From 65879669823953d107a0677898bb2f2de3111283 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Thu, 27 Jan 2022 22:46:13 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/n8n/0.0.1/CHANGELOG.md | 10 + incubator/n8n/0.0.1/CONFIG.md | 8 + incubator/n8n/0.0.1/Chart.lock | 12 + incubator/n8n/0.0.1/Chart.yaml | 36 + incubator/n8n/0.0.1/README.md | 41 + incubator/n8n/0.0.1/app-readme.md | 3 + incubator/n8n/0.0.1/charts/common-8.14.2.tgz | Bin 0 -> 40699 bytes .../n8n/0.0.1/charts/postgresql-6.0.58.tgz | Bin 0 -> 76159 bytes incubator/n8n/0.0.1/charts/redis-1.0.63.tgz | Bin 0 -> 68677 bytes incubator/n8n/0.0.1/helm-values.md | 56 + incubator/n8n/0.0.1/ix_values.yaml | 126 + incubator/n8n/0.0.1/questions.yaml | 2774 +++++++++++++++++ incubator/n8n/0.0.1/security.md | 889 ++++++ incubator/n8n/0.0.1/templates/_configmap.tpl | 166 + incubator/n8n/0.0.1/templates/common.yaml | 9 + incubator/n8n/0.0.1/values.yaml | 0 incubator/n8n/item.yaml | 4 + 17 files changed, 4134 insertions(+) create mode 100644 incubator/n8n/0.0.1/CHANGELOG.md create mode 100644 incubator/n8n/0.0.1/CONFIG.md create mode 100644 incubator/n8n/0.0.1/Chart.lock create mode 100644 incubator/n8n/0.0.1/Chart.yaml create mode 100644 incubator/n8n/0.0.1/README.md create mode 100644 incubator/n8n/0.0.1/app-readme.md create mode 100644 incubator/n8n/0.0.1/charts/common-8.14.2.tgz create mode 100644 incubator/n8n/0.0.1/charts/postgresql-6.0.58.tgz create mode 100644 incubator/n8n/0.0.1/charts/redis-1.0.63.tgz create mode 100644 incubator/n8n/0.0.1/helm-values.md create mode 100644 incubator/n8n/0.0.1/ix_values.yaml create mode 100644 incubator/n8n/0.0.1/questions.yaml create mode 100644 incubator/n8n/0.0.1/security.md create mode 100644 incubator/n8n/0.0.1/templates/_configmap.tpl create mode 100644 incubator/n8n/0.0.1/templates/common.yaml create mode 100644 incubator/n8n/0.0.1/values.yaml create mode 100644 incubator/n8n/item.yaml diff --git a/incubator/n8n/0.0.1/CHANGELOG.md b/incubator/n8n/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..27f949bc254 --- /dev/null +++ b/incubator/n8n/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### n8n-0.0.1 (2022-01-27) + +#### Feat + +* Add n8n ([#1797](https://github.com/truecharts/apps/issues/1797)) + diff --git a/incubator/n8n/0.0.1/CONFIG.md b/incubator/n8n/0.0.1/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/incubator/n8n/0.0.1/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/incubator/n8n/0.0.1/Chart.lock b/incubator/n8n/0.0.1/Chart.lock new file mode 100644 index 00000000000..e3f1cc52051 --- /dev/null +++ b/incubator/n8n/0.0.1/Chart.lock @@ -0,0 +1,12 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.14.2 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.58 +- name: redis + repository: https://truecharts.org + version: 1.0.63 +digest: sha256:e41f7ea9203768b04adca367d6fba3dca20224666c88824b364d9d4a9d56c6bf +generated: "2022-01-27T22:41:46.685595625Z" diff --git a/incubator/n8n/0.0.1/Chart.yaml b/incubator/n8n/0.0.1/Chart.yaml new file mode 100644 index 00000000000..9e85e6623fc --- /dev/null +++ b/incubator/n8n/0.0.1/Chart.yaml @@ -0,0 +1,36 @@ +apiVersion: v2 +appVersion: "0.160.0" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.14.2 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.58 +- condition: redis.enabled + name: redis + repository: https://truecharts.org + version: 1.0.63 +description: n8n is an extendable workflow automation tool. +home: https://github.com/truecharts/apps/tree/master/charts/stable/n8n +icon: https://truecharts.org/_static/img/appicons/n8n-icon.png +keywords: +- workflows +- automation +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: n8n +sources: +- https://docs.n8n.io/ +- https://github.com/n8n-io/n8n +- https://hub.docker.com/r/n8nio/n8n +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/n8n/0.0.1/README.md b/incubator/n8n/0.0.1/README.md new file mode 100644 index 00000000000..11c0c3c8858 --- /dev/null +++ b/incubator/n8n/0.0.1/README.md @@ -0,0 +1,41 @@ +# Introduction + +n8n is an extendable workflow automation tool. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.58 | +| https://truecharts.org | common | 8.14.2 | +| https://truecharts.org | redis | 1.0.63 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/n8n/0.0.1/app-readme.md b/incubator/n8n/0.0.1/app-readme.md new file mode 100644 index 00000000000..cc7738c7591 --- /dev/null +++ b/incubator/n8n/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +n8n is an extendable workflow automation tool. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/n8n/0.0.1/charts/common-8.14.2.tgz b/incubator/n8n/0.0.1/charts/common-8.14.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..8e9f52707c284d237f7707f5b1a60556c6374148 GIT binary patch literal 40699 zcmV)iK%&1NiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UI68mpQ{cy>Z`-}r)3TgsH*?qRq`Pw_aeQJYefKvz zCxJ-F!k8l21SCh}&Ue2D?*~Cj@~a2ogrFZML z{LcMB9$4Uys3bVg#$Y*U!J^PVQ%Dh^tpt&{#0BN=epqBN`wOIaQo?ctrg;g@%LU>D zL|U_aj>cd{X+g%_?ggf^#iSGG^DZqHDCT9luqa5EmI!s{kWf^1<$FPjEgZ9k6bQJ4 z6qckTKrIL=<2<7%qa5m@dpH{QdWQ!GtxL4J%FBd|TWw$(Yqb@oZT_Ow2C|vU#RTcD ze*4!K{Z4<>>9u>`w&oCL6ygk(92lBIoQ?s`rulyxz@5CjXaSHx)?aG?09cf%LEoz& zic1XWsz76fUTdjvdDiI8(&A(j#OPDSYxhDqDxc>XSgW<5}um8ir;p6&$i027t zx52vtWgkyZ04Y$6r#J?2o=x$^qJ(U%x1NCiPS6xCQpyUSAp|BU&97Q{fwE2TVg3=fBs!C)|X);l;vz32T2>`jK~U^*H+fBt+E9JU(jqRi(M z;&j`QR`u!!T0`D&oK^Ytu$)mIbcUUQ8s7e4AN8Ikagy|tQQUhznNFV%pU3-$F&a*X zhXR{lWBE@@zQT?>~PwnnE}j>>rEhx9jalhHKZKOFV@`;&OsPxgli z9PIbvVQ&D3&khbYXuE!NkJ2l+B63{gJV6ANOH^(8)`0OCarK-(uMa3{JaE7)WX;G_wl#c||4F_02TL;G()_txls&O6mo*(Q#AHvB5 zqUXIs^n5t!PY2UvfCdQ~#lz{K*M|p_=ZC%F!QuX3xF5r3Xwn}glV@=_mg2C^@fuH8YcZ`{Xy^G z*<>)9^rn;Pu=jj2I*8Hp{ewaBEI#ZHr_=rYX*?P|e>U2v`Avtqb&=*1n3^#{6u=DR zOH`IPL41QISUj5IFCd@tU(-dJvdxIx!n~8E9Vo0E$|x=oF9Q-Z#Tn)k2Q&b?CMIXc zM{iz@!4#$hwOVYaR_1AnN(~ofaFQaqVAa=73&;=2nD51F zB>SZz?CQ2!z^?TM6FLTe|A&Atw~8d6BRTL-004a7CEoHsZCq}T!5CbBt?69~Cn((p ztf+9?KHaccyCWxy`2>}WkP}33i4suc2@%Ub#W5sf&~G51MR8HW1OY-zNYTZL7yThG z!Ap${*<*dciRg)-t@kJ{5u^z0NRG7&V3vUQd79$v;zN-@D(RBJI+MLQLqTBgvX>}D z6jebO@B-LNJ`@ZLz!zCwvZaFw`=;<`ORKa&uoqVM%@}(v&EXfY$lwyoM4GwXh>P1XDE8DZ}~Q_q8lp3Op{Xz!^$WO!E@JG|jIFXTS)O6)13giL(m; zL4v1KRGN)rf@8V|@Vv-N3NxyCHfN{c#}BVXXB6Zyi1_cQB^y>uSkn4@4zpy3>}ohl z$g*X?4O=Z)h%e;;3|L-}hT812RrM%IL=Bv276WLmAT9Ws0&MyxD+R67dIC;MJclJt zSAhhmwL4fKW>2u(0KjkYN&n z9-LE1XJA3tG|o^u2TNFDR)O%61*Eev__q6Pr55rauMx)Ls2of%GI)@a;FiltB0@4{`3=wBcl_0!-yql1QQPHuPrFc;EZ#;$`YWkyg+o!2+4>6De&hwd#~j# zc)~^R9DZ@%^?Dl0@#%*T6sP!Ke6CMX8KaCcM$HO7Gv(f*d0ws>i;7+!3$e_0emF)j zj`KxEYj+m1*pVpaZ7i@g8Bjq45+oqAe32$#f`HHj*e+E3rKdqcvuK&IL6{_p8+tGU z+M0rKK9gFvWK}*kGzSYJHICO)kmZy!Sf)@&MFkVCOYZ?F0AZpyAW9_Hv3CN1qIr=* ziu9>Q6uCnT!Ew4E6qWDuRH!c2@9%Mz;OwGy;L8b&^>Dx96h@e8E~$`kTsDATAx~S? zJF2o53j~`l^UGe~wF+u&?Fzfv7z@=A7oL2(EmCGws<4_+e81qsAL?YuJ~@`(o+Zi0I z5pg*<5t@S{FBYj_;e_pDsZc2xy~rzwIbo9W>(_5vPr$J*(vnkxvgHqDKG(ki z=yWaxTiUUVdb#@rh7$UShfeaSDmpf*WH2Ws;N=_e2aEssZO!h=L>|N>=9Jv(!j_z$Kw<$^0bher{Pn{4JOf z-H}~A0(k1Qjftqp*;`c8Qm7VFz&kCCC?7q$y0X0#a)bNw$I2oD#{h zz#OhXiAbI<5y(iI=a-8DU_ur`v11!u@Hf5G7}P~UI4(j`G1AxEPY4}Bn!J^k;9qjr z9Q7l)D-Z{4O7ao}%Xo%tML_6TU8!Snv|YPPkVkVuSCXEw=fD5GMALu#W2b>>#CaB@ zf|9PP*Os~*&Mw%;j4>07kC3)3*nJ}84$dyxbcWRH-Ifp!XX57@oLv%^V2)wNRFwrm zT%%z$NKm}s>n_hI`a(M~EZ_vEn6kZOzMuprdJFgChu3UoTvL@;bH`RSHXBKq7jleY zVq58qg3QfjvUMPv*Lw1)Fk+m!*l|b)W{Or=_-0k9D`$vNV>TI|h;GbhcnlHw_fS8wSusC}SH_wlFdOi%?k7MbR!;^Q61m zwjSgssV4%91d#6C3Cqle&cc zNa))Tx;knoDCUpS*)t0gp6=(xzZTMs_BkbI9;z(omTG+m_W>VdH5 zxbs#|EAqnMFI#&b#iq78>?6upBfURD`|&k^j{+#jJrzt6alXOOl%8993&*yS1kZ5_ zOLc&aJabm0nTx{QdU+A zM9bCBZ~>;QDCUd<+HOnSLS)c*eYza(vHy}mLuE3` zVyGKUiBj_nYhBA;3$;pX`0E-T%g163gSFt?kjIJ>T zaV^#ln#XzCvA&%x3J$|^2KdZ&8K3vWzh~@^^W#&gMtyjB`q{27HYDtm+?o{dDg%)1 zZ;XdqmVgUH4d3S;BaDm8{+igvT7Z*ClPHH5{Hh8uG4sdp~jH>WBm0 zYjH|HL%=##;$J%M?0z<&KeHK=;ZG=$n;UByw1mT%j#Lm9U~9*NGeQweKt8qFVWmG8 zya_%V9X7+#<${e+BA1?W*dSu+Y+=ebSq685wNDRDG^3Pi($zpIRkjr5v!tY-BTJ9W*OVVLGm;h0=kEG4J(SA-C1nb1?DQVq6lqr~Uo?A1$lZT4hz1 z*+g44MQ^9BN;viEs&e<*TwPT|;ILEeQP;>zmGAm3^;PXI7v`m^m3!A$_24!stopP( zS5ZDN(@s@jj*}$4f+e!Y^9TF|C2!dm#6MN=oa^atPk-0`+aZHnc9 za__QD7~K=KjUl!V5>K-9TtDGR|^Bja0NH4F6&lsX+awobcEo zj+A?5uH+^6GPd*|5p>1nZCkoCcG5hCsnJ<{qzXu91}O%>Xrt_t*?$$k(BoHcg3zkqV!YzSn#g0l7PvJ_B)OT8v7Hr`+1DnGE1jT*s)S&RLdA z{@Q;$M8v+jSuk25l#OtMBK$#myUC~`nAvQF^#KXzFec^%_6*KEUu2XC*$-#mg9Hf= z{#$9)7PeK*TC`BBSZ~(T`$EoZJ&2)pD&9cvx60mB@fRSz1v!tvsn`5G|$Ii z0?Q^!yET<TWrQdS}SLY0#9~_cS<5B#^1Yx(tI$cK>cdBIaa9EdE zPCp(?lK&Ihy>+Kky|BFg)~R^aNwN+XHGdCH~T*xWmz>uelIZ~T7_iR}WupKe*x%*!Xolp7n6P=+?qWWJy z@5!Rli=UPJw*9S?p2TixvY_rN5%1qJj6{PRIT4cro&f1$Sv_aKQyZ+Y_w(u~;r>8v z;Su46ks2u>@kV6oUYyRB+ya$q12In|t8kxxN z!3LAZ7ZQsxJJq=M(f+?boPFMNd{8t9R0iw^vR_qrY)#V{k6lR#5+E<|5@mphUWras z>n}2HxS?)mM>L_=w;m4e8?aXp*sR;E(v}wZ-+o-lp>eAch z3W}id5-oTf3qW5m;S?ID5YP9_q)Yc2{hcj5XLn+q^r%9|3^B=JWE{qB}-^2)tWK33st$aKNiz3g!XP#VTk;xc_ z&ysPmf_~ipvEG*`;iD*nO~wqCOkbf_2xS1Kwp)J78s%*US&uAlFTv$*v%exkAsM?W zkKVuu;ioY7xqeqv4j5$SD8UPEy^KVrjL1kc2zw=ck8g^L?Ka@Jd|3c#9_q_FwV#Gd!DT0(OlM9)jLXO8C z=TI@slcxs z4#D)$yvTV5d^t9aGtElhaGL47_#IBLoZUa)+G(k~a;BVBAx7dj7& z%$1N&0W>?(xlBoOyQyd3n2Omv^{iAoLCZChuW++Bt!