5OwkPG;d}H*+7u1v&rmr7ie+F@HFz# z!sdRSPg%JC){jNa7FHlH2J%A?&@cB3?^JB9Fu8ny@a;GPi{<5P(XEcLORg@=hZJs5zTVFb@AcpZ5=80)%0mSha z5x3BNi?+5|{r=#ul*V^>`YxNpcl^V@z2DDwMKTP&YkeoO3y2DRvdnbGP)-;+=ir`0 z5^_~LdP|`nvdnf1drPs5rYcdTa~*)fXcbPLr5A$!Ww6xI(a{T(A1m_t#NcTzKO`|J z{Cx>YmQ!SvSgu~xi#KhdI?)$zpck9WVV_UgZX0EU*86=Bu48|J0xsVO!m+qCQ05+M zALMrtzTelfPxFsqY6*0UDO4d5yny_ELKqRqfw2Rx`sJePm&=%K@xl=7DqZifCCP!t z%P86hF)rVYNKGCl-eI;6Sm_>_Dq^9)J^agwYeBvdL9GDCzsX8iEZ+BC6N&HJf(NM` z>jSc!v{+ykvDygy1h|adhQ*T3D}~|_!v=~P*=KKhq6nmR7_|n3aF-=QM@-~dYxy->8 z3bcOJ{xaEf3!Ut*d_+Ew35q)G0Q-iAm;(QA2G?8Q03JT zFp8Dh#(54T#rJ?hnc|3@!o~UiIIkYwqDCPmIrdGE|7I?5*#pIkiB&DCyvJu*BskPi#T=YA&6g^_C#Lb$q*Nl<%m1h)Q|^TSq59qjVZTw;@oa#zw2iVTHXA~ElT z!0bY~pUIK;!*+w2WvX80#Pi^SIlhhgtupMQYHL^A^4gmDuUPX3TmuDuIim_3zQ}^G zboX_y3kBh?VR>h*;uPtH)A}}ou%Zl~)$)7OUHTuvoY9x1axM80Ml|4!7FpGf??AaGMN@+)gxaSm{8E zf!xY_Hv0X-4jY;KDU0db_mJ{~VlsduJIOF$pXO!KwTr6Ao#Y$qD@1A8fZ*7+7cfLi z>pp=@IutE347{J=0;g-Q;5Q#+i)2c`?&ZnPt%=WMB->b8lMF8Q)VLX&I}sd}Am@Gt z=vQK^8i$s+tH6_>e?fUh*0!ZV0ldFL|AHLHXABqa29x(-3Vn9f%#2O}E3hK!lC1HP z?PU;|aRpddnVr>RfPkP%jA$9Z3@+S9{2R|XlU8t%U|z{hjGL`*+YHKy`iiEJq59QM z;>u4&rL#Z9+7;-2{fk#3`ZZ5{x^!BrU*Wu`%lJ>S;svr_>(t-*1o%B3+fHzJvaw8v zrDlgLWvPGPumFex?B({gIZ9vEFT0_DxN?^`d;ig!k{8s__Kt_6!+rVJDJwnBlcc<3 z?=`z-?`K37eiqEVeUII~r+&vCydf|Zf2$X8v3A8-cRhVrA_pXPk}EE90@BQnTqPTs zsrgx5pfWFCd{^GJEr3>KjEH(G`Z04punewJiHO0I*NV8L-bK-(GRwJu^ni)ZMW>aC zb_$ghxpoGyX6bfHSN2ppvzHp#cEzWgyR~&?Nr2X>Yjp>sZrJxHqj6^%1cUBTuOA%s zru}{=IO_L0hrQ`&H0;ApzYF0s>;^%%*X{NFaMJB{rk$W%psj>eo@JLJ%vN^QIj2*; zdnMa~AWxzwPR(XiC$lO9qT;AX*A(gd{78$7Ew7%Eafv-?8@^9tzZlZ zX;F_5v464R;mf4Oagh6F?2oo=?!xS)e9zk3cvXkfmb?2FSC)wv#9e$IRYW4^3z0c9 zUBry7<(0A$>ILiE*4@T}?)-p-MuZKHc_7g{@VFh|gCDQ2FT|HJ<4BgcVLU+JAJG3? zc>0FZ{;#Dpks0~+JX4LVtMi_$kd~S|e@sRi8 z!ZZ$jj-!xBSh84x5Z4A&8y#kHiFbW^LC25esU>XqSTk1JKE|1d-sU^?rMbx&*fm0z zF!a$j%$Y;FU+&Dome{lCa4Y^SD0L6Q!*XcR?LD)oK4$mEqb67@DPM$3g>ZEZ(Uo|; zfkOq9`{hpow8WjVv#ofOXarcGJSbnvPVbp3)seb4p45R_h`4utWF_sZ?a#bWe}(m_ z0%~Y`>UI4~mZ#Q39lKL}xT(W(CuNJX*B%rVfxF`_>>P$c7XMpg#`a zU^*BNN0TE6JKcV7dKexKM*Z&5;b`jnyiL$V9R@WklKl#X+=`RU-TeUO};?7D{pK2SL93nZgiNnPP}k zyXEZr2lU8ONboWZN@X2cg;L@jfAoT6=^cB6PN%c*_B|e+^Nzj47s&g(?}==DrDa!d zH|+e3yw6(XMD{6D`3X4S6;X-fXg5bScNJX@Xt{7zt^f)*Gp{cuw~|Z4oEL}7Fi3E+ zjJUiJ?eiiOLP;_m$a`#qXQDP7kFjR##Jo}tlxijz2kANy2c(2%-RF53Y`2n?ZeWQu zD@2eeH{{3b2@co1b2*F3w!XMHV2UE4LuIi|V^%NToS%un*_)qFu72{4d)mxgh#CxU z2u#8G8Q7&C>;V|BS}Q*Vvbs*R);h7r`&d@UMT%A^f;0G>1b)QWT*T7$J+%NRWuI~- z(S0wG--r2Uav%5-53GF0Rz#N+_PP!Js!~US3D40%VLsc;P5Er6t73 zc046Z%8HlR51;vw9|tgH3gMM(C#OIhy1#3Y%Dk2=g~v|BQzG^%X>%3Px|RbI^SbGk zFltsjVsJN4jGHa0attrLr=$bp5=!e97Lj zb**eFRS}i>=?rF@IJc;|sI)hND?HGziF!5w(-beb{an;EW^Y&+;e7${Jv(G5ub~n_ z1eL#}coGS6g|1d23&!^M`-A~zlfa563Hyo;Q78nCw9bm->$&`6Aq*E+==-I10jNmw z4RWyDN6i&Ow2P`5)Ck+KY9#zE7Y=b3`^c409$d=Xno!DTGKHIVexYSds8Ui@)Qcp7 zyHvPNgmB&4*JSNJ$l>i5GFL(4MEZA?5ebVksDI!1UY2~-yFrUW_RiEuYB=4_|6lg5 zueVJYi09d#!U|85W-xyOq*^CUowTP-RU2vA!?ZfFNvzQjVUw*=Km24H14&4#H0%CI zxfetTcZV%}9C!SFOwD;0JhfKXK26!ow#URC_O!`Phv%kllYP3Dlvn6p2x^h{YmD~S zkQgOg*hP!c`X!$10z)@wmmLR>yax|HqieO2>K6E&p?q(l)!MP_Gz}S6?SjIxS{lgF zTGIygjnSZ|*`1eU#;#e(b?Zd2q+Ko&eAiSw4+Z+>Yv;~EL{{8W!9FhtMNNk9tqO|P zzUMSZYOlWT_;k;NAak~_WBG+0LjD1l_JT|QF{g^W4yQe=xc2#un2#dbf1V0nq%~?r zyH;ymotDL_$cy>I?MfxZR}Em&u6ve^Z{Hcuq2#k;r-#gpn^lj5){j~YCtFaLvbTZz z=v!+t`LcOq)if_J4q?d1YylbNnk}U=TrT$OaJ7&aZ%p5shAfygu!}t?_Iof7wpd>- zy0k2J9pVzcqB@B=KDZ$f-jj}ixkH=4XW~w0IU7o`mK3_-yZw&nlg-D0nNm;QgeZBCy zEYw7T!CC$-X8Um_#yE~5y~P-BZ*deS13wC)FdT((m<+HVN8xAy z@$b3B!%_)J$^kyv*7n8yCxQ?H3r^VufDl1h%z*j@IPJSx0e`vJfkO>wX&S#~+J zfwx`L+@hR&-&6qLGf$R${ou}o80s|VawyqP>FNEF<(EStA95xZjL9MN-U8q_8v7UN z + +## Helm-Chart + +##### Scan Results + +#### Chart Object: commento-plusplus/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-postgresql' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-commento-plusplus' of Deployment 'RELEASE-NAME-commento-plusplus' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-commento-plusplus' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-commento-plusplus' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-commento-plusplus' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-commento-plusplus' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-commento-plusplus' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 + caroga/commentoplusplus:v1.8.7@sha256:ccbc099c69700a6f973e5fd583520f8ff3293c5742d179cf3517eec49ee84f4b + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 (debian 10.12) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| dpkg | CVE-2022-1664 | MEDIUM | 1.19.7 | 1.19.8 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://ubuntu.com/security/notices/USN-5446-1