(elHDYN|U}dTszK%W=k>rw~ zrKQ-a<3+w1DNs4bgz&w+h)sxR`Bf(Jc+BRxAP0izsVP|5I0kmpQg7dIFRcRz*tC3B zn1A-^K8n~jc)ogR_vg&cV4$j=uL^EGVcUp!hT==*eoxDl+?BhyDy-NRg*vBl0@o#j_aR=A-4hLkHTJ{u6QG7a69fJKk*o{SaTM`HfX zh*?HK85*v&H1mS(xk}pCKz5d8@ege3v-*2~2EUiwOeIWmVkSOHkOhjlmFE_=2*q23 z%|ZNP9dOQ3v~_r_Ujb$55(bLlpl5v&R`~gI{dCL3OPkHLD7=26W$PQxvJdrf zhU*wqVi=TmhU8;3x9zglcsi`(@bECm>*Q>S)7R=`@%P4?=n}2QU_nr+51)Yc$(gU( z7iGREy7N_A7iq0Ad0Y1$NGdajfuAi;3!Ei*iIW9P+00z3MB+RH3ZXEIQKuzFm>bVk zk~<<3mGLuco^#CJIkLC>rELU`94m0dzYEJP-#R^c0^XH?9~*!a6KbVcW}B}?QEA0` zt_bK%#bnA;jd|bsk+_+* z{}P<~uU={&$_Ihwsf;)wcQ9uhCZ8VzmydyN#7nQr^z)+>LxQy9i`3dsMoTQ-b`g!c z!k>+eR#7mv|N2xpLW)8vKo-n-WYs8D5fY(+p<+#W${5_EN1I=Xq> z0#Crt2rS5gr`Ru1oX_VdOStcWl_tVu_K-D&<8=;F1eY?*f#(ZgBp>5^K^WwCmSf9P zh{=$S$T9#^k^`JES->MaW{lwz;Y&n7xyaZS+RCLT({iSm(iAb!8j(Ff7V(TV{uXDL zO>ajX3MaWf7gqhSsx30nS22pyJWcZ}o^1LFNEy4>12FmLf>7Z|4++Q+HX`hP_^IE{%(Gey7v3A2H8&BWBSm z+V=_`^xk5V=}g|YD*dqJ2`m8wEl~+mwlvyo6ReV=iKA|v&nn^P`O@d1(bozliO&4n z*s}KU`gnRGo9}?vbc3dWykCY#y5MY@?@5b5zM$am`J!Z-d?FU}xXV{>=kgh8L)xC@ zbG|yd`J!x_EY<4T-L|?WR}M$_iM|uEy)3e@VaUqZ+X7%&*r7qTuFU$$FK!B5+9Vx1 z_Vk^ac?sz%Y?!*JXmhVfErdFy?9SkY*;;Bp{!v9g(&x#BX zoS+z5*J4;!Exsdg%vo|L#(E|0)R~GKc(k(-$5?LnmW~lZWqtlVBkcGi0`SCkNJQDv zm`JMkoPdf~p-E_;aKx*QpK@EoDSV>Wu-L7M(m&u-JM>r2G=qm2H?jgd2N}yEWB=YA3_Z<3QHn;K$xwh|o?}>aj9)&c z%`@#bTxkB%23ek2T);=b`VvWZ+HPk_Sc_3j0uQ;(0UZ4qq)?*H{JyCYFCj(X?CdATH`c087nnM#(|dTu>nb=329Tcbe0Q!D z9$w{pNYH55Mj0Ey#IM~Ex!@-`zi&XTGp00h_gKESlWkriwoAW6gwavVR5+C`#A;o% z=Hu{6Il4-_pj?pbO}IBAv#`+V(U*c>i-VQfw-EQTY95ThXPkU03H+>hv4hf?yx~GA zeO?fr%??fC3gbuZ3y98IiR>mI;ta>4cI{;BC3jIus-0e?%DhdXG3XEW2Yu^p2qWO+ z>`*xlCAKCPh1HH#;K`GF$x6WimuNa}y078}St*>nme1=t_;dxwG!tdt8CI>>bP zf-MNaSk~);sKGX2)Lvwk7lRArtvX`rI!zI^fjC)KI~4QE8S1tnueCw1Dw=aUolIYp zZxk}4lco8EF#C`hE_8Z0&@cs?!^_%<>^AC(TTxW}O9aYY0=R${%2@OEja$(C}q`8U? z(m~@=$zc_`-*s4l;C@|p+`1g1x81tP5GAu*gk!07QRWLq0{nHR??mAjlw4st<2uJ_ zp4{2mP&hQL4UOl0Y$G)AyIdR^=#3VKu6@5Yh9^&2GCM9YM{goIFps@qN||VqVKC(; z+>ENEE(t17##AYWDlj+V>jJCF-32vauexsVLQ@rWq_wYP5|=0;k)rw7z3GML z5Q3Sw##u0XPFGn@kqpWF@czx2yp+?D2y6;oe$R+^QKr^`+k2E?vVFHoR&BE$@uCmg zsX3$TWU_s?WW~)oCJR4Q*Z%S+e*|am>gzm zUeEt`us=HZOMlou+&>uf2m7PH^aj1baQ`o$cgKAVJ`1*C|4Z-IZTX%1gFM&Q-S1kQ zbL-Rxd?O)GD<|m!6(yE;($CD@(nT&ZRSDvd9!@eh5Zj@vJCe;s!>$g|X?@rI`n7d^ zt-X9AQJ^y`UA!JYV%sS> z3IJHRhbBslEcjL17VNR+0GuntYoJ(VEKq$3z`k$14uC0R0oa!S5G`?R4|AC4ny)Zd z!_k(emiO|2TPfG_r`hVtTO*5wej^$ZO%aQQDU zPp0Ln$d#-uge-KNvl(|A%<^`hU+?vX{I~F9wxnN_m3F+db~@63k0ixiO_HTLr1|>jDB218OzV{`$40OLxB$ znR~1gGCSi@B>|lX4&ei28k9#Ce!Cq9lEG18`HA7h8n56R*%c!(N=_d&Pih6>f#@Bd zU;!=yI|+^{n?*f+ev`Z25c-UfpA*@05`m|UdYPq`{Q+6$pW>ZF*Vl$#0{jJK+bf)Tfpig&v&*l`)IO@g2okTrVu6yjX~IivXS}b z7Pb{tf&2bif=GpR$pnlJucZ0^zD)(n;=_3*S>o* zs5clYDe@#RiH}Ocy*&Z>uhZ1tl>)Fv{_hVD4}AGQ>K#7H|A%;PBL6jk+^qtj!ET}f z=)#XGz@I<`C_~3LPEC1qqtSRuXbCC0Sh4-A+LTA{ks!b*1Vq=c&lX{pfSn9k@C=aM z%9lJ%adz>cNW^Dr(54WlV23Z1DTq#T3LseWU^iWz-vrJUk+pz!z9GAjX=1lB&Op}} zR4PtguCFb$HXz5+MjZHN2|fnsm!_WXVL}X`|i#F*Xn=!75h)` zu=l9{J;cL}+qV7xwTvxjwElxSB~B7gv+3VlT)Cm;U&T9Ec7OHCv-&IIt+Dyb&z8ks z!3o*>6P019YRMOBLry)Ajxk@V58N)lsX=4);L?VB0@_4K*z zZEE;8)q&fxoKD6@zwCjhG_|I{A3|DX@puY4`uZ#TqwJS+gfe~sc7RgEzFD@vSw!%U_7m(IH<`5D&pRPv73noF@A1{;_g zu&4HR{K-sB1qrdnUAING#w#nH11k|>o1*ax5Jj8dUTxFEo-@4}B!5FIQ!!FQxNCZ+ zCd2EUMCgUbuh#ZNot(=0j^n0=d5Kme(1l-RByAPA3*g_?MXaj-$xxlsJjL=b{LhCpHTbC7b3gC_j8bNP(Nt}gqIVel4)zU^#^YI|Aa$(dzJXzZ+2w#I0; zro5=ZaF?6mTFafq22-M~Clxct?Tj3@%wF4d_76|XVq4|VFYC)2WtG=7U&t8zJ(3b2 z`iI@!O(CNOz^@eCn*f$5x0@PJnC}78)@DMoW+_=4C8VRujV7?ZRvXaV(1ol;bDQ>_ zWnpW4w?2lqYt=V_jVI{no7^=c*abU6OJc*bTj^+C2CH?frO!ds z6?yfgU#;-8Jo0Xvxt_MEJifW~GIx)k8+LddQ80nq&U6lBKK@Yfim3zlyyg+4%kJ zkFxDiwmr(WO*zw}YXC zxc%=8#d(&%a%BgBGM1_g`DqRld3!qb(wf(r{H!oZ=P+0tHp@H4DJnCVzRoBrr#v~l zbqZX2%vh}!fex@%WDhujo-zwmAfGOt)|@}v;qg4Jd&eXpw2hOX&P9itLrop+aTs7b z21An%z7aDv$SNCpZ&_rU;pJz&+hW*M)y)S@)z}O*Kk?WWsHv)( zqo!)CLGAkmP7@OmIEO_uS(|XVPCXGDpeDk)IZSyOyCKijsA!(3@+gk;MMk}{(~uis zXrLU+r+2pzh&-oWOMCE;u?tp4K~xHvTB{8@VMGn>nR2&j&bqrP0?jQtMH}06z|=dI z`p5`h(i&8E{eyN+I2HP>U|mjNTt}Cc!aQ})hGix7ZCqYk`)fJ9MYA%MuVI0K=7p0& z6Y=9^?NXW?O;OOx0 zf+_MByV8}9SCjb$d8aGJAgf)=hmaxH_N@UNVx|1X(f-wzd^a!QI<{`hyWZQ&YAFh| zyQ%M=7+Hs%`CD!OaQOO9PhFaP_W85+Ku$Z#RA4<1E41#p5h)*G!qGNG1Y>1^%(j z7e&L!w^UM4d);j961Nb{Va$(Q1-vuI_P~)`1Jt!voY>O{%z>OZ7JZLW1PSV#sMi(M zqi%2&uBJ?2TnDw9%pcElxGMj}&iF1hfHm^JchDR8^8c_me3btW@ksfPz**o9dnv^0 zMYXb`1cb5X*#huy!>2{G^t%H7vOrYc~HJE=?R_ zT}PBn(SB!&B-aJ|HPE6T?6-y(E5UvmhkJ_kvrw-z*%a!h>e-=w-jM!wp?i zd1~c96dSF(Py^QK|A&?HpV4stG5^Qg5dr^ zN#}~_tZXE9>oCb~f7eRDnBX;1vDpM|JsTz7y5kKtAZT^scVt4os|-=Re{o)Jn(=Q$Q2up$P1NkWUhu$mk-?Coqk`(~2kSpT!jan>-c$UpU8itze1n zCoA^hCOd+4`v0Ks<$oOX2gAqsp9gt_{;yPjnyXvgykMC;YpHAB)DrFjoXNC6$XM}f zu7A70OO&m@`>hf+6Yv76kH=BAzV3J6s3;ge5Ze#a6LagkG~vS};VKABkJTrg?(tgQ z5+!Q{?uGU7?dZ}%dQHoG&PAjXhGM~V?3>yiZ1uE?T*Mn~+k;dASTU@2zXPu&?&46R zNb}X-&`KWqN~!#$sT1HbAt8tQ>Hr?Q?9>1r;;FL(N6 ziLE*y{MycRKINKOl%SiZ&~{Xo!7!I-r4Lgi4b=93>gb&o#!l@as=EJMV=LrD-H$AV~@U*Jh z>LLrayWMQ4gcO_3MqL8Q>tK4@wQ%YNvoYOlWi}*)?swoNqNtoRp3WoH#NE%%IqCny zW2((@sUV|etn4^e8dbZQO)R`^59BFpXcL+gG2iwFj-w4v?kzs;fv2;aP&;?9gw9@* z+B3c#v7_LXI|ZaO0(!d^bxLX#ebM6)F+3vOncbR$v`yE-+Vs9nYr#tHdyBPD_xEqD z2mQM~8|wd3zqr|fz&ih*!^4rU|Mz>3`u~GG`uxvP5paTH=&8#*=_f&D<3V7PM$DGE zyz*XuZ{ayNCPa?GPYqQrE?^lkKoCrBz6*%A3bP&o!Y^;5b{_gW}hj$4*^K-uyQCToO_D&!lVRc&EH z(!cnoNfd5d<|3!Cj4{_v8X9e~j!yac2{$|8>54bi71gJCY0Vix*%Fs| z#xJm0!V)u0B&s{83`GtE$3)eULwUIeo-X-7R{MS#=P*f$ z6tk_?z)>s8oaS+!j=}lyX$zJY#HN#a(5xgsyb`&#!d+^EsNLq80sHe-s7A7-S^zSw z?n_+SHok7;M1)k7Gs~1KHYsn}zD8P|X^H3Dh-ZHiez%sdZ6`2~B5hMWvKN?|ZQQ2i zzJ~;jhMSf?(>}w7B=x>d915r{+!%DrJg40bA+s({K9vLtJNRNEKFfF44KX%VY_zGC zM|0SA+b!Leh1Ru^{J&*Lz#94A?;m>izYlu*hx?E6{~;bN|KAlT`*?Z+;u0~k!7wG# z%tEyE7b(BDkp2~;Q2PN^@=b#gv;#!b8DQI9>~|NJ(75M!2cr_MAlS$nndQRp<%-k> zk{d&mL%&u8KW_PcXU|6bUkK{^bWc1pgkV6&&NX*@{&zBjSMvt$pl<~Utud*<6{ZHmPy)XT5IP6!} z|LF1l?+1Cb{-<+%i}~Kt=Bv|uTgj~J7jP&kc&*9ym_vLEi<`%3wN-?@xh(*9#^f7)XE7`Fe|JKDRq|Af?>d$#|WvDrG}PjAcXWBp8#jrwe^tg3WW zf^j-(UT+=j=UXOjAN8mEvAnNPKTp!%d%)j~cdzUD|1F(=Hn9Ki4=Ve=-rzC*<3XNA z{~tlTcjWjJTy$-I_$Cc}x3KFy>Wepg>em0V$hx2SU6S{n|FPd2^!)sfgVDj``hSS0 zPXCivkv^pA$FC!`w7zYwIlb0bQAT-zGI6u%jW0$uAV63_(T!c<5?w4{d8>O^Z6JXL zTN`N{%OX>{MgSA>=?9$3OxORe=I+PGdz$#aTn61wf=usi|KC3x`ug8s_;~-@f9Tk96g5?&JqqKgGO${^7{y|NZ{KgS_3Z|v5hcPEim3r z62f3)sy|iVk@Vq{RZ{GrU}!dF4)aq^N-u>NLF&nByQ zyoG$#AHwo_u>Ew5L8C)vutZ5m7gWP2kP%<&14TWXhcivuQd051V9JiFxrx66E1Tja z$`B!^Wj^5zIWIPKd1$X`<=z}BHq!s@H~&X()E`v*zaR7eKFo6u`9J)^?;boAl;r?JSW?unI6Sng)*_E#_&4N(^VKHQv|*1xt(-_ioOcKwg4 z{=bj@KM(WN+5di4bAKlmK*=(i`G$2261MIcoNj5~(rPS0IjqCjP`x`-ya@4`u{)3qvgL@T(`9V1y_%;0qM^nE0F%U#t!6_+r$#& zRoTWCbTE46S%buzTib)orsV9^>CyY6^LOtZi@|?Jk0zt4$>H*d~Ju%<6dFD=RGl<5PLUMJ{`**U^+}~5t|75!VyNLT& z&pQ8)!~Fx#|L?Fjc-;Rz$kTZLEA(!Eg{gAFe+!E{z57*NGU25UkSuq)NKVfy&(`|iYk6_p zeQ1CBim|)U{Uoq0H9z}ayj$yi{v~_A1Fg>*kns#cT*_KpD#${?h)2^{EcZZbkRjOa^~J$y=NxDY}BC z;0RF|Hxa@8gI__dTTe^z0E=7V1)xfs4wGOlI+xIM=v72tIF`pfzzOodIZal|`h!=& zF1lPyP?;f$NL(fn*mZF-*8L69(Wu#slwp;11zgY8J&9h=Wstu zDp57HG_9oT)Lf6I*45C}ssOYBzr@%i*0g}=%JQOPLr8!pPNM}It*7p22iS?tQw>ZK z!xSAOb$ucLmHSOR_GbUTr?^Hm6;~WHh8^KAG2(Y9hZ-~6_4jCr*@6vnT|5OHgHA1q zd z0Ixt$zq(H=_91PzU9C|_R~f2D(xg@GIS`RRPEr^9d?Nb#pmtr5}!F<6(5NzI|c{Yi(2hkku{0 z?X2j3+^63DS1jYZNdB_P{og$=|6l)Lbntlp!-G6q+y73L69^S~pN>UAJcn z*{U&1eQ9jc9|Y4IZQ#gDM>+6X4Hq-e*yc;@n}Q_gpEHLyRjN6Aobpn)T_Or`w&kg= z)kRrfZB}L|op;Ert6YED1$Quw#^4g6B9v(V_S=yrE%JtU9jx6wZoNT*af}Fgn-YX!T)j^c>etP zk2vx-h?Rkopaf%zzzz^LREuXsX4zh(`2?mBcxu}#ERqq$xrrM|sAyp6>7x0zc>`uye`#2>r6jlN})B5O1Ndl+tO zR`po9FBFwb^u9L<$cl<_t#b?RIOE$X%ADqLp1M=93!^!L-?4s)k)$SVTxX zLu{O8loljpVO+18+{jS6lb1qMRpb^Orwc++`T8{41v?^LmHN0V<*2wbUl*)SN31@H z^7^MESG_{l*LFGxW$bfMQ(i?Ud=XoyaO#q!_-ka9bgkXihw33lu(j8x(VCKPa+rJ% zQ<%l5Y{ttcTdSfP2lt(We5iPnDOz>*yoA#!j!le}86f9VaHIm2o7%K-JmXs7dzf9Q zhZtF!`>2|T0q?pW3a>}+5tD_`g{7{iZ-B)LHn?W=+j*B1Q9H%Rr ze%*KOc~78t^T^2>SRrG6`_s2>*ti7tP8yi>+_Mb$j!bv@%U;>H_;KsFV~6e7##nK` zn`@};n3tApduj(DI<09z=ziphaTtSi3vuxn@q_7_k7u=C&yP>7V{!F<49<^FTOr%E zDPcMvK-ND13PNz&Fcpkm6BwTzu2ecg;v`SFU7U$kVILB*l_QtQkGs3Nlj@b#1@+33 z`C)5AXh8@^feh8k)7`qyOaSgmE|sE~=H)oV+r+1uRpNe@+@#)ek*g zE0A@k4Qn)kTJ`r;mWUJfyHekg)GSj+H{&8G%azh#@tQ5UO%uNnO^0}n zVJ6Rd_MuPx8VVoH{;5xe*4lqQi7nb~tU&AH|Mn~X--n08{YU%HLplLReMJ_b_+pINYJ##2!4aYn_+HZCEgY zdQa?{%>O;GlcLOpwQDmEp8Q}(8D&m#!Th+TOd-gISDB&yH~NPBZ}fj6?T*0sb-lxC zi3nqC!pU*nn7JMH#>{n^W;G%;S-V<^5j5cqsKnug9Kvk|kf|c7zGHyXFfY-Hc!>WB zrnn@u-gnvpcqg{;e}|{a|5dCi>2lT&Z*lRTeAe*);o;$+690Yh82|GiPl$u-z<)9S zkuiB&$sEKtP)*YziN;dWuJ1TLq{;mJa6uB+Dx5~x{uA`25=6AaxtRY}@-Yhv_u6B; z{3+XPeZoa#`Y1a$9PV5FmYYgeh1+he@{rE>`>uH>8}>ly<9gl)XIIbO_*(Y0?N549 z`d*-l2-xfMBDM8xrfKsYz5qMMOOX|NTI+4e%ZFij-~0`lSK1xY8b>gNe8u4oeIHmhR9M!0mRswS96B0o3zl+UCr* z;=)ztX(|msCCrkew3xw@#T*>ijy4Jj&!p>EbG7Ha7-z>#$F)a!-<0>b7)IyYqD(8% z4&!e3o8|bMrSQ#DD2PS{cmZg4eX6hOwy2{2r+CthQAxX>*niJ%m-$;f>->NF1Kkx|M?(KNdHGAb&_{0ZxKgI9W>xf1ZE+Jzv>QAH-V8k#x0|)<_$j#}%b31=7b&^ZF`#v(^Ig}|XuHvk zID(=RrZ<)FtKFbqm2`ip?AaJu!X?D1h%jd&M&6=ruC!E`{crXS`QI!8QM=vdl6LFl z^G}_CulDsdsK$!f$0=KhCE*+3`sUD-Xt6_6(ut)62@eE6n~wj6R$?H21vEdSCC)BP zetAc*Fo>6E)daD`OGweCAg>=HJN4sp-_IKPe;4V0*5?22AB-yZKR@38`7n<<|0ywA zBEZ;bcM9c}mk|J-;uul{Fp){C79~pR4}Ux!Z8^MdAj<+?zdMX|&KHEfM5s8p>?Hq0Q^ixqHf--8n|J(MKQT-6(>GMhF zV5H?vgJAC960Jb)Ohfa)TQcEyHafF13U>knVY8a7J}*|RdGe6F*} zbG5FqXKQ-&RHDR*)I~T6^!+&R5Zt{ckGd@@-$gUE+V$} z8kpOoa`=0G!usC~G6m2wo!zJZPj57+_8*lQ%x) z!Va3CtW&%6g9*?s4Jg|^P5I+?j_pcTyB*cOTB#NwFK*FOe1YY|2#cc3ixM;C#n}D0 zyPcoCcB@|5Y28exM0ji@Sq{!FI*cKSOwz7>o1pm;mB;zK;Q9CdtKaEAj{?@XwIkYb zQ#nWsCWu0($>3H~F#H*cFZEy$D%x9ZHykF}XWKjL-K8IfeU;bUD#;iRy z3B=RbY^HO}fOL+ELh*Ng%2Rj|&r2(JXSGUQYKhaObn&kL&1VFt2 zJ32x*@L6pe#3#p>W4AVL#OzAAc;I|bx1u0AZXtoD`FVM{$YLS7wF7^R5_IZE*yQs0Lm%n8YMprqY00$>e3{Uh6K5O{2^7 z7E!E0QEju82;@q%NSyIQsXH?A=439{j3~vmvo*|7>bah+!0M>Qapd1dGc8e(a{v1O zh(Poy+Md6tUioZYs;ozGoG&uUSOVi9%{?JbofB{MT4r0fU`Hecb7oJ`YQ;!UaUtBT zgPOTXB`c(>6C~+)iVXqP8cduB*}Onyx&kp|M4^a8$;>>XWuB&}lxY_ETNF1=_2KTLy*s8 zfe`F=Ls%^Z5G-Me6X3VG^9|XJ>M#m%aP8(+%R4OhmX#c=mXatz zIXf8%(OgiINY}f@S_^{8K$V?*j;Y!4iJE=_^f~KwVrtJ9gz}MKyQ8ZTQ{-c1H|K!T zK7kz&na~P_jnh&{^JsB6-R}S|2#P#8GR_2VFrgx?mHS={y$P4JzrDmU)hSg>DS5?< zj@PR+V*xa7jseg@aTb$oRWcEo3MZIlIUifzv2e@57DAZl`E<)WLoM6ftr=HgM0bW% zysC_*c)ig;TDoOw;Ma|%1$g6OOyQ(Dij`)4@C{>VRR)nd!f}T&g_GbYnwmi(4Sse< zH&|rbk%pU)ZhcFe4ZW!!Cgd+vC$NUTU5wUDkWcOYm%3@WAKDMX-*z50T?xU) z8ktI96*$exu@+g33{Nqa0GM&+7gmVNMC1sIg^bGTm|h32Hm7J_bI}QJqiO+kazCV) zP;Oq@QJ0`upuT`5&EjM)MSam3|9sUQ!vrny`r%tM zNEVPa<0DG`&PT|QOh9~Em(^%sfoM-7FYTKuY%Y&VMb)5=s>7N{@VmoKHm7N8S?a-d zlh3H32(;PAqy(&uBt--C%~%wj7d+RR-(*b}TzSH4H{lS(nU86$r0^Qk%5N2Sophp> z2r6om|LMV|egn}Yz^v88f-r9|*Ul{fKDv&$s?72l(Ih80q@Fn~Y%sOX#7YM|Go30k zl`X7rc5x$NWdr|x3o6ya4cIV4sKSQTsA)h=ELawHW>JR*`72Kr4zk|rw{6y*!g;fG zS8eOA*li8uyJNMofe@RmY5N8&)@o#X_No?&$6B4&_dd0E#!jp7?u3;}umLt&ZE!ml zY9MdUK40;1{pQ4V;g&F86SVxX?%PGNsD4ve7YoX! zt!$%=qLNLs)dSfa&VoItndu@=&b-MEj7qp;FK!COqu!&UU~l+Ed8|_xdMW}ywj*Ry zFf{sV>Oj8-20bvSCd0ouiacog$I}n%R+=gnq5z5Ca0vRn!&=bMYEQZu2ac9!4;j=JpShH2y08tgW$i|~x(F~<~gpo!nFRNq5$V(a! z85@Ww8@zKc5E4_rQ?1eTe!br4Dv_jIR+UIKz!uylHB#S@XGt?!X3c=hwN4M_}SI|Eis0yAhPyBnBJM#9$p!3~oymgE~rZlpgO^9RaGcX>6hn zspRl7o)w>GrLTzR`X8Ex;DY9JNO26)bj4daK05t$^6LE4_peW0emZ;g{^RT8S5A2?*SHL1;d&{mgk^?bl?L!8wj=zpJKSmU+?CcFlLyc+F?idbmJ?M&|^+!6d2a z@rxS(@N=wg1R-G^sOk8INVp*Cu+T$Z*L{Z`UTj=%i}t*}x2wXa zSx)FFq%$|ecZVQ)ipn|W_cxL=4yy)`TQpi%x5AAT291pvG;7P>Xq~$ACT>taP9dJ3 zEAO_4oWP9{t;mTrxQVe^gIFN3`bHRDKSq20TRma_Pwn^6{lqo`h2a356`XJD4!Xww zdw<`*|9{Xw96jcLd61{^{(m|{V3ID7h|!qlC4V!|7nv;-z(4Z|pfkvggykY@P0%zi zRh$$LE>DHIxZ&0~%aO_@I4dz9H;p+b$yIyklyKvgsiY*#TZXlJ&s;pL z&tY2N483OWJ0&V|f@xl^z}K(innD!nTcw>Tk+&`^vLo_=pmGd){DnD?7>jKbe_MCZ zV3)BqI(7Ld(;(H~0JOo;n>Q^0N<{ee-THoGZV6M!>#w#=XTw{Q8QH=t5lyy1)Sck0 zOJq z=2YAV5~v~ryD;I!BfxL_jc55)2HNkz!RXoeVDt=hmqpf9E&L~lXY)K^-!J~-%KZj@ z{S}Bli851&)n$guB9mEy_juItDqpaP&saZCemGkW!O`&>^8fNqilG!K(bx+7vja3pb=22mM3ygt-pU4`=XYcu|98rHpIG$7Pa(UY-l zguM4DmINr4{IbXdT)9Xz=3{qu>ujAapRAoIr%nHgU8mL1sJEQ!xcFzXn7AM13j?51 zB7ps)a$EPT)&FD+I4W-*2h^4qgECD$4 zBb%+jw0b>`fjd^vgcfHphV}Qy@a1dt62AifVzMK-HBJ|4dYY#=UO74q|JEt=MxdBO9k~=bfcx?NyAP+I?iS=-KnpPm-yB{dn7qr<)%!fBOvNNCLebpe zAeAa?>voc7tO}?omS>|+?_V9g{PgbR&HsFQ|L)zn+mEOpgMYFOccW}+ z-6Cr%lrr1AKUlO#6_}@iVcD{6{?`v>KHm%jR?_S~ukD=s@*=grq1AgdHP!g)*Y8bT z>jEm%BL{}C4ETMNkGkQht}a78Sk*qflNDoiE2D?F{eB(dcG+zacj~T3+sW>4C)r>1%l3nH$jK=lpllCX^&8J`v3!-WOXk|=ON7DiSAZuG`O`({O zr`6&X@^gM`vgl^pL*Ks@MBY3exl6q85uj8C1#7Z^-OdNg5YmZh9@4|2Wj!TW)-rIH%e z6G8dWwKxOG$}M)>2KtrZ#10=eb%N~IrWFw6`0W~g@3yj*&%1;Z9G04NVhsJw`n%zl z(rKJ~-l$2aWGy$FS?OEXk%^VU`ZMQ@)!gR>ifs!tz$68S424!Jb*gj|(q%qDVXU=l zV)wfi5cxmEanE_VKqp6M;OzM5%`2eN)FgnrSZC8*bdr^&du{}p+1+YCVK?0@~xl8*AIKMHw;XApOI!kT^wLt)`|I7M$aBK`1JJz$KwSV>noEl&HM@$8U6+Q3P@g3e%sovXKpa3TNbFNGaFaLPlNRFj`?e(hI{&)Bz%hj>tsW)Ks}vErzB^B zJ9j^WjppDc%*{jwKW{&sAuyXQ*9}cnzI95zH9DkeXJh^UD8-NnMb7$p`+ZZECrDqk z_4RAZ{(XDsaLPBteC?{gZx5B`MV{sttFxj+FgeaMLQ9CH3tjEUyJ$B>rAd}!{oE4v zpU@Ka@A+(C|10S&bAYdj|L7kMEBF5%3?A?QdXR^o0G#spV{PzL_uM!JzYWZN{D{QL zE2J|Sq;7hLaQK^d_mK8|cCQR_MSdaUuw?{wgE;3U9Z6m(EMSN{;4%@7d?#wRw>{+( zSI3|)tai6#TWt|QqfVf$lpNP8%vkrs>MZZYQynDk50L9vX`NbM8>a+2uzRQCQD;6{ zM=tJ7EAJMi2nK%Jc9r8 zIR?U)8s`~E^9vkr#`WbHvyQhbN<4?M(%s;nE4X-=kQ zuv@eRkX29a`Q5@&Zd5l!DI~<8D~cK1cEm}x{3=e5HtJENuEp^1*xd~-;-`Fc&sT-G z*N}4^eJzg^4!p>T6o>3@Cwx&%tj+#Jp^9|%nzLI|pQFgy67)c&qC98f#N@ck%O*vl z75@rA@r@KH4*3cV92x8R(i@jMj|7~Fx8=N#5|5j53+N)~7pGKo^x^znR4E)7IlFbk z@k6b6S0dIxPetAJqBEzksSzD zUfY}Pp%?4nhDb?4<-P$heTh=I(#KfVG_qyf2^0d&!>YhDm2**|^I3_=EKidvY`?^Y zfGM7%d_ikbcE4{3v~W-Je3;JXFvJb_5#c}YM*gqW|7^Fk8)|`T^uNJ=@4(Oh&>KDa z|2)XUx2PY5dAGp=P z7d!KizSdc!@DUB!H-iRRQW+Z+l$uM4ExW5IZy+>)?o^<;=yN^CNx!+1Asa;0j&_AD zz>Bi>BCJj1fykcfpk!g~#8ul-*PS(oAQlW2Z6pe)U)w?v9VqhxUT|ZzDCoak1GSF1 z`hxv>{pGvPWw!Olmdn_Q7^%-kC8=Q+kUl&1?AMAR+LFFr0nj@t^SZ{=ZF5P(wtdNN!w~}B%G#$k+spVwWtCnRM)I_x zS-7Zv!Gz-Mf-`!T&2_&6N9h$@5m1z9ib?=8;1Z)%du~KUb<42krtPPZ6za+aKU*UJ9#X6GCfigp^Vf_oOP*k47yKM!T5( zsa?c%i|!$XvX6Od3q)vM(A7&^y6a25b<(f7nw|}6juO16SPIQyo(30*l2Jf=Zf=3# zf1x*cj{Q@;U?aM4s2%=Ol^uKC4OldX)sf80>Ut5QspIOR-MS(oA}(@L+&|4H|3op> zEKSG7YAUu0@UuK5()-!0nD5gVsVg#e8aDuHTb5y!)|;oGvL$Qmv_1e7zXg37_HRKB zT8YKbh+5+BlXZ1n&9h23QntL!6J5`GHLhkPSqG4fvfc*pA7hIg1HL$;deyjbVS2fN z)lbn{p>%W;L9I8rl0H01sy{dOPL(>>*=zw|=rjz}`kws%?0x%p+cwtV{;a5i9}9(KOw^eGgtF_<$rbj+^O;en>14 zyto&*xG!8>$bE#8fYFI@W@BlMT+5Axrc9=$Q}g)(c|#b0U;`r@f*J}>#qM>3WpP;K z?!kk2AMk0k|ILE|C%>#=ieWgvi2o^a>e_n(d+h)5*sI$A-qf3Zw*MdF(@_6aANr*L zatl5rYmh)n?@1bpC=`lmmU3@_>6JkN3{pZV$dXVn5ehM*+O8C7BUb;RbO=SUnu8Uu znfuC1E=;&O%Pq0Z;4hngasEIE^S%Pn2YR2>NJ`h>O?P52=)na4zzHGo8Q6HeI~<2+ zKpsNutr3GEWRS~Ad5fH}wOKI%^(}J^Cy}JmQvC-h3aO+joF^&TV3Nr^DMIeD1oSsv zAM_;x75ZobgMvr_sINuJe}wZ(NU7Q(*FUC&u=3B69Bp_S7!(`l3es2LDUd#v(ahoR z=O_#`YxKbpcn{{2QHTQLGKZr7LxAzdyC7CO6?&u{jwLvy{tg6I!%<80Qh9@72>B8c z2NK?7YcO`3ho-SnBefc^7#S1?c_2hZ!Z_ z*I>QnbJ>7|eDDYeDBw*fs7D_W327pKpTJ);)cdXRniB;npU=x&AU!oigoK!jsQqBB zl#s|l8B*g=U{01spf9+RgJ{K&9s1y${}}!7mD|wI0gJX{XBNU9yu*O3lL#?X?&}W} z`R&l>i?WRR#}ZctUQO=YzvWKU0sfyp8GaFC)@d7P-}#T>q?Z5Td!NsLJj$oR|I_|m zLPDzV4%M{*K+YOlu!0)|AP7+ew%LgLA?z|m6vgaMBV|9`Pb>M~F#xzP z{^yUX_5X+7lA0h^LSokklevIIsp+fh?{}cj; zLQ{Y40^88}p3t2I-5RuN=PkfC;oUhfn2%Xw6C3@zBZGVC)V+2H4;HXZm(lojJo1Mn zuW`5eu-kWRe7AGZ@KD_C;ln?Gmc60Goig!Z0*Qw}w8auDgWk+44>w>3#M2BH$DpiZ zRILeEVuH$-S_@Du!)n#(>DJSs!L^6!%@$(gJn<2`v<2EePPfhBwogukwx-Jxhx@2Y z{m&SYd)&_f{$Gkh+}-&*;QYVmPO9<0k@q?O`%ylhmj5SM?L%BY0ie*7{5bh*o2+T-sC zXr`W)KTQ1TtfZoiVcw&d^9g%6i(f5;hcWhd0z1IG7Vj%C9gS)^nC*;U1MSxE4>f&1 zqz{|H%Q@-6JF=O%Ejs&bWc}GbjrL#0a70gjQS~nI2bO=@Xa7wm!&?2n(dYV4kMj}d z|2KGjCeMK22ytot)tV1WutI0@Fqo)h*SkV2OJe{5B?|^(5~63iI%;umNU!0}4TF*R zTh!qI@-j+yXxj(S(U(`o>Dr)5Qzj=1m=l}k9UsXu5S&^0=2I2}0v_NT!!sl6v zsPc^x)P_2WO%gC6p&tJe{&&o9`}s&nSdoVTStle$ zG0W#dT#fyjGwmzwXquO18&AaPIfmY`{G9Ru^JJiqJKQ-EB^R;}oZ>;=wuXf9ilFHT z)Di72nu}5Ai&`%{;ewaze&=Fab}0{M)(-AU-`!c4hF6W^k>SsKE~uSY&QCk96Sg%5 z?Wo!`H@RVwICt3`r7>cNI+&c~FP+KLmc;)qI(8eNw6zsT&DYX^y75Wi1`Y zIv!Dyn_Ql$QEP}?)FA63=YQkkwmcyEf~b~y?BP~pNvr)atFcgfkGC4zE7(Evs(ZLK zSG%kEpau8g%dKItbzEu(FSJUR^+ncli5;@Qb}Xp}TTPE+YRH}*z|t^u;lmjk#**G= zXFRt5x6A(*xtSm6`~Qyv>id$2L`iJ{ zDE1Nm^}$nh{jd0XMF=x?vLRbJj5utCWNXl0Mq~~np*D92fN~GH1}t*5bp;G3@6|}; zE?!`8S!u<8c@G%57A5lYmPHYmGod^xJqbWNJqJE`#i)Uda_Ia=s&wd%fz(aZO{IGV zrD&a#DV{vXvMilZm0L|pv3n%nMWI=xNi;F<+4-$>bG-&tyj$QMB2b4=#== zLohtr!3Rmvyt1rv9co=!-m(4J@TgdKx{>^T$RaFZ^?)OYxOD&-pFBtGL8HF1Jr=eAFcfN=znFUe{B8lj{WNW50mlabNB@x-mLfcx?neL=WRH2)o++rV|C4Y1`syWP8 zHq8I%nLX^YYyDG3QgNp30|mf7``;hc?EmTXbN%l}`LwtHP5pf>IRuF7>6>)1W+8E* zN}+&_%2~~BfLVyHa0b9mJzME3zbNHD)B}N}ye-VE1ZY0Y%}J86Br`9Y$+Mzr?el=c zQ}iq75BlXMl28_eRh*f=j^*ec8V32AHFwyVe%~)uB~;-2X;HpShdz?tBGPrVibH z%+ad%t*EcvWY^THc_8)-#jaO>Yp8pv?|NwlQyHowdqXPt5!6cKKg@_)s(d$Hh?Ezn zFh)SubQI2iGOaHSZ+NgVDKga^uXa7&!X*K`HAAPp}ALY|Z|8obH z%CeXll9j5}?Tm#>?)2VLxI|}7))&(zQFZ-$;Ff|4gk(c##HD!B~c_o*l@XP;pd#B+TXzCj`05#A#B$gZ-izV>0*nx8UcO} zQnW!U~k7Td2W2{U;YCyF;X zCGi@?%<26nju!;17)$8c$w^28>dY~V;Tk&uS)b&0<puqF9Y7o zz-Va(-#-nZ^!f8>A0_{t6^hnaBzio2AN%9K)%eeF@_GOFaXwGLC1ebxv52lp4gmKn z6oYw&qmWCb1O|6v2c!1{h?9cq=5Gq<3Plm%zMahZ!SV7Kq$q+6Z;&V|Z~PA9u=fPS zNZsM}G)d6{zeAxcZ1q2n93XBABe8gsqXZI^f(XaR={e7@f4OEPMZG8BT(B(o;rtqe zIHf&jiP?$xSEAo@=Ko4h#J~E7)$)Y@qrcKkd{O|K!{9DUgzlrgFCBWH^uBcF@UHiz z!`A$7lHz6W%m3GV0)Bw0I1hL6`~~efNlN~S0@ibIh~SBAo|1p|oDB^~h)(_;1gKj7 z=P#eV`R>K5@4s`_;e+?Fd;L!)?x^bj4gJsiKacZy0?t=3UZRLB|2j{m)n4%N& zP0w+h5~L&Wbm$I;1J@f2M@K#07srmT*xr}wXfX)ojfo_N#K z$wBB~N;5=Hc>ANHo{eVDMzhzMX17AKXVUCzn!m;GIK=@;Qxq_;#+1Q3aXptv4}ei5 zwzslmnZghO9OK*%M=7<^5d$*u4x1o7AQNx6V?Zn`Y1nxsd9?v?n+L>LNjEotKL*z~&oADHA-K5w7OpX8 zj1nKTTvM)VCEK%+?R6&GbtWaUy*k;AsJPCg85P$#%&c!hrEH0S+``&cBOebZAbHTx`SqmG3$0VX5ET0>z0h!gK3uZsvku# z{;BxsNR2@|@jIE?#jk5KZr#qtty|ICZppZHXBF|g!0$jrmcr|jdzYNVNlOwZyGXRC zRkyQRbt`JsEvZ$vThL%KYDx2G7tI!}>UP$uZbgZ>C9UfE9cgYCD4C4xffCoILENqy zWabQ~6`GX>;p$^BoHZ#`zOqx5ca<}C?yHnwZ90Geh zYd4Jc0DsV#=3#|q-=z7pApoQ60)%r}evu1LS*lOcdl)JOz5Wh*o2>!G0oDg$`XTsB2j`271r%CC0QaS(72e5r4Ywff^7Dh z*V$h4D)yQ;X(Y%#d3@GJr|lNq=ycbjvl&qbTE0z0R*WdmG@@LqAzmSJ+AeH8np(rw z93vZ%ovfyODOTBY)QQk`=HY0%!#wm%Q>pa3f!Mf)*qUq*fKgQJjf1?ZqsVr;IX}OW z*tQG-j6?|FOH~QI89q!AD5p4WdS8MdLNLw}Sr;9Pg)6H+$h!hT!W~oy=9u-q1oLd2 zD0+Kef)ue7FPA7)KY>&prm;@Jq@9mHnoLZOrvhx$l5t0~UBKGem7|fr16WH3el(o! z0@f0E;>ulLo47*tsjq>EQ7e60gBtD?@unfA*0PSRd z@)s+nr)hb*2UwonC7Ojmo5k7L;H)V0!rb%*zBT&u5K`7cpv^ezY@1a~v#~+ou)6O7 zqkFg&K2N|kZHh!8CK!hxML~)<>0|){l(GR;HF-#^2SpA=yG`fO(7Ne7v+RV;x^9Hc zoJ!bhWDZ5uwMZZfR@$1-4q$}iJ7jhLY(cB;F{?7ZzKO3jVo~Nz|Fm7AoquXgw3}J> ztY%%etY%f!GHfJJO^6cc)zi&j$+=LTXGEdS3yrpl`gWGKzbg=HH9ERdUx`S0CiT|f zOm%wOWjpw%)@+BFWvgn|b*JjII=yZqfqI|nVx2@t)4R_KT*J_8kUwT+n#7KvDj0SuJ+WVY)?