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u4 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u4 | |
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | LOW | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:d569b16398ea62090a7bb0813d8d9383a54631deb7e01ceb8391d95ef640fec1 (debian 10.12) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| dpkg | CVE-2022-1664 | MEDIUM | 1.19.7 | 1.19.8 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://ubuntu.com/security/notices/USN-5446-1
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-14855
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.44.5-1+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.5 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://access.redhat.com/security/cve/CVE-2019-13627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u7 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-11080
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://access.redhat.com/security/cve/CVE-2019-9893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11656
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://access.redhat.com/security/cve/CVE-2019-17498
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
https://nvd.nist.gov/vuln/detail/CVE-2019-17498
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-12886
https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://access.redhat.com/security/cve/CVE-2019-15847
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15847
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://access.redhat.com/security/cve/CVE-2019-20386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u4 | |
Expand...http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u4 | |
Expand...http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2020-1751 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1751
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://access.redhat.com/security/cve/CVE-2020-10029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://nvd.nist.gov/vuln/detail/CVE-2020-10029
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2010-4756 | LOW | 2.28-10+deb10u1 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| locales | CVE-2018-20796 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10+deb10u1 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://nvd.nist.gov/vuln/detail/CVE-2019-19126
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://security.gentoo.org/glsa/202107-07
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-7169
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
| + + +#### Container: caroga/commentoplusplus:v1.8.7@sha256:ccbc099c69700a6f973e5fd583520f8ff3293c5742d179cf3517eec49ee84f4b (debian 11.3) + + +**debian** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/incubator/commento-plusplus/0.0.1/templates/common.yaml b/incubator/commento-plusplus/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/incubator/commento-plusplus/0.0.1/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/incubator/commento-plusplus/0.0.1/values.yaml b/incubator/commento-plusplus/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/commento-plusplus/item.yaml b/incubator/commento-plusplus/item.yaml new file mode 100644 index 00000000000..ad2c1825cd6 --- /dev/null +++ b/incubator/commento-plusplus/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/commento-plusplus.png +categories: +- media +