(f_EeQMaICDRBqek1 z(?xJAMu6cpBAMKfzen&6rGRcJLu*U^?!;mYO}ZLGld>^1DH%id?V*bH8Mo9vW2^R= zSgfZ>SL>&crONZ_cQIqQ$C=Iq2`Jx#h=Pm{8Qo|LR7@4#q<@3)Iq_`WsQ zWnz)Slde*DQkKG#k`yioEK6aTCam{v<@U{nMA;ez5yb1fl!I7>$tL(hi5$PBHuA07 zXkwAXldh6@Tz0}IB}r_IgCTCUzoNIdBDl4=En|yIJ?`pKkIOFgxa3lM^#m0W^#xf1 zM8PFz3)eE;&Tr{T`ofj8@p(%Z-Ip$Ujw!3DxaP5J-ai_5&Cwl~mGIb^m}A+PBQ3Y( zpCyT;yX8>;-+mNeY*D4-uBvogR;A;TDz&GjRwmYM$tCU%E*Z|+NyFi+7Q2<15weh% z2%gBc^3=FG(}&}wZHSw-{J5)@AD6ZKxTNKc-PGKQr$mTP8Sz=8^&F+ZxUfAXgyr|$ z+GuE22xB0;$ zS?`s*&c`L2TAA8n^Gp}A6N7QuPACjdcL;@Mr9bYf^v7kTKQ1Z#hQSag<-$;0xB(*o zBMd1;Qtyip0s<>SnJBklj*T3Lc1mG*YK_~DElPjfRq2na8fW}+yLikqOz zAI|0U^KaXim*s&m2ZC)AMAdM#lz#RD;5~)+v3U>y?A(2BUyZEWu%Jn}qH_NRMIx-1$E6YmWHzFgqTw9jv1`BIlCKejjuh1SwDj|u1 ztoOjZjA;+IPHRWpsRFbQ*I0FJ=9v!HXcm2}K}*DFee}07ICF zy$LRWgzwJ31iDU+7z=OOZoPTa9XU*1%Z&n0ZWJ^{=;dt5qJ@~mVpD=ah89^AQN*mX z(QNSZ2c2ibtIWpGoQ>*U^f^hkpj?sKsqKR@0)iEeLLj@g64Pw3`yF$q#GBQH=QR_f zY%{LV@*3`XQAzz)BZ^zAa@NF>j0szbZ4?TYc!OfOmE^VDM)B<1D84O=%I}y(#owG& zhQ~FBXIh!-|C3P$l9X(4h=3~QDTxnOYZ8J5#Bw_gW{e~#U1NDovmA+WJCDX2TRj@z zlECG6P2lpKiUB(_hoK&?=APXKrd*~dwvZkTOA%a0I7T3xgDj0GfJUWKV zR?2Dlj%hI3kMGpZKuGhA6WcQ4@7W{%wxU~|Yi?CaZuyRBvf0n=RP<)c__=3K#j;h{ z>Re!}QeVq=OjAvq#&1T$W)^j}iYi8te;67zd!V~HP)1{T7#dbh-W83i9zP5Xo5Jj< zFNf7haSuVmR;Q?QnW9RSqG5SbMpiVMC#7@Ypi14KVR=&QXf#hs_i{be(Qpqz!?RU< z=v?rjQtzQW8n#??YZ;%eqv1MUxui;YIBa;hHowm8?AN&!zs@!MI(H@$d@ZOnuNSwo zQ{z^g8rN`Y_Mp-{J#J@{+bx^iu3>WT#-!Qgb-S6oDlXxbEf=@2dpRzrR$Q75SGTL- z>Xr>xw=i5e8WSrT&4#Pn)o`uUzj6!1bvGK#=49vMS8jDuCWoQXYzK9&%~UDP8Om0e;6({InrH>l+hR-hDNid>0DZBg8}^-+uXxj~U~ewqS{;ZuyOU@Cez<(2@&&29 zsOBDlki=gwv0?CZi`Wq$83SaYZb-0_)FcU}osF7l*{GRTjhY%o{QU?qBrewxM;o&^ zqbSU&6Y=|e#i1C^BLqq<79{24VWY6gSekYV5YUC-JNMy+^H%@LUGE}=0 z8l*UBj*m|*_Rh4cy)!M_JJX82(=cgrqhgc9)yy3mzDEgMGDieY3aPb%KB zpwTG;#$Ozj(HQR%!%6&wKp4x3nOZJ;uOzmk`Q=7k7F&s*E zLp{MoNI6jiUIwsN+1$9!f)Dg}FVC;Q8mFn6+HtGHGqdq&b+=TB)-X#V9B|grl1Sgy zD30P)EIQlp+02seR!MpIN;ZjGWzyH25OFR`zET-FlBL}AEZq+x-oHW%C=c6xskXLN zdCUlIx%Ov7E6lvukX&Yz8wM1IDBwiM`Dm3MG852mO% z&J`)QgrG>Pyo79(*J+XZb%7%!5}gqY#bNPWJBz_+Cke)WV{MEyi=WXqBo=oeGGfS} zYPu`a2P;M9a%E!LIT+&|4u;Lv>tyOpDwp9*D;{4_t=MGKD@0kE1xyyb5X>&_zTvXc zNRTats$k_1YpvJrJlD*2oNHpcQD@TmMxBYcU&2`Y6XQyq%CO`rilmIwo*y5+JEa52 z1}mb{CFC%1!rK+}nAxfvD=eES@0wyEUv*2Q`(=N|wbtxZG%`e4k-CIs#_z0M<&l}K z@Q6atN_F=MpH+#rOnA9MK$fVJOt-@Hxk)p0u2SyyHMqv&Tn>nch#+yRsdx&WC5iNH)b|AurV9iVuW#RcZUmGa3yb`;?kA&dVkC20q-3U;wX&~L-Y*Xe*Kl_coWARxVNI| zb3@(qdhfwiaXs{VAhP@3gC9`J-3Rc#_kLh}-k1L4e+h^e`T03PhZv?_Ph7i-DS+T5 ziq_zj8Wwq+w79qW=HIPg~gE!ybfY&dcy}1E5--B;nfQvWRH_u+Zdhr}Q zzqopFe)H<@qQ`4_fVS5gfJ=FWb+AIgo$wrf`ZdGB-GDC<29_BP5iN8_p)eehE>G4l z&R}%%f5jWu{Efd1-S5OZC$2a6K0)z-PyfjgSm2a0r#ArC2njNO`Vrq@8|0(j0Gt;n zJ;yX4X;`!lg^gTbKpEQ-Jt zUalDBHYiFrC=vMImn`hT5ftfFFr}vWFqYX-r!97yP zZDm^+MN0ltAa10GX()S@JvrbamSR7@8jM50YvI6|w}t6kYRRww$3ilw>ztKP6e3fs zZBBs*`p>t8Ug9qZWEja)ktvK(QC2~OR>=|vQY+|@c@O@ExOBhSCS1Df(c^!~u)8Vi z>q34|(gD5qhT~e?dEQgQl^ySn^gx&@e_ zHFdxX7_6EdWV#|*lwY()MWpBsZ5^p*ib@gzjKN%Poj5>Y&0S6dPcF*mh%58=LNe-T zl$e3y#&FIVFyikINK75xR9y2X;LAWtmZA`3afnjM4FaK}Qzsyy6vAn>e=}HG!a~~- zIUam8L`iK9Y@nb?q(nd^2oR<6N^l2UumceMmZUO>iQ@%1&UGjQKXFzINuV?*S6C#V zj^U^aRYbCMAf&L;N6IHum=Dx|ojfrRK58BnN5<_!@E*(w;UjUofDuKUjb5mbUKYo7 z`U}3mvAUHnw05y+Vp4IgehW~%!6}KwdfmVj^FFD%yszj^Fsv2)D@-}$Nd9;G)6cvE zu80eO>fT@!N>KMWiufc+PnQuDvCEl7g~kjrwfUiii@cd$S*^yKGB7G`7K-#Gg!#Y-LOwlo!4pi*ZgB zLL3oUS1d_UfVfqSEbG3E+O^yct)uqh9j4+Om)bB@6VHFCj=+uf831~hh#fL4e2uxN zqDwg=>jjU%Ee?N4DZJewnH(H1Q$*M09MIC z8LW~U7ZF)XBa^PMxDY_txe>X;?b$?k)QU}V?DnyV0lgcW)B_pzTxw0TzIf6NhSZZYr^3|qFeALiw7CP+(gGe}QClmPEI8YoYOdm*yeSBQG zLDnEX3MU1{9HK%tsBm^OFejrZjb+rkD#gxIZqYLgBdXFFV&1Ewmv?oo?9-=Wt%xft z2Ji@cA4mEEEM1iiU+NkHNNC5)cXV1>dg!tru|HZqKK!adMsJV;15h)IY}p6I>?Fb)SW zW_X}~Q9?ROaEvYlD_XcqHrdHs1rR66qUe%DIHl~A#;mBytccmDtHE$Ww;wru4edObOndw$=S%Ajs4jO&gT%#+$oxk z=H6ns2#07GqDe4X3|$Y7=d-Ch8c+S<$PeHtntPLQej0@HX|Nj`(L2W|ZLm?k-=H+* zYE1ZByoGiRwa-Gsw4t;5vZ@DQqsD<`@Tlp>M$%u(W&!h3M*@jl*Uq8Kh&fDlp4 zeZPc+wEpr2Q%vHQm~#2|3a>@1TLJP#j9J3J7Kc=1Yp{~dK_uH(U=oq?@Kz-BISEV| zmJ;5OdNGdlKo~@VEAv%gyt=Cgnx#u*gIez_xV z+cC7<+TfNM5oF0Sg&_j@YutB#p7%|UxkZda?ILh{^h#fX^;F61BN3x2VJTw(*J={3 zQ6r%5WU()OaF=Mp}9BD$Nug0 zH+g=kp>@Shvt8lJ$A+FY%kv82Vk*g~3^Dg6r6oe;P^+2jpZz2s_RspFVrc)kFPN`? z*7y3q|9sr12&Tab(R^O?z8iS{=99&Zc^6pf*f! zygX51fdNe9!5lu-1J&^4i42@`@06{O{`pAJ*c2ps4RPFzw*zi!M$@%8UZrKl8F+RC zZvOiWyuCRG-yDIdCJ?_YrPqJj9Jc=K&a*6JGoj-%&7 z{9aS<`r%Cy+3W-qZ$u7?dcV2NJBHF2Mi((d=>i6*?)AN;NF~`|buJb%CK5zM*q@th zYTaWE#LKv zSj=XJbO>WWbQ4X1yqz`Q$5f~b$b2b_s@<0PGoLFPTir>9VwPh0>j`4P32#Zk0IXq> zaI`KidFvEW^(ucZWbB8pT^NP~)%}1G5imk57zhjo_n583p93iIJ~_%M)k3RboPR71 zHJB}nq6=G+$?DO$v}FX`TEygS-eoOFspjfg6p?!!q7{*B^o~m+%!=2P>JYH-u9$;@ z*&I;7yTS;iH_bNri`9@o=?(3zi*MKZmb#MpBpwONNycFER#1)rXHo>|79=>h(@yh3 z9DdassoaS^26&y2l);!;R;EsE*z4i*S5;%Q*U2v$cJ=Ys5XWC=IF5;`!yhT1?_2y1 zg|BfKMu^Kj+Ta4_3X^CH7RI^c0&D)RdbPQWR{nTCnpIefI-g5n9Ee1wb74$UVNK@#wv6G6qzwa_ zIINc>C=MlLnU*g)EqbAOx<~$|d}wHbOdoD9o5~u$f?1wYlyEx+9hDH_*pW;m{1B?F zzqRfc#o-{MDo#}zX(7*ka(@c{rD1o9#is*S7;Ng|dP0pAwz}194;_&rXz;nFOz&)fRow{U` z#agFI&ez#XqIG@@U&#qf zp{C0rPNdB0IINpxfwsZ)+W0q?1T~WP8Dga%wN&NVf}3D_hP~F2Oo!h#D1+DBFcEJ{ z3s1JwQd{n9;#gjlNssyZ;r}5PIF57VfD2&@ridf6mcbAh15X1uHVhwuGl`>Z@mRbC z(>oLbsB`wW4d}C|&Ju+lzIk<>Yu|hbz9DR-vMAr^>(ZrZ$pwt6HKI=^Y2j1qdS~3i zY_m`Ew+u9tH6~^UC)rmT@5!z&wYI0#->gs-g0N0hrXxe?8po1BNgASbeE%KCyv4CNkQXnxS%dj>Gu@A1IoWfB7bw^U)dZa1Z);{<(Na$? z=flcokiO5+Vkqjz#@!V4%|O-2$v#j)yZlwr5ny3{Z3>#*KQ zZOc-yFVkC=V|N_-Bi}{gH1NWazd)gP8qPz{n@;D`2@2+uMc_{-p6Ablkr(=-5DtAe z7`a0@IvtPqA*4MZ<(}q4xyJ`7H*b9%>V^Janw7tU#Q36#2Nu>#b40}1@FzH9yM zSq$^QhvUh77w?s;Of(X-lZwqdJJ;8k(0=VDSD=q{_z>`v%$8)$V1 z(f)yQn=B1N|Zpw>lpeR;!8_=FcyGI4}EohOBBpXhG5d)!Y)9 zr6->0Bo0wqQ9u{n{>Y7nSe|JfFtF5$n)Bu!kYLwDy)F z7>ex22Cmf09WP9xYPr9F!x$7cTSG4t|Et0Yv)SxBoTr{cIWc6BUs0opNztzvqAaJ# zSQBg?ZKbQon%ra6muyfjzm>zjScup!XN1A+F$lLYT;o6<=cSm$>KY}TpH_Myzn$s! zxRjxkzl_p`;F6j`6A~qBByVg&5k(T1ILB1JZq0l%i^YZm3c*vO>m#v}B+xjEBJLj6 zZ;RrplmipT=R}PHy>ZzpT9*CeT~`bqOq**Y^6)imPIe)t@gfk3q5tjsaRH zZ2KIi$I7ogF7lI(i^6YQkI0>sW<1w0(E&f3etMxElZ7~Lt5e?A`4P39Q2#vA({uB&h(({Nj z;Ya`+sx_HjvX`8VA5?$5y%^Y5d!$lypQuvPYQxh+P3(t;Xmb#Q2UUFXAkwghClGwQ6r|!3$EX{tT&|w_pUa<&@jrx{N8F3Z|!(AEEFAg zuB;P*LaSAhcR~@nG%hh{Sd-6myk8hA=8Xq(qdr)X`&gD<7q>Y!b|sbZ!OVYMTyy_8 zYoNd{XH_SRMvCAAOY=eU%qW&L9uIWTb`K%Ft9LFPiO%GCW6l z4zG#uYE>flbUGF34TVz7a~cH9H8FCTRBwCwks%@@9Qj-S4sH8qeSL1Qf80;xS>5$^ zAnKZ)tha;w>F+;R)U@hW!rg5FR#5p97*Q39>?XBrxYL|g19^}wUFr8Dn{RXlQxTYJ zj#TDJ%-WsPop8^bznWKtEEV#nAEY}(Um;HGx{>S1QbpbT|TA_79WVsGCZcTkR&7hvBPiPtis-Ns6%A2k2sehl?+EwU&`ioa1 z`YBI*npsN=e1h|yX7RttidV>fs#E{Lr;{G=NKrzwJ&nRy?@sKUR*Zv8q+mo!K#1U z7k7}D?};DYQk1Ii<~0POU2)o~oB^bf0~$L$_m?>VDT9%%l#ehde>az*POVe#)pu$N zpu0AA)%o4>K_@w|0Rr33f9`?}XNsYh4`r$rZNodxSSAMwAY?r-#K~qVi*w3?yngIxfCA zy15PESNeIPPxwFA`N_N^BWGQ|)6^@iY>!kcJB#NF zjO4wPe6DE`t*aN2DGisS(_N@YFGC@?m2-0@4y@j)dmkk96^TNsVd(>UN)L8;E#teiX$`cN>;@$<`far3t8`QCY6=S~Dq2J+v_>)rb%J%6}34NpfC->Hi z|LnJZkYxR{{>XLRb^o|8!*2bv{^@tP|NC)Y<=h%Ay>h#;`x^IuFU3l9pE_Zef)iPV zi(1ZONmNxaP?Xv{%X+bdTmj_og1n}M-Xg9Ib6${y5s;81i=@0!?emkPN=XVGD0_6k zH>w_qjGZ!Z%*`l4#WfR(gLIoP89Y>)^;mATi(N=@-csaBY%s;@AU}+^a}sW4=Xw^6 zlmt~mc7Y?MLwD4jz5T5(YARf&c!MLfL@#InBf)_xuyx!w>p}6EtrwO$?kD>FFn>*N zy%hvA^at_PwRs{R#|x6Kr8KW` zmIT_BtyYXByVy!V@5*7a_`nX3F$vM7r9wd|heNlMnNoVKy&^FD21YOrP%32I8{JM% z0XN?tpyp3rnv25|^`SWtM>}b=RbIH!0~5Wdu?c3*XmpZ*0r%ivWqAN(s$%fqvMjSJq9_v<3i>dXgt%d z%T8yz!Otnb-?{j7zUu9uRb5bPHXpZc?pKJ?~6lpi7iukq1EH&@AojiXOGsi(~Gsh$cFNAVw&Z z4vqqefB?wHYFq3C?y?f{vwp_I0Zi}-w-h1*!$I!(o+Kn3Y`l{vd0CL7pKAoIxp%!p zwhY~}O(^2BkSQlz%(A+9r}(Ap&wN46-hk>YuZwb@V#ZMHJOb?lZwK|(nt~T`$aNnA zD{_B0dBx(?esa4(%Z)!7!oPdqwaR)wy?PI z#BBMY*PaN7;);_3s@kMxBq0%5Zm$#WfS>0#uGG=f*R$B(=yFGk9y>8)a@;id0Tu8E z#U(I$U!AeW{Os0Z=;r3{Wg(<0jDPgdfI=(^b!W1SxIPLh?t2#4$h0(ZKKUju znbc4~)pEeOQgHmttO$N<)Xc_lh&MRQV8q?JJ6$bPl!2lQ=J%H7*ZAz*{rC~5=sR)Q z&yMYnGN^9*A4Nya8z7ZFTI_)2Z|?20p`V6)8pm~p?$C2*-Y74UGKFZgICZ^K|8#tc z!ihhf%_ob~#dNYbMT^nGn~$cW`EWR#pSt5Ia%bKgy7LhlFDAp;Y_=COxf$|jzUsg6 zqwfFL0nCTL{D1HL|E@clx|RF?hf{y}`TqaM_zVVv-U^54tOvjVFcS3mFTE#4WSIL` z8;tIIy}w2{z5}ZiExzh&RaHm_mJ|QS?=x zvTcOu3L(}9Ctr&T_FtlCJrE0we|_@g3Ahem%vWI+G1}|(dhfv-0$yWU5|3Q^W^t$s zt#b);HrV%hFM2GrmhO=&M6tVWK5E3~kDj;BpU-tYat`c9pmGu1WS zQ>SK5o$kJ_A&!B?1pDs-(Sp$%ORKV&N-J>5d-HOduxqfGsc~BCsPS?sX=rdMXxiBr zJD7R@RB;rPHn+0}yXboJSRYR2<_o-|^-1lrytoLuK&V-BejH7h^JJ7WPqmbT1mh~`ks^-C*Q`gr&srgiYC>7v_r4~X6Xp(wU zJBt|L=W7JncM!vprb;A%h(%jJ1Aj@pY$rxylF=vsy6F)S7Z?9T>Sdfrddq?#eE=bO z)Yx`82PUGp6LOan9`f~Ff(6ayvy-2}^vym{7vFt!?Te9S`sSTSbQn?lbT(>F7LWp3 zyN5#buf4zC{u_(6v^##?)I3IhwjGWhGSE_=Rk%*i5@%xv{GoFwUz)IplrVGBG=7Yb z+(ZyHNX*g>2lvwMhz|nH@2D*ptNnA6DKoqf=OSLRG7Sl=RmQtQi~{+l*DQEf*I+b| zU!fiJvcBK97?=6mk4l3Fa4t3gFxQF)9zzw+TH0|Gi;TXjpsH?K6uaRfF_4?&u(8h7 z-r}lS1cv0DqadvVa!j|~`wIv9la4!%HejLF0j+(b&2IUxo}%N?Ac6bbv7PMA&Gzmw z&N`sg3+M9^5p1vgB4g0W)p^@A_W1iueqI4-a)fdah&NMZ0qO7@f0R(xxobq0d~}_4?J&uo-acD=6OkQlOreN;OH1Jf!-;M*w3Hv@7tMov-x!m zk5(tUH*7>Q-}8L&!OYug9jMt>&#^5Y{tX2#{QNPW2G{~ZxoN{euvO4Py$msut*5wB zT}Uk-G^2=PND3p*PQmT(MAdkFi{mN#NgIQ0Eiljy-x?p9!O@K8GuP+4D~)VJ>kq8S4BjzRhrkYB{3W!Fhnwq1j(LFCv7n zu$iUs8{B7|hlYmf^`Y#9$9zu^V|u`2_mdQZCd#stKlXUWRUUz~tg+XfKA2~>&iuo( z=bjhoKkbqQ;DMR6AYC`BHzQ`}-+_<*3ue35Dg?2+2w!Ab{@ziENG50o+B#J16~&V~ ztX<+S&hOnQ0u3}f;#DP`ZVga{z0g1bgdd#liCu-8397^HhL3K@BEr)lJ$AlvfWFL z>cfR=Fx2?ZhI5B`hxHjTc@CBce1i3&ZLC)@b~GF<$A~9y-Q(UK2C>id`t1so_0whQ z(xY#>VMuhX0T5f~m>?YR;qqJPx&b`tmRZ18;$Oybgk^`(amzNgiMDf=v^Q*DD2egJLRzP4L0Hmo^HzWXx%s{rT$Meh~;P9 z-~FD5=c>V-*_}0)N&UK+?I+taBnyTTDx}j(GWych*c0q)@2gu>)>gn}`mIt0-vNm64hddO`nMJCgb~koYv69lq?H z+0;U46)&sCdCJc?%m^)TEy^;7z$O&X^KLOYx$W5-2(|#fp?iD54aQCXO|MOGCAE>r{Vb-VbUlxOTwGMITyF>eJ=-uDL|6gn{;M7obj26*aE-(| z-P8}c`3YnOa>x#)XxJ3hS`6LP#Lym!;HgdO9TkoP%R3SQqsev8u8xtpNK{B;^Uz>L zF;hOB%+`#Wyz`A`2BgTFt$5eXEC6kz<$w`ibo9kV2;$O_>u$Psigjxvg2$}lv}p>A zIaI>Pf~N;Kh&7V{+LVg@yhAB?1hG4e9B;TDxXQ(}&-?NZlH{(;4$!i zkhIIxf;!j(I{{~cTT9*(Wy;*2-O(DUGK_$N7JRI$$OFwE*tPm`J~iDyEDjYuVII{4 zLkgf64($8K(a4bG+_QH(!HJMqXgWQ`mfUV9IZQAi0Oic#pP@ukzIc9l{nyj7-w=Y- ztvGO@weDKe)v|O1MSuMuT9)tROe|uvM!?UEw~(PG{pQ{6R~}{B;J#BMC;d&s`(rB9 z?7R^4cowlh^_0&p^okiEe1?l&n!J8h$pF{&Mf-k1N}_(U%z1L8a^d6bHwQ&deA#L& z-;s^*#_n8vtCGJSoD&1wzVw@|=Ox1mbi=Ehk6Gs?E!^BBu!YQ&>d`=JA6}&0Cn;*1 z8B=)0RPkjIf#k_bzj7k1!MIt0l@HP1_R&kdsplg-*lXaT5pi+i3|Q(D%Yody7MFZ^ zv&Ol~6a@b(bP8F6T7FrXR^l~MtK_U#+ubZRDFAD^+wx|cB|ClZq5GdnEFDNm^?LYK z`0@!PFnY}IBs-A!q6j9+t^cnJzy@>TI>E(g`Axt^ZvhS=JoKt}Xc7KL12G3!U+OAX z=HD7*3$)IL+%c41OD?2p0%!qzMfM)G5kfy0LatqDc!66#u4W-t_RCMurxz?)<2Sts zHAyn?gqPlCLM}o?lxg9-h?*Jb?O=Z)q28rWUKU1STtsROo;}d;9!mIY&pR53`@@(I zPXbgD2+cihHAX{JU}U$-fa@oW=+M>oBnB`*=_U?mcf9@p;rYST03F-zzzDw+LWdR} zcl5B36CyIE%&F*2dj{emI({4A)E<00*vuJdbe+bG)hF)EKA-f|8VwP7KcSDRHh%(j z{q?q+!@Gd-f%wH#5I{j<)@<3`6WX*#6F8zY}NP(cU zXWz;%{J~QsjMV*h$$vc)7Xi8h4o_PT0K6A1i`{L^c?cbx{1Ay4J>LY0#2+N*CCR<6 z1v5u-xQloZuIZ8$Vv_JWWVp!En>Ml3HP9DrDuDZjxaiptTpaPvRoHU?Q7f zqM}bPuMf%pm{2S#!<;zl%(0)V{Z!}`{h^R@_dvfjE`M>>aD|b5BjH=92`M_ETG4FEnY32X43Vf zQ6lTEmR6LmPH8=NYE%WY=yY8e+hxiTduEa^z-`o9K(xfT4$p`UHUU1voUlh{G+=;0 z?^CS>oj0Voqdf^eV}dPEe58zkqEZwQu8g4ZgRvgbBL-m9k_pivQCdlq%mj0;ASNfc z1232=;#iMykL_B}k{PxI|57^}?)%*u?2QME{r|7hyRw z3Z_1VWv9%F!kC1SQ>K%yWnZ^R!|+CGOp@tn!7|ag%`)_o#bAMB*CSR&1M29;`YKF9 z)Qig%d*f8PxCULSU^eWUQ=EtFq{f4&P9ZsDkY_1$G*JGrbj0FMqX10;NX%gq-9&>Z zV8GEiD?`({z`1gX3;I9O`8p}9vjQlqWqZs=liftqDPXkGDJ!>!BV`FpXy?Ql>#3~O zO{)>LlNCpk4@l(5EFWf(Bcze)Gk=B+N#hYw01YfF+WWry12|N=$+Z}DOT=z`=>3@E4krun;N=Im3EhH zq?J>pD`QZFHkF~qm2)v-K$}q46pS4dN0}nYE&2I_M-|#!hMGpsrGSC-YkLaC9#|ad zB-8H*(1zBRV8l}LvZU`+A#?2_phQdwUZ3Ye-CR0;FcGn*vxBQmaAc)KsmUQ_KvT$6 zv-_seRUzIbD`sXK7#V~#z}sGcti)nvb=ATRWT@|>U1#aXidOcnjb2cJbCNC{7jbd0HUOxMs&-qvl0w3kvmGeOjLpx7dldZCA2IGr=~&nQ=A%ITu+ElJqF}oIZXWAwlapE-;LOqrPnqQLDA~ICQf*l z0{|!D=|2C=)E0h_IsH^sF7T&z8^i3nS2~)LD*<*O>#0Dh!6Nj$u49lCH3OgpXm457 zF*7`A8Q;fqIQ03cz0n-*EUgl&Lf{(GHgo%;mLI&dS;mdWGv;X1@JuyzavpsW^lcNK zeTUpt*TA7RHh(L4_IEl4H}D8KTq2YrH>}XsvHPgvLX}?!j=gR7Z_*({W9Qu8SqL=q z(yHnQ$@PY6Gqq09BhKSXC|5lyYlV(FGs$J{oon#^2cX)1c0y_S?w#UkYs&zzqrH13 zmPM!z&9S;UB+;O;z|Abfo1!&ED#TR)J@-M{rD~|TLs5HTqBA3#pB7#x-lY=<(YDEt zfc#p751G!@PnmiI=8#8-=KT49!FVah0zdP%jKOc^&!SZqvp~vnRY=W zYde(hMUZCXN<_8|IeX^vDS@Y%MP*NXUs6BN)BL{#Ae7kwqdnp;UI_oiB6kyhtn%7L~6#< zk|DRjyZ32yStQXML$jq(BF8?_bzRv3HfqgoED@;Q(LK)f=BD#DwtALg?R4|`(FD!C zaU@yM+?K|a|`QE$#DW z*K-J6L6kA!4LS^}{D@(jn<#5qZp`Kw^zK4PkIJ)~$kfIV7HZEsKyjh+8;XPO^BZO} zRx^T1N;zfs`JTr5{IXV*?h*{IGoJ5meX3J?@ZP}42zz|Qm!l$R9!GO#{jQxM**hg! za4UI$Ql0Iak1ZCHT7~J*DbS6M#x}`i~Wbp{ZDsS`Y{Mnt$OUV7y%VuxfU%QJLEw`*I zEoPZDIDI=lr!&(m%EG>5s8j5q$ar{P#c;{AHD6!0 z5N=s6?U!z|u;a|k?#BLRyw|;^{M%}u<37*6qlM%eh?Wn3Z^ffvfNS?x+xV0sB${0R zW4^*&4Bt{0EKmT;wsjk(TFvReQL-RgBXG>Hj_3`=s zXx-iS?e()@$ERR{<`z&5o{0ZB*q?q{h%vn6vIs^{5!}+Y+wG{=e3gTsF@LZOJ{su- zu~?i2X7>AO%WimJ&1G2kr-#Foz&if6vmRGGy)K3Pgo$;0p=QdDAywei4-So{IBS1W z@n51d`*37hBobAeek(dd9ZarTd@uC8m$J*c!JLVza~%$?3g0s9Q+A5dPYP0~llLQO zklazZTMJd_J1(Lo)aQ2;!FXYaEq9#(LyP?xTXx>y8TyZd5{z>q)RS2dyrtoMkpvrd zB6t&&2;+J+$)F*ar9}=>xPydS@D1k#|;?*~7WPE_rekJ4%Ah zSsE~+C&7~_T7sv1-KSzmv6;22a97Qp{t)1AE`ryThEC~)cSsZVlgd9;j$|d11L^3+ z@nT$xvcfle?1Z5lf8fQR7i9@>=*qE6P~(oG%0waKD?XA50ZNSJ;Hhy zUavH1nlCY2aU|19*_g~pP_vlavV`vz^Wun5(^KtNKZssG$Ydh(RRT20)6yp3YZf|W z8om}xxWG;&T1b)ANH1Zcm)koMt^U){0D0%Yy2)OS<1)tl&gdpv=pT^Ae8Z0a_#Z=+J_&98~GzIQ;bt<-IG z$XK&>RP*`w0Vy4EmTd|vOSFC>1em!Jvs*#SFuUPW&B#Az$;pQD_ZwHP!M{)vH-A3k zH!h@*=dw%h-r7?Gx>)ES3vwa^yS{(wQ?rx(28HOplnja3?#0RBYeVclpBjy_E+lVU_)`z;VbF;t0o_Iqu$p+xh&SD@L;ZDZHI4+1wgC zubwwCK~r3LCR#2QF{$>C)Bvuxl-#LLGxtVeJ>Ev5TF*cf#eLiPFtLH=&LHqxh`%`z zm$BjLBKB_%ZAt6!t9EU_LQ^fGMWWmBX0>YdUP)ImF1$l#fV`#xqM73<;|+hZ~gm__-XVSbSN=C3h#|7zMGGwMhwd70WFR@Ff6PW?fj{HHvNKkC_`sR+E7 z!>lZlz&PLCJW4o7Z~@Xc4~9yJ)6|{OwL9$cHJjL`H4R}%x2+Y`a!k}x5;YOt1)o+$ zk#Bl$Ex2`Sw7Jz`w3M);c}x{zezKjcX|O%H!Ihz8ffqa3H9o8=&vXp=4DtTf&tt%q zbWlyUGZ~qXTi%lP4f!OthhwIZQKR)!WIR4AQE^0GdYToZ!DkZkNWT%yoj-+=hCC~s zy?&;3fZMMR-oOxv-}4_V`pvgqON_HSAqW3gTx!l3eyu8%054J>d_`>+vbi*)=x2il{i4G6O4P5|za}1Lw#>$Oyy{44jYx>je#O^}r2i62SkP zBX@Xdd6Ksds6nT#Pi-DyDgAqZo#OZ!QCm;|;?Cg;STB>73J4$tDE1`gE-;%t+#^&q zMHQ3eMc_Leh_s&l!;-L<`MtnFam<0FEvTTTgyLLGFb!?4NjaRH#@XKFI8*MdSlqZJ zxQ(hxrlS&+=Eip-=7Rj1xD+b1RFvi|^iT6bW?Gx5!6*H<&L6h-Y6yoW#hrJorg6DogsR z<4CpyiiTgBY@8aU*~BRc;GD)}I5!SU@V5lY!yBoW3N&2WPGv(mo8~Tg6c|?tBjl$4 z>@r!dT_0s}M7DZUGxU?av0{+i@}R%OZSVt zijgiG=Aa!NHhWj&xRPpS_xB`B&%DQ?X<$Wr4pg=D8YUn-R}X`^E&X#h59{YchSs|g zv7Kv0*320_E6R^N541{t zN9`M<3o5%w zbv*{mVzJ<6&S_BdgwM&|@jVXT$HSEP{KOBak#=e`JC@+Li$}K&iVqzX)+Ybp;F;$u z{H1mhv!967{QEK-+Y5M`dtMdpIsiP`U2z&>L_*^$P&ZoeKX8y$Cs5^kFW&aW@F%=z zurXfa8CyW*DIi(g%A~C_Y`GAquQ32CZ!#}46c09U8!tGEKT^17;+yl{yVyYdzu1zO zZ+lE7(BIy#P;Oq3FI>$ylpectufwiLh{WCt2N1hWDcynz6t(@%-*>DKFE@CdaM@GZ zNa=8nX;<$$&8?B;^ex>3_fdLdxXo{@Q*rX%jE?`hJg4F19*x3fT`8}3uY>nYGw$m| zZvBL%a-A^i2zB#gf;s#TLBw-ES|sW^ggi#;Gi3E6N`fS(fcMY~?HzGk8|@;nS@l~m z4nf}(hm%4!^dO!Yu;Mzh-`AAZ0ncoWQcTuHQ>NaOACx!J6~Q%5`-N5zgI|?t&L-sw zNXWDf+qt!RrnHl`c+dZS`Mp!f@A)PHE}URLpXR@!^Ni;l&z-)j!=O~1Qp%^(=c5-( zB~;WVqC3Rn^V=19%C~9WI`Fre zvBKp9+S>K?bwt_yqcdtnr{MsAZUEvB=uk~pzzZ^hb{)d!({Ji`RTP?D(4hp1h6B_) z;&kRQw8qJ+=MKAxkoIf|qaU!goGvpbpZyvXgz=4Ya zpGH#27&1|K~kFF>%T!|!^(D(N? z)QJbRmzOvi@%;|qZja?0Ab{HYsagU-&!V@jm(I0M9G)^p(+RK0Y|z;O`w>Y~fv$Y5 zBqXnc3=AfL4HaC6wp=#Dhu(>Wn(Q&ALhT(&4UYAfeXROWF@DB*Gdlu}9>9+^cUOl5 zMZXw^oB4m@u%^GgfJlYrV$pwN_@Q-u(to~cT71IZzb?nVru)O(x0&C)2!8?D{w)^V zPm&p z*-3^0oc)VQ_T!h*-*veNkfCcgAtPomq<&49wj%d5B)k#c2((~COz-(0Cb_04v|7yu zeV~HaOc$d9N=O|Qo5#g7VQHXZM+SN91>%N{$aVF4%Gk|bD93exG-i3%fC($ZrOx?JzU#8n>#>oc6*p#rco9T& z@a6aSdgCW*Z`^qIS`Ye~3Z*_~qjNIEx5%gC&80fY%TA&ERRVb@l0y)!wUPQZ^6SVh zCqfTwCoS(Wq-iEHX8@(^?G-z+m-Ho-?vRB_Vq9&yNj{cgLy9_58yIS;EKgry7oJv~ z*U>8)iDJS82sHw?k^CkWPbj9uCl#@I#2M&ZT9`ZIeakeh%~XsL0m0KO(`_aQ36nad zM{NRL6}3+#61v-t-0wwWww8YiCsCac89oPWm^9Z5_BEe~(UCU@TmEj8-$@} zHl-9Q9e&t=$Pd13_n_#{Tmz4(P#oXV^Lo7gzi?#e@52EM|$ta1r5RT=c!1mP4ezI`zlUXTfgTrVBpWh-```iclHkik%Ukshi? zMgQIU#*_yVdAQB6?eSz z@BH=1ICfA9h-_@T3K_+w5}sqZ4^1^vZx{?`%40O=IZ*OoQ(_zO_3Tr0S(S!t+CKsp zBsY84#%faTejbpgj}6;Xn;LIyO-stMT-5eXCMigzxl^^%{QY=k>u7R{W!D+^e7uB{ z^xN4cd!wi1aYU?7Yt*l6yqCMH z_`A3#BJo0b41db4ov(>zR-!0)k}ZmZHRDmpA+J6c=Q5yyu(#LknwTm?&!D|z%0SI< z&IJ4_WN--~Eeo9B%961k%WOWeg=>guJaI`6X3JJu-Ona z5WnteN2zyVW1QH`IgO4bHBkQaxH1Q$1MnWP32qruM zrGWMR&d$_aOA$dghXCR#&ImaigqFE%h5Ue0XWu-{p?dPE-y$H+I{PQBK;F%;9J&M=jjdt^10Kd$vom zU-<%om;&9Jb-cytDG(fnY7;UNG{dhrYS4-=vPYX_Z@)h2zSbflw=(<)x_64<)!UpxkxnEBHUR#4l zrL7f-6oEtn_vU~c2C60Ve>jhHx=_Y%l4tT28P!-vx9%yWG_rjq zJPKVbF1*8JX(x$QS(@YkI)RQUrS4js10JuOe5%(`*Kgdyln%y<4-bSxg#G9%&UcOT zn*Q8wNGmlII{%uW;*H|XnmF(S>4GkgEP1Q-F7lU?$`E%Q0A5+p6B zFd#6HSKPImd8;o|87z9&Z#PFZx#!#O9*Wo(J-pf^S-iFGXJ7mory9xslhETlWhUx_ znJ--MxX*Wsy?PFZ5ISg;b1IoDT}8?x)4TwgK1P-`NcY6)BTbCSUl#|pLIr}XrO;^ifatI!IYB=X`jR=+ih_mtND;5eYdXWb?|Zfd)@w!V1T7Vav@cU_-y z=Mn1mmDT3AeCs${;U~>`e&3j}_R+S2o!+-?-}k8Uc)*7&=Sv}OV^YfCPTHzWF+byF zKHoX52r9499H^?vFECr-(j2xv8%I9xT0y!haO$F5Q3u9uGc#zQTTEK(I6xG8ht*=4 zGlj*`J%eBHdhT+Z4c(NtILUqw(Ct7YX1>Aeg6_6m=i{saeFT`i`ql7ttjWIPn<~m$0EoFI5ajgpN zNx#Xw8aJ-*PU6mCPx)L)6}LR{>3{7${s)8NO()0Z2GyFH(ZSxe^#pYuU8 zfeAz(De#~*jDYYEu6LUEnQfvE&+CMyd?C=&32_23=pQqPcQh~`j!jFbF;{wn1c$XG zI7LDfRvDK@CZ>upin$DQ@5~1Jz1rW+0j;<0nGuSEolGrpDd^U|2BQ(mv>a#ND5FSW zi)N;c3C_M^SAS$cm`8^sQ(c38{7;_&^M!#H`T2oCE`*tkzvsieaB!fv;HGd>^mHF{ z9Ra?M;)Sh!M$cW1#Xl6^?vGtKLJ_(Y3|hc3Ob^77lpfA1`pG;9ciX}CZhf}|2J|i(Jhnvse z!jB<_(E(5ACG807uw@vkC(x8XpZzUR&A0J^;K%qQh>V6Fwk97$*%15s(Sve>25HQ4 zh;t^sOyY(Va1c;8X#uV1kQr!NzuvbaweC{Ww`jRf%@4JL>W3(buQN<@U!BuYhz7~; zrzN}^C3zAF`p5n@rii+=%8<#1eHnCs9(yRWb8nF68p`(->AUhHrjHH1qvoD`F%u>o zYH>@~y`QnH*;jUb|F)6hQ5=~i5{f7Y=NAVW=myujfac~zZfUyjNM3!W9dK6$E$d!* z-w#$7T}<|-W-OiTcvrxMC+g{|{J8?rer=`^d)~#^eQI1=E4y6dF)$O2{Rq}V(gt+# z^@Jo+1eT6?Bb}*iHdN1=+)Oc)UHK5PdzbI0d}UV8b7rJX7dyX+LtpG9KRWV}g}oP9 zBL;R8itnj~s4X1uV}B<{;tAK;9jT8vda+JDSGn=HL!{@0;gmSajX zge9hlMwXy5jF{y^+N>7?@|&k`N6;b^dx@Z}8kI$ce7x=;V@67gRW-FGs)om#m-6 znXDBTPY+(@Nh2##wb;GHW`Ap`QK){&gQ!}yBcgtPSXuQI>e$V2u<*+v>7LtLZkgAG z8K7~W2rE>(;(j%9ws zXM)VLXAqfV{&rBnz7AE7$Z~Tmi|gFMB2qsH1o{AlK$c19f6(WM&pX-b2`p4aTyDEY zKqsZ^JRL!Wru*Xzw0}wWRe-f)(N&{i(M-{X5WxuO>h}VZ7pR&-*O`|b5f#IY32I~12YInH;w(Tyk}4}ZW_XPn?L z2j-YBT{X5@@ruVqJP~_1mj7);auME(og&)%-5V&XvM63#lxNz*Cr^~Y4C5#iPIx8n z;&F2s_Zee|wO+$F*6PL74E2~q#>b+a#j95oJF4lHrZK7aZ);A%THayZCP6=QqtewT zMj;iNLP@(~7Bp5_6d(S6eH0#7mR+PNB3hc8LU7U721XC9ke6yGuM97zm-Gf?VRq?u zUoi&;yCquKMX5KuIr)Gkm~@j^yzyvzetf0L#zGTf6hgUlds?XAdaOl;%4?S! z6jw1A0?wrkjXM5a)Ye8=Rrzq(vQzbZa)yQNEf0`}!L>GZE@HcS6rg z+>4&*Q40pxlV5QM2!77qkM{!+88i9a0lv;R(8Rg<7vH=511dV#h5ZB4tgkbYcM8>A zULHU0QjV|ki2S`gUECf%50_ReafI{HZf+lTV_KB9^S66s=_qM_j+v~d4Tzq3-yB$N zX$7Be$K@va_#KeMMuCwIW|eW2GGH3l%mBVJRh)ueXR!&RzLVScI1*9`3^uP8gBP+z zUHiK~wKGT7n|682>z!Li4_vh^-V$6&VTOPyHDl_W-~Ioq>zbnf<9%}8=nc%766=~e zw>NOS^U2Y)y1QPnymR8tiSW%?`CkXKM@er@-d$OzQ}T`$m)nyZL{EDw5$=NyT2dGF zijKd0$QMlkqB+$5{#;6D7I!88?+mwJ-VPkNlrH~||1X#Qf;Q!jIk{ML4L*CJm#XJS zn{-{C>$+WAXAc^+f6rtds`3^`ZhgfT2(oMc&Q`^}lhg_0HxK332}duk7j7Xxc%0;b z2{cU_1mc%-`*y9KPi?iBKfXf9{MR*beC+0IT*;R?`>*TM_!O7b^{J)$Uw0*^%W?AJ zfjY%UZb3I&xU=Zq~tte5L=_D)RqYO^VihX`3v5 z{l}sJ8WCQ&+NaCIS@_ThA%!!Ov`CuAc>CcJAV%An5}@r5bsq8i7Yf|r?*)8KjtH;3_7R#eJZpXX~k)3`0&pk(mW5<1QQk* zRD{sbP1aUzie(ww5c~ZZ^P}quO@HUL6~_?5vb1*HYDQpPEqH5$qqmMnoh;eu39ZrR z6=W5{$d*_NtVyKJ^nX`Wk*lv1R76tE4eyt_t?z1v4ClW5E<9HwZ;-l-B>*gy)vVUE zV?I=xbt{SS@d*fR#|R=((CesI4~b)qruZyo4qx%*zQ$(fS{)=bv0`CWOf&#x!i&z@ zBUu&;$)d{2Wgzh|6GoINoERo5#E}#tqKkGwuk@?jt5Z%Eyc`4XwFge$orUzKmZV+# zb7$S#7%=z?ilxJp(WT>^nV8m*X8VB>XbhAJ;P&AS%D=v<$-4l4lw+R_LkIG=+k_nI z{(pDZ3vx>jRu+;#mDX7um?MEd7X`i6RMCjL*+awi8Hf=;1l$SSaN9HXH^X}$Oc}E4 z!eo3{Gb?EdDvnt#HIC3sw^$M}XcadZDS5GmU{(pqn!eR<+k75uwfOX~M{^7!9Ocbc zc-iqa*o!0%$2N?#F?_MRuT^y;B-*{>dv)?_#*3uEqP7R!@i!Ym$My-m0D)JmIB_`U zql=1=HXjA(#B(Xq6CXRNKqQuN|G+Y7*T~u{|+OzK`jh!4@4R6C2#bo24n{YyVZvnR|zpHz*tF&hW(g&u@jH{Zh9`C33oln!lG<1PKveR4Ni7zLJYmg21ajuy1yED@6LXUqR6Aym0C}H`z zc!B83Qwz>-!3TBd9qGkZ6(AAOB+ENyzdLB@-|WgFt7T9* zpz)M)#n`p&PU(}!8Z2k4*hsFpC~9(Ph7nt6Xxhx2jXzqtm#$aU{K;Ix%391?!fN}g zP=C6?T1LcK3_gM*B`J+TPKZqOVz<{A#2k5gH?|);R;jcIu2|JG)s88cd$KEzLj5W4 zv^OJ|u|h_TR7v0b+%!s$&BQ$cLQ9ISsE#mdhElVEK__>uj%C4*LLyI;>o-AF3kvwD zP#u*rpR7A5Q?b0uW~^vn2}f$9e5=$cB*GCIHI7TJ5RonN6If|gWn)SewV3#GRarrQ zSs}fnbv9d9O*#ToJGBym)46_m)aLGErSv4EisFw@KLKhJqCEjT89JIfzhs4=Y!M0j`cma}3v6UO<?`=@>zrYSJS8qyxC*u+BkC>M=p3u0BYRZg^6>qI%BNX>q%vbdQe zbnOyVe14NX*&w(qy(Jo6ig2Ft2;oFYWTXW}ieMw9Fn^<$w$~ET8GvtE(@cnQ55hYC z2b8;M>W|)XyDuwlKGhQb^T<+W`r)OaK4#BEzK^`Z<#apjfruefvrBYi^8Mm(yXv{B zU$sY-XM)cY@P8VV?x)#G%6p$3qo)iBAJYZ+nm0A)kMdTX-+NTyq`(kGh;-i|Ni0+i zZpWOT5oWMZZE6v$u|qc*1TmZV+#>huH225ToFI$V>A%s4D-5qn*M8h?p}Y6QLLK$r zCfxIkw5g&WiQSGq1oy7ZBtOpEGQ35e)Fn|$DBSCHy>uO&Syx+$TtmE3O+)TcjIF!V)vPJt4bJ0x79zvYWPN% zLnX1bf18XAbTag}qQ+#*_Is0EaK|2`bgLCEMA&R5d5*lhvqj-Ea#CH!kV!oElaov2 z=B0E338f@?hpd5;jJ|_`x|}jS(d4j&G)GtdjzcBNETCmATUjGrDg?<9yGwRzJ$qlk ze6@2o4QU(PbixFVCJxU4Voa+Wbn&4uGyYw3sTwn8=Xn&zua5_l|8oacoDbQ_t^Bi{ z5btu_dOK?Jb6ua08!f|f$0cL52>oa*jw${+aEggs@ht?fe1TsR>8!oR40OItw>8LZ zp37cIE*i+rpc<>Y$zBOL>6;l6?CSLMe0l#^n!8zl(!4@eVoKvC6Iu&&e!ZRA+C4ml z$c?E?E;!t@js{C>_xvqk-VyJ~Dm6fWBKpilW2Y)LB_R5%5+C9J;FbT6IdNBCnrJYWC}dErnBk zMP57QVNxBu{oKHi{fM<^(_qXOv#?ZkxCp$yNV)=1L0>$X$tJmkhE4(!Piu}Mc1%k$ zyat~QixOxfo{oyq0!;lHZ*B(%hr1ld__eI!*Iog0XUTo%j}&DmYbV;5bgkzb3E zewr(Ao~)RkSwe-RkSmu1Gl0wjk*TD_e=|-H-hc7X&m9h9>wc({c~59tLb+W`)hD z^kDepFm!SuI9^I7j|Sy{nfMU&&$?l@cRuY)U(2?c^*65(x|RdG{i; zD%2tjc-k#V!`6iM^$L-NOrB*kj5G8Qd;+nw*qcneaG6L_Qtc4vc`UWy23guU1r=k{ zP#ay90l~#hE_m^gBI$z2q?!p+1vS`Zac!}ma|OV2s`Nrh%raK4WwY;MGRY%kc#cDC z8&aE$O9j%2tl>Xp2HU~w9V)~_Dq<1QVq(VCuGo|;m*bzgcBBQc-mdmYA!o?NT`=mLuCJ}jv64WbBlC6M6v8?HF{~i+FQVQ&W z_c^2c9>N`9LnyaHzAC&}X_~%DGx-2Q)0fqozMRSr&npyz?}VRzpf^-{N-wK4J-vU1 z-Mj&E2AzQcOa=ghZvThNy~Df4F3;zsp~mB@nJYueG;}wl3L_dgRMC2GWpj~LK_Hop zY>xVBq#c0>)-a}QA`O0acs;y&2^lP>{v2EiiQ50i*jq)#@jYR?xVyUt2^!o98eD_B zyA3V_1PBt`-Q6uPxVyUz?(S~+`2W6han`vyH@kaH&zhdq-Br8lsoHOU5nPm1n7h*u zO==wnvrLPHHCDAvFe{bC?QGpVHr9;k1$J8tYg!Sz2+R-iKo8gQ zS^<8W5eMtZZ_wY^0z94m;m%JTf8r?S68T^5YXr2?r7_{!Ya`etUkszLZ=Q3JY< z&+Ks>)7RIV2eSeKcPQ`P5~k3-is7(+!3 zSAkPLM1F*=H27y$x~XIWLY|g{^!&ba2JQvkf^U%Ax^nlQ_GR=BSWPHZnN?F*#SJV* zr&TE}W0~vwDwug!28m(N=6%4}lEk7P;+-vl zYaK-vo@hkqnr0^g60Azx-UPB4zc*lzPVP`fHpoesEQYqJ0(rX7L)>&b7Z;zQ6@$UP zams3o|GJj57_ZHk;~_fh+UkwpzQ{E=YCX&s1Bo ze)VciLVm7nHOXP_q&z3}uexOtEX+3pC9>rXkVXu9VI)O398q9|=2}>JshVVvU=cyv zpy1Y;>llf3eQ;6IgyWa}CRb{`D$Cf^d;7!?`D3VB@o{$kS0covOv>A%lq-PVe)mYoC7-0j`HE zz$9;b@uiZ_Y_UJSmW;<3xVC}enXs^>&3a=f6b&ro{&7*CI6yTnR6SCMGX?vLC*RMC zkej%pmmSkwCg@*kXhV$ilplLC7LuQ-?VaJB)1bVqun)l9FB{W&EK}D(S^`6~IS$-$Xvgol>2erwW{5`7g$wNAP1cOXZ?-%;mlmz)lheeD`IW^6iS-)i z#n{Su_DPi<`!z|Bl|{*hp3eyAukPO#W*RD6b9BsEguyGaGh^aOeJOECq>o~v&)Gu(2Uj7aqe7k|(j0JfM3ivi7zYgk!k zU!CZ?w5%|$qO@lURCYle#PLT(#E(%EyIv)y7MT4x85(dO`aN%@Cv89UJLD=^=F(|R+~CO~ zTNAxspayXFe!C+!<(G;X~-O@{py@($KhDGXo))FInH*Sysz;4g$@e>>Qp zQM)-yd)q#LEqKlO^YuTkmE9r2x7s%ZpHgGc4*VzU>rF4Cv?(kk5byu-%=b+3AB%j_ z(d4uyP&MT@RczKG?hl?1fP@X!{Z7g5fL#zXjKqjub`F<}%?@s&9sg$1599!m9;kg* zZ>}y()5%{=E}!-Ug+Q_T>*w8tLM$^hb(k#M`*I%9_LBIdgpF%!p}5-Zp{0tuduMS3 z=Z_Dc@#W(e=T(d2C43xx?!Rw&sw(tDB3&)9hWhOroBkdz7w_96x3~E4dwtiTIfnYe z{_kR~|BiG2%kkm>&e8k31vyhn*<>RAUQf5DDVGCtkNC55Ao$Ryb!ZaEszf8?6rFHD z25vxD#;I8ey^!#sr%;#d ze7TbWkWtAfZp$4t?A>VtUYPiR$(gKmv3d@PFPwb9^vrX@B4Gu^+oJ2wF^9H9DdCp6 zaD+i$^XPW(&I|A&$Op{M6jo9M3-XyCG%6+DvUy10b_5BlDdsSgOeM})jvjOD-=zUw z;z+#$L&WwMpjgYF4kULyH66$dj%x2H?S zkJS$D%0w?H%@y~DPhAe~_*_2dp-nURTt?xfayUzr(&y+VjuQ^VlmGqf5`<_-iCWncdC0ar7H?I&}-*ei|*cL_Tx=J1qEWy~E;crCZ{0k+rOfs>iS zmWnwXB~xj)bfal%R%b81e8A4kLGkLTl-u*Yu@MjnusRcdEJ^JF>hs#7$I{XLgT3Pe zeBLi$bf)l+Nqj9HmT%HPzf56~$p;kG9P*N9BG1opDrW9*=o#*27pI2&uEqIfjTh*U zDa@moLtJ9+kSR8|dN|+}dzuTl-#qL;cG^r{Q_SOF1lnE5h6ed^9K|fRiwXYxc9=mMc zwK!cIC*Q@JPt_Rr1EIZ~Zt#U)NqB*1nY2t~RPc&^O6Rwmch8P5Z#@2~>Vd-lCP0yA zFKax&iwxmMh4qe5;6{e<<%Ij~M&jdN;X{R-+k=b|FEwGD7hfJ=XNGXq(8KL|Voa;> zl0weuK@2;6Q|f84lk%OH!;2sfFgrtdN+IX)K&dXNaLV}>KBDLT*}gNJt4z3SLcFYS z%5m-xbbJebleq!ooUfm{fbUxDU)H#R4jG{n_8gD)b;A_K3Tw?diiD#(7)U#t^2OA= zLs{~3YoJg_;}WpQHJepzApwEljzww z+5Q-ho5Jc>BhZUzRF>P1PL4)hLedm*0_3)%&Q2CEL=$s+{|wir~AgwWY5#|S3bt8T{Bi9 zmK-8V>?CR3EZikoTFhc6Nli~w5^^qQ4ik)mIaMSG0)Gf+JTW0KEkS;Q242&L6KuBt zoKwdJ7D;plZ|NEFKO)$LPcBo3pM1_;+adW>sVm##`5w7n)?k3?!Z zP!LZNm4ifs*rm)R^GpZ2krr@*VcI3JDIoM4`RP)$deYiK zJ>VhNgYjmt=|4zE`w8jnwDw{|4Ir zbOkq4i8ni&gvU~1ZDF`UdZ($c|33u=PIPA7Eh7s3P05fD2@^5sC@x8kFqt6)b~6mg z6xV)E8e#%9v%P9O$6tQp1h+9`Fm15Gqav ze_^>vhbYGi+~f6Wt<89u*6HrjhWQcy{#a`{*!-VjPuzaGR!uy&-gM;%mP23`Jk*aS_L)*;vgf&(s1cChQ#q(*k6qajCG&Z+L zT#zy+CYM)D2F4MUCU1ecW>iUg4uqos&;8EC>iyv$9(^5c+y6|MSt#RX z8_mV0Mu8VftbIIG=le3&v;O8DIeB2I?iXv8Scb{MH~1g^CcvB6mWbbe36K(ZqeoK3 zsz2sT;8A?X9GMf&?j1ok6yKv($ZX-+USpww;=p#A?0bo<$A3Q*telWe+&7WR*Yj<1 zYOL&<`l(MyUCL1@-P$9sPeiP2Qe2AlyF6W(+nk<|{cCxZaHv>Z>i;BS{+4dLB(MFO zsZWW+OR^$t*kSEb8Ml#{F`vpr(9M*V4sY5{89lZRoapfRtXupwe7Rewh)5_noZ8sF zJ#-xILG1Ls-Z`<{zaP6rckJ)zD0#e0(U85`qQgo|=$LySJ1m(RUbxP_alhQ(2j6}s z*zh|u0}BJ!(3#Su@wq`cmAw{zfS;YZZc*G}lKWi-pmsae7!1TX=SjpaW`)!9?$e#& zxj*3>Xf^gw#)*T6O%TCLp19%Km-LXcQV7u$WZNN@7|Fq4?R!}PExE+x_@x1f{K|MS zc^sii?2t6igc*~y$p0;jtu?}#9iI~86uzNmzaIg6lg3GYJEo)ql(RhVHhw68*+rmG(;$QJv%IL1rR&`Z^H{DNMWsZIA7JMj)=F_ z-#v_4-bQl&(h_m=CjrU5P|!#}u;{0#MqN|WVBNr#v_*7_`68DK?O-C`^?uM&;3>k` z@$VIE{sQ-lx1R}3lb_^l;b^h7sdc!Q@Mr4DzQm^EQ;#ZfG z%_s_-@MMvgzlZZZh)=)ybGWgJF1DA`y zH)nQf+M;t3--zYL{5u;JG~3dN)dbEvJr!wmFDZ!N6_)yQihKx8G>T*J@-tmyf-_X<;%qM7yx;=wmyDFgCjwj2mhoQFjWU-Z4!@zbrdm>@<^{1WG#ZnaZo() zjOBttl22jetU;44m54oTW`py_&IhJIPGn!xIH0pij$pcW$R*qbFOF&o)9xR-u_dVF zpXy>}($JT4vMv`@$+QZ{z8p1*j2QWv)vp&^F2QN19KTL31kYwW&o$KNr8{rkWkrBG zc3njW6GNqH;=uzY6{1P}zaze~uj>xEml2{^W3X=`Rqs9nt65(UHl8IjH#`^U8;e-5 ze(Sf9-S@SbVM6E4u)2WrqZywTyFT{OI?6z$%~C79Hr&Z_xx6}hq}r;vkm6p!VS0nH z`1B^c&gYTKrle?X2DosX9EIVoo?In1Qh;+;Z@XCyc9b4OF64-2`y+h#}*d zG4hPPzK4fH{%yR%|8(!%Kcqgm#iVJ+3b)-5N5$jjZ?Tp^-Oz_#l!}~0Sp>!#zOA?# zkCZeU*|A?{ir6PxdQ1ep2k#P{9rjwFOYFm+01iCBB{x2Mx&Ea)2RSMSr`6=J!*Myn zh;@mzt-qw0GEE5{Sl>eD79W_l_ge>KtMkvVTG781t&y#SFL4jZgT#B7tz4p(fK0yO zq)Uf@PmAU&==}CKvrgb8^j#uHNi64Mlt+3pn<5YwQT9)P#a^kp*H=gkwb27EHFk z3yNZ;#8tUWQE|N;1~^R`qYFO2ZCg4x7JZ%@4oHPl8%cWPLgPlc^j@2U@fbOt9UbzHW(+QS>r}Z>PBTW) zu<~Uo^YnU27>#<#!e&<7SffTA9X%(z++d0FJeaaNEHfJQuasZa`njXtSWK2GzP%2t zRMX_Qm6lWLtK9P_`qGIiHlxvw5ml(!=?B&`yUuf1jLV})e7DC7uC|3QxJ_Z*Kp0)A zICM0y?D7}H79r~-^gi%37tyz6G0!(&?5sbf^)!N0>!&uiLxoJseZM-XY6F&#{Fe8o2Vgho9d|YItZ}GtL8*Vph=b|I?;%Rhr9#(xCF0>_;vI5 ztPQ?nU#`ik-Ol=zdf`*9shO-4hfO3#{InHt$xi*5WnrXN+l}2$dws1=n9F7(K3DDc zJ#jOQmF9NUe(Ht&bZHzTr+!7%<~(k?_X4e&4`<${)|q=S1x`fy7_+X<1RzC)z2?Ut z0H-zEoC$g?g7k+pR&246f@p?D4RHlCA|Hs)Qr=9G8bC+sqGc~SY=tL_?o2@wMujQk zV~*#-h|PsvDlIUs(+!0fR=QKH74?~Abk|@Gdj&<&k4Z=;@w!KOwO2`j#^Xvc-Q38& zGAxC3aTWHg5#2;^*X)ran8?f}5+xN%g4L<0rEN5@aP76j zp$1x$=-K{JH3hRblz5Wy`jT^f^15lHf4!7Lrk2-95&|eFZL0pb;BcZ z|MGS>YWJq+UXJ}?t=Te8s)QBX8nvMtCj;rR5?#ux3K=%=$KI5~Dk&O6e+^iShew6| zr|()YL_I|k6BvLLPg4=hw7&9hY$L-T6h$4r``Yji$uEJYro>VV5ueqcd+u~uai?F? zcYhhg3Ms0*lS;KhV?NX|wD|#qkp9yuDeGS1ljtSXB=a*50SCz~Z<@?cyrlmpngv+g z1j+k@urAdcTM>!uxKF3qH`SA~W?*XFnBYb*jNM!ooxLS#UJ2}ow6B-{iang}<0WX>ye7B9yYVl)3PFT82>Zc_Hc)9KrBfbJ5+-eC&^8quG-Z zG@;q7bHmuV2`X3phAV-#g|J75|EgcJ-SOm>+d?|z!Fg7j3-Cy3Io6IHIu_^IYWu9NeHFyWXfF0^4A3v+T*#;4LN#SFfkJ@cr!rMZ zKFGDz=I@?{lwd~5A~JFjhY>RqU?iZbU#GhB;vc`+Y9lER6i!n^3Has^!eqni@qBeT z>NWd(F~qQ&)lFK(&P~ zS0czm$(do>`6so>yCKkEKi3j#=wD$F{czi**U1g%lw$2knW z(x9sQY3Y)}O4eW_=yb$DO zWAO<7WP4MnToD6Ba}Ihiw!K&#A7FDYI4wYY2qIe&V`%Lb5_SzFWG8^VH0A(jj+_rK zcz#{O@Xu|yLGV<^3AesDAbEHyY6+!psiubMw!zK)`QU8~RoK_<>7iS&wY^2S2Y$#0 zpDxC*(T)LDNr>iBgtYzN+x2~v*Po5fjut`As-+rq#Y`|WQpfEO6eG1j83ve3P= zJ5;~hi=CZyLhgsD$<4L)*Sq7Jv1=|bOJ7>6%aiL+v;Te$Kjp{X2|`EP%hfgXhp*@R z$W!nHk0y`fMot|1Wfy^x@`WSe|4zGfkfJnnw6k^BH?RSIPk1Dsno`{8@cZ{nO1p>c z^$LTFk)q1xA)Tzw!EQTvcGFa)uMCs!UNHKj{(W@8!|W7x!DIdv7U`^tvZA)%^K@d> zyP;{LvWmy{bVBEBLWiCWlwDaxcZz;85`VE$g;%=()uhv{fxK)3IrcZ8Wfo8YWv3n> zQj4T~M#3Skqbq4tfnbOGtBR^t9Y!N1P1nt+0_{z7;n#FQcr?G6;%suBsacxZ5_$q! z-Ot~*@m)(Tsjkk)F4Uk)DTWGbMvT?`DwrDkPGPj`MWT}C65tU zk)@ZQu*Cld8ndZFhX?hSj`>VDir!CoGQ#!)EVC5)%3|Ut>h5)t1Y#jmqaLq0SZW3ykR)2hZa(myp(s9CJ9?|Cu{2jpCY*Ejd*6e zy&yhW^eWQU;QG>C6)RD5&2bB12c}vfJCR96_jL0_B;59zKR!t#X#0D<;-`|r#}#O^ z^((#Bc;}u*AElFt3Kz7&mmQoBsXc!tG8)ePb%AAP{@S_YVZ-Th-dU_v+I75OFa*n) z^?W7bjTu3R{ump6J_|9|54%8IjEviXiQZUTb_h-susbudXR##HmJUlJ?-#Uz?kjm@ z;%v)j2&WUk7zc!9tat^UVX-yQCg@L!kmBJvTrULy^d2GH53(Ej9t?i8?Pz4d3-9s2 z@=HUV@F-{u06yC8d>pR>DYzYHen%dR2j|H&EcZ z0iZx&vrk#YNG;x{AaCgx?{=^2L!id%AHPCqAX#civt>Vm5Cis!8Bs%D(`SK55XQ{$ z#2}u~M5E8yL!qKkv2}%;>|@&CXp0BvoiTsR2X#88XP>8L5QhCY_PzKn|I}rhqEy~n zZ+>jYd8}lQ(EJsWV_I5MAe~8m8O7mO9B){titwDQgz``_V)1(#fk!SHe-&y!V#i~0 zvEWuRTJ|6L}@n0}L0iv6ABq2g4;@y;e$+pe00@G#)D#I2hbHv?ke;h3vAMFRU>(o1_w7I3*#6tVg2yCLgscuyvIox7;^prXT<*(N+KCU*&k zx)))lQc0gYU~*9*`}x0;pje^8L${4xv@i+}P6#qctc_zUX|W#Bf;yPYPX-emMD2O< z_)b$q?stxt1jF8*7z<>`A~yNYQW7^if=TH+n0^mQPLX4Mupe&TUU=x=SE5^a3y|mo zK7ytjB(@&&jXR_yG-dTXmKobv-@@IsyRG>F3uI$((m~WQh`m)Z8H4qiOP8SWPV)y5 zk%mVJcB$pYl$!GouFRuTuW9pgIDthPU>#$B3HWwn^(<1Pv#ac}7NdszVPg z$bx;Yq@yUkl=Zd8V&Hnz5T;G`01hx_GwmeT@PmDf&hkBkXea8gm~eQ~&Fw_!J*>F~ z=I_9>SX#51KMklW94xaZonAgICI4*JN?ttvZOr&Lc9t;4wNX`bdr|DqY71eSq2$}s zB0#kor%5%)$MR2OebZ=bQhF~B_2Ol9F=i=lqDQaIwOpNJZh8NmFbZt-C6h@h^@PTQm7m zM|^GK6q7Cmjo_~k6+t0BLEctj6|`jiwjff{YEyQzOk5=8)zgg zTa^(*EJFrG@9p1Tu$-2G6YDHA74Di%IXNRcgMIC4j7S+bv2&`VmrxbRTUN7wQuzD% z=T)996(sCo)_0D8=ZUSb%<#X$A>QX-ClVD{S}OMu=ds$WW~q%b7=&;oY>VJeV07p3 z=0?ARIm&O>_gz>Hq%ioKlf&w2wO#fQ79DwXm+iKtD9q~EVdir2B{)ge%~wad4tHn$ zWp=r#$aVOGr)d(=6X7tEjqS=N_0dk_^>G;*M$z zyJy6???Zru91Q~;zjWuToglA(B|Pi(CTN#+wcrJ(Zg@$5{zB;y@x!>OL`F3d(0KIy zx1$UafH|oN>6}vQsN`q6AXtT{cDKR!n}qjU^Jh@`!x&&GrP>(bHx%^t&xe=MSYj&U zm+yn+0mM|@Hges)a)!iPbzrRN9d84K+?Ltv)e`NY0cm@^2WH(w65!$#;+9TsLt2-E&We@A9k3>utBcZ*y*cEa ztma}PI`X_WQ|Ew z(o7A-gW+el=>KGw_EQaN@G2m|w*3|I6iZT4NMdkI_g{ZN%>3o?9)o37)rwjGh<{tJ zo11q>FLasT%MSwE@pR96dvAo-^qL|~|J%q6DL73~Ka{^Y$n8cTt6bd5WoTh~N4D5D zuZdf_xbbe!Lo75;IBfUlb?P*1YqkWn`@b1Z{|<2&dCf^Hv<-tpfO}oIhCqfc{PHpy zHE-)X9Cfay%oROcCAWKH`*NB!2{NUQgLUAllz(YA+0m-V`(7bS=q4c(Bcw*(e&9FXGpGJ zVHfPxSE`$vE3L5KE=kyP6Hm({aOBwNJ_KyU)Ir!8TJx?7Lw7BbbwLU?YIb7eQ;9_x zpJLBH?sl5-Z)|w)+KdUzO`zS{pot{(?>%I?SN0Y1y2LAPzn@Y8TzGW{nvpwgF?OrP zD@{KLYJWegK?%9FE;ruq-@*!ucv}*d9B}dT3jiOT|Gney5@dDyd)y!FAYL@;N%imp zEJwe+&ja8Wx%%+BPsd32jQcFdchEeT5~$?m@x4hP9WXYz6~^st*i)Kf1uF9WXHQf(ONk4_iwEC(E=CEj%o<6UI3w(p{totLlCjv#Uso^+lk+o zLg1Vg#-M~P!&aF0Cd*67RW1mY*P7QDoU184h<^Sh30fY_5(!;P6TE)f0}TCL1#3fj z0$YL*uOK~`$up9bzta~8=SGj{<#_c6g<%;HSh>5EPvn079aG|r6am;tuD$35tqUe6 zNXPxjOGc045E@0V!{ic7^oSttKffLx(UepU-aq>vz->XBlLeP4F9K~T2H=mPn3*2Y zkN5p^@l9IGm5&-jM>v1~T=Eao??JV53IAAWkIFyRV^$`p^7wPDCwJJui>u3vt6D9K zQV+HSdnBg~HT*8FN2w4>*~5dRW^T&rzdV>Xtci}|U>akvWv-H-BmqXFcKDO-e$~J0%yVV@915i85KOAp5G~7)M953cFZ#Ro z79uLbppL!=*J8ld=3$hHH^rD5hjJoij65*HXMbi2zv%A$qM$Q5WpqimD*Kqv3}j$N z6nCF&Sr@Ul%?25!H?_kOnts5^T`h`{fV;nuVzWnhVen!=jbhxfJu=03ks(HtFKvL@`t@yMNErUDb?d{RpIB^6Tz$&BV%w2^|3KDqC&5r5aJz>G}F2< zAKk#E&zBSE+Nw_8+@t@@gLO4b0CuBsQ^JgEYIw-_A?>;>w-v*bQ|1A4KlV@+kVho|3Y@E^Ug2<`2Ll9!V zf@3lqyH9{%ycs;+m?jerX$PMHw`Ud;$Ty>NC9?K7_K9>SNKe$ zbQA14jBHge|K;i?#NsViPR3n>PGEv%>QkOV^w2Op=`JR7-gBP15Xa-hd4eztX-Y!g-Pn~@WU-4OKIsPq~bZ}?q=X|LlT{OxYaH~p`R>sW{sHDDDS(9%$&>_k4VlGKYq1{CKo;#b zB36s6;$=N_298+W^0YCm@$v<}JiHaiL~op3>ibb%3g>zZz6L3k7%HOrUS03*zIvyq zUd@XGOh`Khhe{l$9+-9`ecx`bkIvh63nCJPcAwVow;}!BC_f*YbZfnCI1A!OM^Zo; z@)XZcUk15W&IxF|n+uQ|y!R7jLbk;x3OwH= z(0;S9BRT^Uc;Q^_;EkcNBV#SGtT)QjPe~u%QkN^N4{aZ2W@8Cqyq0#!T!awhHxJ-$ zP{e7Oq58~|t+g}RhPdrF(|~9;3Yk?=WKg4>^(fQs#WVzJQ8Pme)IJM&;ZDQ-eUd$z8m9ZiwiN?%zcKSbdqLO7 zdlO$ioV;5sv(CwPZ9n5%e89``UN5hYZ<5=8I7l<6s;^I6p2eVRv+Kpx?dGH}G=`it zMg;im+4ArBZfju|eMA)r@9S^Mv+P1$9RkOdl5+p$;it5`tGeXM?bgkHs#zqCto5& zB%xgm?^QhXIMdAE?lo`gFR^j>S)NC4C7*qjj{&X|&&G1Fy7@4N8~y>1%^W+$BCuT4 z{=JQLy=g{96*@(SzXsA>zx|2-a(-}7e85l=GzolA8c=CrGZat1Wmxpq^usifqA4_9~PK)y?itD>o;WcoFK@H#tHYw^_UY=>$Cy#5?NhH#8U8 z&WiUv_IQO&j(3caohQVZY~;2^ldaCW5`Y?H2jVRsc)>*XEdSoyOzSc57QrlXd0V5M zJzGlWH^@O{#~k-Jz8mAHTXat2d635G1Xg=PW>@Q+E`NxnTi?jTI$O=1@jwv){X;06 znr#19rp~+Y@N275sBtxX+;UVPFHzkcZ5)dU{-pLIAsW=;rIX|GdxV?k5AkfczZo}? z5!%PJ;yfs+J3|*e8w->$_$fZ775?_}5z>*Ke&i*fM`t4Mcw;KRoFwW`Mhu{ksz&A$ zo-3*Y7idf9Wv+WwXHsFW811kWU3)}K?*X%K3}W{I3a%lb0>V#KNCe0ab#LqXtJ8J1 zNKe^y3LKwHt(fzfasAu3wm;Nvov+TLo^(#|Op&2B2&cSI*>0$FLol z+3|+=^v+-ASw9xm`3@_Mwu$7}8i&9D?K8KQw`saCb*od3P7$)G%h{Yu9EZVr#pT_Y)FZrUY z+v~UVZ8(Y&%$B`wl1SU}`Y^MESf46jk!*}-{1mNp`?_qWHQI&t*GfpljE~&&w%)f+ zq4*CZC6wFgzr+o5ka9Ug&oeNH{OMd{=^DAkts!Ehlr~EuQ-M)R+t(Pr2Ev`E z?hLS}v_`4Z)@cDMqSemRy{_q`e=*KAMXV@wSoy6eH*1O@V>czCAtwJ2K{#=jK*l~0 zbsw+{5|tF7y1v>sY7b-}8MRe8fEGkfnp)Sz$=uLIm4~8D6_zqqhFNB{#PIh1GGpfF z>M9lfid`|IQhyyNDNHu_9ioii%>tv(>8w}|X{HMcbqXV3RgZ8VatE(%Q=H7Es+cWs zR-{Lp_~+Oqv?B$N-HAD15y#0G#`sy?RSShOK;KfZeHy}v8Fq-9#3;}rJu1+;hMOv& zgf(Gh`Y*_tUxQHG3%KNuC>QUMGE68y2aY|8`C}+HY)lm3c z|AL$(_kAwrXzPjVqurzS-_ygpD$=45Tr`E1wqZ%&+tU0*09xIz%pX|uj9&?Bk)bzw7yS$pX7(VLzzE`Kf`J=hU~z~Z{!T+ z?>U&Q2j2e5)=9_ybjKG5ceewUbDomIXI%oT{`b#kS4Rh9sDA$M&qvoq&#Fi|3uwQ( zXGd(7yz%Xqz?>9pag-8WGjG{RNB|Z@KGa>NFaTMIXv~jDrJ`{`U-e|E#g0`0;Wnm< z(b)8;Cb;+qxN^3Ybb`|Qckgws<{Q06LrYLY<&ST2$)$b!_uoTIr#jWFFu&V6+h{9X zs8@^5jrZEXPp+nEBs6oUVrb-r z*jngJbT0^=lR!ZeITf*GS~XKDNe^(_11WI>B{yPY@luqe`UG(zH0uBiUPI^{EVgUh zJ3CK_TJu~AI|SqP`YGRG^o$7mZ%LrVrQ$B31AjTDH;Jb0LXFi=`@g|n`n*+hAW*Hc zPuE{(QmlA z)=xuumWbfww8R0lrKHMTG#~TN_g2oc6m9=)n)wg<6(nkLzSdd`Fd_2-kFMLi2EH`4 zB!cxu?OFD@k4-b~uAymwb}kGcFSd-BMy8byPlmF&}Y0gaeuE(o7!%V?#6cUowU;9R`0zUA^qlx#~Vy~AX+M? z!FaAXOd?$iPjE*%X1rV=3`4?h*Ajx<0<92&@w=ghX&GWeef&y$Ju!k@pyBrbR;rta zBz&%h`%hE=WS=j2uvKx}@NC|(5ht$x887LL$JCU!GKf1?;t_~pQCG8Q)PLFFtTa6i zy3KN^zj2d>zf+8q$A`2+*4Go7g@l1P0j3|b9L8mT(zr+;>{(}2nz4>w9rR>49$t#P z4@`aEm@Gp$oCt?Q1oa18LHDk>TNO-oJSCQNq3eP7qg-|ZXk3Cr@M}TKjeJtUyg17^ z8L`kY;$~jiroCy%PRx;ve1}-+8zH_JW3wYFzQm7#oTYdzu$G&u^(1!06zg!(IY&rR zwyxJmX^RNpom4rE-d%~(6wW^d0V@0K&m!guktDQYn@OHS1H&+0r@J=xXvWa7w2LV= zT?QVgm8=V$Ko2~JJzDj1O}B*d#oP75fmihz)CTD{O_Xcjzu4!iN5aJyMpjc{5sq5V zX*qoR81fn|8KORkr@=CP>9q&B7Ca#AGkBxb?!7YySvWq<~0T@T0OIiEe) zb0+soBzJQ>ewEd0U*&;%cgFD7l@AXrvhv$6M|i}t+No1*3jNch5Ok*8wa@|t$E86Z zj?kJbHD>6`Fyo_iT5$Dxe#5+PmA)|W*a((s%yJamG(z*;pd>OR?~BZ#$PmGdL;0Q% z_2P{SLlS+`^Gi~EADDVKgltY*+39+z)kFx#{RJi?Vo$D93|mhw(!R{j04MX@k_Q`u z_SVi1&-a75iJ9wAB_4A0sp=}V!03m~>@IakWv%(YDMCAj3zX1Ya>+GBoka`}sP?L6 z?AnQbec0>W@HX6(=%~u%i0VMSoJ)HMFk1(NZsV;%tcSmh!9#Did6q%!Kam&JXRLpQ z|B6I~V$!F1;%v2-Y4QH*_Xb#+el|pcg#qCasN5<23KWLV;u3W0uUp)u7bhRcP@$WI zN_$+kx8ZtF%Tn$Xq{cr9=elan=&h_71(2>#*&57O?Ne9S&mYvb-oC3%^XHU782Tf{ zs%(lA{c22u$`v0AnCto5_{0A`$O#tJesUT&H$%>vxZrc@1=FC6X{DonBR0w!H>-c! z+VIWQNauqnMjN(CZ?S1}(1Gr;ZvZk5-{UumVmQ>5!fL(#G=(D0B33=uROCvo!Y?GM zc&w6~jePn@h@hD_pqW_O)kR2J*RtY2we%4=fIV`?o_ z(X3Xtc@chXsIL318?@Gcpsqx14YSzadk*WRf^9cWa^7_(Xh9Sp!19m^t)Qq6#XLy5 z323%9wrlBz7?WRXtowI*-lsf7prEhTaUi^Q)QxmT)wZBb4%H~X^$v3UJ$XYi{is+B%D zHJrq-N<~XdUEo@PBPn4O$?LGzN?q45s+CvMguFBcN6S<$BEi<$RzC>!z}b!(j>!ys zEA%7dd*?|gjcD&2Bx-N1l6|0(TJroluf9L`VlXkju@dtYjq0PPrbQMma(&w%=eDEixhs5 zow{hylubwY>=rHwrkg#&7Q+^J5CkpDP_*oE+bbBNCYWMOVua4k>dE2;rZ{AIr%gdd z&ZM&Aong-KUj$sJ32i7kv^=?|Ch*kArub^#XJ|b?dj%W>P@?<7FH^~! zP!UKjpow3H4x-}wKruE7gx2a~f#~0H z;_~pSW03uBLS|6#x@+5O9-j`lj|~|39wi+zbkw%brUkc^DGsI>Hiu}*jzTrch{crP z<$-k58eL51Kr$OC>|(S70SamXV3)`_M=7nvIT@<=3zc!w$dOV?>*; ztVKrpDM(QDv~boJs$~>Q9%UFqHrR2vMj1|JP7W$4h{n-Dv8Z-d;t(WDfNwkyAk@9K zerFO;lAO8v9&=Cw#82~FZc8puWp!wTnm<8}VVNV;(g9VoN%tbcHquqoH$6x&Q<$!3 zrSTfHJng$JYCyKm9+j_68r{>?7D)%+i}Xe&DX{s;_x@vNnqS1oenBi#er)Q%HSp)*v4~MOGynhfhBHR zcvE>2FaY6}_YP&S6w*G$yK|p_Kuv;zrurBZ?f^PEFk~G^bu~+CKvx%WW-HDu>?o(` z(Je>9YKkjo3w*lXfnX%Uff;5ZY-nLn6|H9elWY3@kWZXhG45yX>6kcn9=D7zRHfU~ z?GG)NKe3Haxwo2YF{BW%{B@CKUqfv(oX>nHF1^nzo~Iw%I@sLZwq`=nDk>YE6)e!q z?bVAjEu0JSzMR6pMWcHr`ZF8O#g=$2ku6L(A}rp6k?RNpDJXvUlu%+^sB7~qVp zla0ciaWLIi+=Bqscu@7|?o;5@q5?2ZFhsI1>Z0%kwej4rh02P&8y7BDhi!F#bOX3+ z^q5*_rvhoUL~Y7LTz<^&R?A;9JIYyf7!7iXq<&Y;n1=f<*FU%>m+mvehO)L({hGf_ z3NxqLz!m@53Uma45|zx8r5<}LLqH3l0gBthYR?u~lhww0Y*J%m&pCCo_W53^e|wPI zq^H=M*xC`f26T5A@p^hWdudZU_oaf(sl*^4zpE`7R5_xk*F_5!oh6st>--rgxS+wE zyIq3uhNjE4hyKe4X-|B5iGwxfvPjFR^_?4#J3;=Uu2a)z`y?aT06n4p2d+Fs4ps%) zz2ElR?P%V{Z@rmf!7vEhFQ}BRY+_rOg~r6=r%Z5bR^PVV@Swd;1_CtnQIPwsUEH%V z_pPBi;s&P6n|^m}Vcb$B!_rdFmTs=K$euQ~uD-R}26<(<{UEApOa8%%Q+q8=FF2?( zX41ojg!iN*;=%u`Ae>rVise zQ8a41o^asGrJKqCzW4BM@N8xQI|X0gUfy> zBswMJQ_&L<4dT0f6Eh#+#~+qUjt^6YU2QFXuTSFjiGipzRTR_ZSkO9&e>tMf*_?OO znQD7g%;HCW_8!#!0~~*uo+0H0<~_sVWF@I3$F1}}GWUFNy*ncu(JueJY*pZo$;}6{ z#|CT+mS(@nkL^DnDrv%7TGk9dhw^CVJSujc0r`L)cSv1+_I@8%$A}L4|JStd2TB?W zgj{`{-apPml`cmr#QQw&w-*NDp7+Oy-&TD8Bdjq*BZXdy+Wy@I?SBxdA~ltv4j>%9 z!+%pDzHEoc0DFN?ZHKD0w4h~ts`|eXt@jqLvX0|}hqWrhOZBD5>*a3{$g+wFz2YMu z5P?|j=0F-maOwA11d}YmWRdwI?8WPpImX-fg^`bsq1%`ow5bifPND9cn9p^#{_h8S zRo72#J^%Ta=*kK?Gcs~ui=dC&+rj#FN`gnu@N)^{?m}pg_}w)k8jz*P2wJi-Y-RA7 zwfkVKzyM<+UaET*buRno_BP8g0l%GpkyG8!56G$#b{N4^Dr8YpCTLfK0*m7Sb2#`j zEMn0;S4xN*ks>Y^M;QuhhBuj{DG~yWh^sc{pc}vG-iRHP_soUPWXqpbeTZrK9dKGuw#h z24-gxJxn8Srt?sNi-RTIqZOzl8|JDDq*CZv<JZzWKLTgRc!pmz`~1+T%kp;3m1m zd>yKPdbl8J|I0*Wn%VcL%d|>B^eFh&Pob1OVw86QU_J?VcAz}90`Fp6vCYXQ0B7a#Ho6#n+Dz zj!tG8E~S_6kGSOQj!ScA&yU!;F0=j(CA&Evv+I(LHob9affPpRe6Vh{`d z3Dce7q+~%kcG#~?ND`WdU!s_3X9yo?4~=ciqFn39!Jm`!X+mg~4s>zdxN>`(E%(=q zz>%dHhh%=%fh^zEboQK8QLjzuvWIwLAKoia=um*D`Xj{hDnXyqXRo1b&ZR^EX4kKn zko!$);L`qIwj88SsGGWeoTg6dXamuU2?KIjqb2_FbC89zqIBE?K8OE!aLT^B`Ys7g zxGPykxJ}?dh6BzYGGJ?cEgKgMUB`C^CD~qM4pZHGI{};>m*&*x-XHPbb=;nVh|3aV zz}evZA1{>GTTO{%K1_hy3L`bZ2bNa}YF6w2D8=6b%i0FaT;uPD3(7BlM<-FKe+@H? z0RvATlAp9Vgm4!~s1l1#MS3n9CQRM6DXHO)+tua9GaB)E>%sX6ejqs1{@r1lbe?)s z?mKBGpnACYzrb(876}k{}{!&6HZ*Yq#&?7wAQ?&c)T{k!t)*@LSA~4 zJ^jT;liXbtqmKUvf3H}G{D1K`I-la6oEK-X6rj9K4?#ajJFY7a&Y|E=K|Xi;_JQO& z1`@^0n_~iP>MnXB&e-niiS@tGcaB)AF1Fpcmf#+!B8C+9^2fwlwfbTCgu zGWr8X2p-2Wg}=X)zRJGIaxPoEx~tFw)pWx;O`b2Ug+e6Ke{*lG|KZ-Vg52oHk_bK0 zB{3OcE@^JzA%Ty)8+h(O6N0VT#B$KfGQNEih5s15%i0@!>OI_G{tg~)t*ja1&6A@2 z{5FxCUi#&P=b5EPZd)Ekf`A3#M=A%2a0~3KIPbU^FH&yNizGjL zjrjY{gsTxU!Ofy(|Y01LDPtyG;38C0RWN@2_hZ(~OS0h{|IF+_1G`i;I*tt)MnMh+ppN*wXTKN=26+T7~weVYpk~~LhWh5 zbJ^jwuR+zd232#9hnMeua6!xz!p2qd>c$~8@+xt{Bmd<|3&k7isrgxvD2B|MXR#Rx zU07Xb5LPeC&v=;Wn$s96@fPYFuj&-n5n!E17_jyq?-_%lxpVu1x#w=9g5ixWY zLT9gi&r~dYQ}+FO@XS~pGmrGsLojGQ?jSCRzKZ?}$9>%|zE4*tBi=r@Qy-o#?ze9b zM`!n^tLM{0UEd8vMaKopZ^13_g@DGCzr=f$swPV z*h%I;CJ2&1rz?&4q8Orj>afhbaN9*sy*325c`q&K5R>?lKe*qL!UJo?ctd%D9OpQj zh5z>I3>s5~F%rl9IwS;Ta22kLk7y=0>h&n52%8$z(;IXed1H%w;AA^r`(MM^^4eo~%B(Q{ojX$ecL7C0D7uqXDO0Y{3LB8`jtv-a)o}2{! zz#&d+*|OJWb)1ZgQjCva3hn}6Lvh%uuVJz2*x56>J|D2r`|@)@MD|hC6-lokzDE7{ z)y7!+vp_c*d!S4}2%r1kW8fkB`d(z_zh|6+5hr^)uR3F}K4y1$2cFh*&oa}_7Rali z+e@Bw4*^nGdxEi0P&4gtd$4Kp8OJD7>@;)LND|RBQ{qrRbe3fc3Ua7=0z2HqWJIK~ zpGh-cdQGPV631EQ@8Q9O!lUyE#HX5Z@j}o#;j2s~Dj@bFN{mBBara|jzQ1L<-qH@Z z2}xF%2p|x5RM(&7vqiB~OpKA&FilsU>1;RVyS*OnTjsgfLroJF8+B)@%rl`yC24uC z)z-b>jZDeYM$?-SQuJHO0}0?Py6?Rn5J7n%oV`AU>x z3Y|0n41^*841FLV1VU$}83DX70DLBt;*}H8?f^dh1J8n69*9`8xqLAEDf~4{*1l_v z`ERz)J;L28NiCo%cAFr9mb2XV$s2n#MV=mEBc%*Ei>Q1}o#!A)zcJUJZ>MVwK|8lx z)PM;hg)-ff1nUMBh?5ITCZ+Wn~Ub0i3jm%K{;BD%QBDvF$}d4 z7PQ{+Q`86rjAB_(_{jZJa1d~uRcC7no8T~|*h05UcLQG5z;ze0#gsZbk$b!r;Hh_H z7c-QeW6OZN|DMaWJFAaIfM}I)ePxyP&yCuN&&n&`RvbJo3^c)+9tF{Zjs8$N2huA? z;KHUyK$cfnFC7^&rLI6@u=-GqZsdEmX7rIrJD+r5!wsh_{FD@mAOtO)$$@G9PQMSu z(bo>#4j0CGd0^(jSB!qTSw9$I+4!G3vsPyCw=mN|ivaamnLRK(zDv-*91)DWzfZB; z3vnlFO%NX2MzB6(CwP1(KI8}G3fPcr*TlbrJBC|11NVde4hU8=kgB?ErK0RbEQqro zILeEnA7=MkZ~Ha{2;3IR((RFk>fvEyLL<3SJHm4MqI1VL!6C+l^GNRp&Gcr+yTWn? z6wpr4#=ETgbJsN}OAyQnAKr+-I~(~-+!t7~?6mh@qeK|TIPIa2GwDaTfH2?LPg78Y z$J@W9kcJ|n&#qqZ&3Y8i#(CyF?sNU(=_KFyn5|{{!_{g2e%O8l4-bw_NP+D*Z8Gz7 z<(ROUe>r5PQE&WUg558i9$n;u1&m*gFPg~+f>_3GK&$ZjwYUpwYd)d|TNBfVZ~v4) zF+2VO#`$YyY(F0I4I`orsu6978IyuwCg_mZ2Z0V&VYP386nj)ZVl#CF`me6>FXemUPRt1Y_Ytc}rDG6W=Jz9w)ECcu+-~ zZa5WWxDTnYPPPM_?g|C#ZR8n6l8_VU7Bz6ekpLcLpg+<`!v0ER-o^f?15zj4J|US+`eT)s5!0Vhp@Rj2O6jm60o!bkI z>u(V`NYD(5kUxF+;8m`yr7z5FUL!z@SL>j#m}ZzxOBeQa(#qM6d!Sbz+;VK7F_>53 zZxMsad&O>-AT6oOxtG6mq-yfnalO{W@xz4|x)k`buzaZ<^)U@yMlDHsV~{*YTm<4w zLJdfG6Gcg8tb`e(RU2G`<+^E4v1Dm$i&s*6SI_PxP5EZ$1O1o7QG1GosnYU7t3Ed& zPg;DSEv!J0W*(CcC4?^Oz{iUBm%PK6d~#Q)nFQ1S@ww{;@6a$tx!gu0UhfAxzH*cb2y{dE1OY)3rSA zaL+*sK~j&J@Q^`^SV?9y zkmAu#>e3i8+{SUrdTZJ26{U81Ajn;EUI@gj(Ol&ItL{nlxtyA7R#$N94lA0VcU~Cn zPM?_&4rfs<4E6FvuRprA3)fW%I?H{SjrT|{#TEM)JPSHDd^cpN_|CJX9P+mkIm@db zTAimOVfkyFMV5uV5Z1M)^u;AvLmQ{5W;O}XQU;iN+%lzcDh&6Y2@!uy2zhY(GStkY z-Sk|-T*Iz{M!vOxHe$WD z|5|5MGRvW4_Yy+fS@EQQ*|Fgb{qX+63PMBoe!RTwg#rZ_?GQMo-dARTXtA)%kgU2q99UP#_x7GeJ`J~naJ3v|?4@J*x11Up)K0GipuUAJcFQip? z)@FkXXUA@UX_Dw|K#fT0I5o2*gRl81a?T*ONXG6}gV-dp&vn;AHB}mj0ViHq0g<^- zYG|cK0@tVl=KLp-$4ypf{FNBidaAl&sL66)RIcUIG2@W0CsMSubK%P$L(Bl>@d(NH zOhp6nx$vM~uHpz1%OWWa<3_Q;Qh#wh8R5$k6ZvNx%N>6qu;sY5DSKz32UTQ3#ylDA~l@`}S^l6EMuV!u9C`Oe! zm#v69z!6z0f7LH%iw3fK4!MN^9o7QkwJSY@w(Z4(xp*LjNk$?t-xY>?Mb#X1O&tm1O)ife$FW-Lt$E(hPtP zQv)-QKG&$(%v|xR#0dq3FIg+fqhhxePb@mmvT@I)9v8b0PHE!vomo(4ALO7YF)G}E zRGw1JXWd$5!73KktJbr! zn0HGxFb(I!CUs)e_R_=jmG9-3#+MC#US@<^!DI=h(K@q`FM0g#Hm#unYMoWbPy5I< z69nUmnhDYy8Np2iee0P9jjAsEY+3LVxLkXZ1oUP*ett0aKnO5LS7S{Y)Q;d zTWRP}p@slpYMhGl(dD=zn-~~ipcftb(YRg3E?;Uktlvnbf$bZ}R|XV55p^ias4rk) zR@YC52EFPv3P0=&ZH15uEv`|eE70%Nyb6!-@~l>xQY)8M!Q4ArvQTHVR8PYgZ_oRe zM=0i>gQTW=o5~r?#*KQ|mX}9>@6W%<%T2eOL3A_Iwew{)IZAmv=Z}6~fIdiwRb1bs zI%Q+6M`e2(N`Yn|obE-i7bj26s=uyzWS9iygnNLD3vXQ}ck{c6 z7>l>k%t4boj&TH2Cllq zt^BP?ME3gE;K3PToHt)wM5X|#8KL`^zMNH}tTn9{*S;5nYxMWHd8JX?d5R3GyiKU%h=W#OztlhJPV`fYa`DGK@e*`?1Kq%S%6kA~h5 zIZ&C~Cp!hjrh-tgt<_4H)M8C&Mn6Vr;~l~rgS7pmo{C`d(kenPr#uW&S-cr&`a^B} zEhqZ1ey&~uimWkzjObh@*Ouo+6?Cl#X$os)-c+McnYT)L$%e9v(vfSrnj^~_ZDWiI z5Z#XZsw%JUIv6VcYTXm9qzfm&xEu~WPS3_^nCI8@cUISTTl{euQY2&$bzeHqO_r-? z<}kQ|(m+BaW8pxm3=6Sqda)N>jGzDd{_b{~*T$z^Er1Yu)}CXE>75O&YK&=Lr5Ke@ zivr?$Sa}L?Odyf0Y+=tg(bQKh*ZzH!nph0!tJ_RoF8BSj^R&+SVJg?tneI?REbE~? z+oj=ZcshDK7UjgPkn4(pT-UQjBae%md>1A7Wyv9zlo<0`ROqWb9 zD7*Db+BSGw-N8i83? z;(mZvNPkkaEQe{CC@F~bn>!JHVzVKefQ6ji_X6yw&K^`B4@)W zJmi7E$eS}dl?9N5u*^A0=HM8^fqYN$uBE0r1FD z^Zj_*U1I2T@$0oBEYq`aM9uGEe`Z`J zRy<9FI?iG*Z_x;BJd(b5x zYM1Fy^E1UV*yz^c$Jv9`O!RWKIY;(t^>RZ0CB_qd7pL*_t?@b&U|QmMm99JyLe&!#UkS&&yJU&VoB?-stwz%O8=53m{P8;J>MFVVc^S=P|OexY5;>XZo84JNy|Ey^kO2u<%dufM* zZF^E!u8;?AcB3lNo5u~N%b#MTeL5`OQ%tIq>ltZt*~OoR>3n=)_j+*1esEws@?mVF zm|rovLnjnZL5kjRh23@HYa2hhyYm3nI)$w1657;q4j(GgqNS^r!?_tp*fwUJga z-|I6xBt#XnnIAETyp)o_bzVAk^{<1q#OXlg{U>yYHzyTBo`uCOSQCplsQkj@Od)k+V!iXzO-f?IE^{G#NoZA;}o^w>l^>pRPq7#y-RpH>oKB{nqsO5jEE zwO!+ZD)p=P$&hte!RwbMc5{|oYVm?jK{S6Ag_34glFB4r)KcjlJGJI1{%fb$&{%^O zsgbRx&X^Yao(tp!J_+v-0h%}&`iUfyQ`WUYGlq(+uOwj;*Tuq?J`#FVaT>ynycW*3 zK}CN0UV8QCy+~ZA02fdLS`#YDQ$2$MwkLs&<|11;T=&45KQG~+cLE!=#?{Y>ZhK7M z3YzI4Myp;OD(2G(l4IHzVALsjf&8;^i_Kzu9=o8*s{w|T!r zSy^3grp!-UvG>R`X@6|qNv#VT@hag;wM7qMZrQ^t&emd!$KN`fBbtNv5EeLxm_%GU z*5svKsy4>I`^Z9{ookie&W>f79y=-8;SSK(wgbMF6>66|#%yLSFznqHT>0Hv`dAJ1 z>F0YiG&RRbu)iyRiA@o0ouj%xm47r&otw<9SI3Lbs~2||RJ5wCy!7(!3YAmUN)f@P z;jgX7&i7w=UZ#4`Z^OqmRb6Ga;{70N*HTz06sey>*59&qc~x&eLs<+c=;w_IHOt}Q zCTOsQLPQa;l{pGDB_g&aU2kh9O+^7l;h)XAq;CZPQ9A$Wp#9N99(?bu40`mNCg zJ_cFL+WgScnA*-MEy|)=hpGI@=<0HR?~l=WO}`7$**dLloOV9&lVPM56QY*n>C%b7#kVQld4e?qMQC9kXh5QCY`=q zRJ@K1)KDN+Z72-(n(7rF8*3C-@Cm3M7|7BFkGa;df2^|6})@biI~KU97lM3w66s-8p0B=*J`2G%=w>$BNk> zMnh{tO`H!~>qT~(a(3Ir0lh)*7Dhk1Jqqu9Y2#G2?%*v$+jWgwO)CF66E85!-Xp`@ zSd5Fos_t3xwE*!Qx=%o`hGi}V(nwrLJi*s;8bKXiL~bdy6ofkKWHI;Rm~$}tT{{mA z@s8L4v)e$zzW!wCDXD^P_P9pQ04c4Vg2-ZI9*vpS0l(rb4`xVu&_GQS(+>cP=zG&bYvLb@- z`BxY5vF$~`6ong0^4^Q}UB? z|4#3o^K%`3(kJqS*hu83>LdR@qp|xiZF#1IAn8j{;N9EZdQ1a;3LK=O3sJCTTadvgHw` zaxLD^_B*wSH{3-_f(Vx42cBxIRgPyh0$jycr99KwmuKQ+{4o(+1cO+L9;rW-TQOmr z7P$+g{N}}eL89(oD9Eb%MK!aI`t5gG_@7O5#B{k>+e0Y6=L<-Cs`PlBoiZBHjY;&h z*?oBQD|4I-_a&<8K*ch<)wQV}_ig$ySheiqe{B4xFsYP;8(a zeRfu_j2{+{Ly*yj0ysV1rCxkW#I0~n9^ciec{yv}C^Hi>mV}zH(L7HnS1`QD*8+mX z$}tR8<^DzvM^`DXxggRgyo=Tk5y%g;r?(u$@n*S0zNGQyW$>oV?1zwjbDx+7ZLawu zw{hz!=uu>@zk?TFuN2RxY5qL1?#DR&v~-`Y*!Hg`ZoL&}eLq^zObm;E#<(h_lxY7t zgXAeRVaW5Im3e;IOd4ghuEwkFe@e%7+EqreFGK8A!1zJEGPv)-KG=%DC}T>tdrCaQ zV!dA71Y1M2Em;*W8Gu6TKH}*wV8dn3HC0~*-{U8)+sPwDTz04{{n{qo8}KBT@i!zQ zvW_rVib(%VL1>ol~O~N!Bf?j9%lDX02V7BEx+I3oH0H+0mf^eLtXI;5A z#{#tZY%ipp<~`k4kiK8bwI5%^c95$ob$U)#R5qA-f9Ato&29{pdCVPm1>hg__qZm_ z^^L=$6fM90n6NNPMURTX%ijkyVWN#~IAB(lzP3Mx znE(7*`qm>1JdrQ>!i{mN7buT1;F~v3GGsn04`xh(HbCHtDW+4jCWZ&&T>GcS-$Z5>Y(O@i2h-K|&X=@&Q88d9cpV8~7>-X{d|{ZcU~GCNvSF)KsgA4GuNBc* z%~trSSguTXa+sX&F}7`ik~u7mKhzU3E=D){$xcl_9XnM%>uo zSzF!bmk_{k>+W6uayx|T_1YHcRj;GQ!N zXaUB0J}gYHDs@3Zpl%)*u3ZE9dj17^~lrLf_WTHNDm6UjReFSw)mUvY}CwZ8kVE$)b~xxmF%DiA4_fAa8;VHNAupPJ8hGq0G86t|xNUv-vV{8<@>PZJ4b*Y;@5Z zL4E1O-x})UH^NTB>~{Hg@<8qT0{|ssgXB}E4|iQC!(AjzR6hu)ASpkI23Y2BCfj5# z>rW8vkeu7YGqDP5XGJ57Fn`49x!rqefc8$8b0DX-Y8as0i~v&UUEu%ZGfr9GGjP$` zupwIc<6NAg4YiHJSD{L2K)(1ij?It=Qf9xtpj;a~Uzu;+M{kj8?`=9|)HE94lx7|J zTsE+ExN;!@_P9xW&e=F4g$D6cjm;Wg0-UyOVP-?CUSzcj7~#nN=c1hfz^@ zUz)L7wvNkb9N1v?ji-gnco_fC_k)2CAkoA8o50oUEo2&dbUn?mWa?01@y4UxlT58H zrjOb`*?_7R%%C%*l;>Hnq+(B9Bn9(0noA6SyZBJ zoLN6yF!-A~59=2VDRRtB$J#yhNNC1<3t|h(nIQFS;*f$>N*Ut7onhu$jCILO6up>i z!fCd*7OewXa_?+6&) zB%XR>`YF!TFxx+YJ7;G;Vw|nfiud)2V&$^e;C16WOxS@sz5DarSe}llzq;`ihWW9J zQ4to_7@{Bpl6QQ;?ea+qQL~5lnh5Ogk&0B`2qtEE?ta4z_lLpMCNHVsZ!w8#R$-Ok zq4h97hl^oSu<(Cm>@{FrzLAYpCoC@E~?WInZM z>R@ObZ6iVbUhy9P?2WJ&a2@={hC%jcnqgbZsmf8TkCm+FLpesS@I(+C z(WqHw*74NTe;?2Pp!OImELr6~fR#YnPNxoIOe&D0y1=wntB&&rZ0E-hzij&h{(SM` z%Tos6#6maCx^iS9Lx;*kyB{YpcD#Fm?5JMGC=p>ypt+dieHm2?ert^89pEt&a zNgy}G&$tVoahT;F*t;RGrbDOUy{hzOsH}ul9#%;o>#;6xY11OpM9H5w=~f%S^*SiH z9hUxlytt5_y4runP|NI>b-!FNXTpA zDx$GC;O##_j}#SigJ+UZ*Y5V&SYW>*nDl@N40X#oiZ}=DaS~bC+SYwD#APVl|3Lr= z0V? zzsjbg1ZzXCy-aYtm|+q(v+f0Nu5T3AVhbNG&JJhO9=nj?FBeLH##24%tM|A9gDju` z`k@KRKt*#kfv}YA;(9y##9vsE;Okmk`TKf%@75dOm)T1CE6|7|_v#g>KsW)kzB?dY zFM-{EHOgK5=i$Xp}?GQPPI(6V9i&wpbMEr$P&)Svx>7z{62pl-x z;YB;mtla3~LP@}8LwmdzRkl!i!BX&-!AS#kfJ#@}o&J|0V`Vk27li^GDJh-$I`&7P zuk1_v6vRf7i2e{fQKWeP1jImJ17*9DQ+MorS?ifpC(uGIo}2BBdUfp9Gax9jidMWt z@aCq*yFHQqva0PudTMme;{*0YL|#=e9meL?l!Kx_x)IK=Kt&`=~QA$|6^DD`zj|C5(a0dH{JD+Yw-hf`*99O@(u+2BkD7@<2KBweO6bqLvy z&1Yi+veoeL4V3sB5udU~2qwjmu-|=N``d7;s_fhh)$dD8nyO%VwYG2uT1+5T1NOF4 zYzGXuP#vS`cO|l>`4oSn1dcHF>p;+daNVu>^`Z2r%_=ebSJNHxjM$t+cW}lzi+0G& zkuk~b8Ay3HmSX~sgKXDfL3Ce$R(z`00Z_$XuG2t|+vZ)MFE?KuNZ;S3-yoj5Juo+v zD4;C!k8x_r2Ahs-d57Xh7>>Qd$J*{x9tKL;Fw$^<%(Ii+jz-*p)H%3m&%E?Lg21dg}?vvHF8k`N!&4q4iHZixS9GN2_DnlB_H|G_YZ=WAdmw0FoZ~iktUiRjFP3g}~>7`5v=o z%bji5$VLd$CoxwEm)-fG(*EKTM8_L~4p)YBZIuP{Q+UHO0znVDw^4DP6Vqy1PBN4 zU{}8ZR%-zN`RSkAoLTYLdO6O7E6%%4iu5wCUR&PyA0u@e#j;d`H~78l5VUGuznR~p zFoMKRDM`qwp=F5ob_jP#7XOVESZ0k)UT&K zkjVXNMkXIJev?mm@mNBxBZ9(FLUKAq^c0_ybTW0-(TkKvfx=OSTqB9P>`M@kD{X@G z`f1x@wSAfD{n(Olw4e1gWnzG``(a)o^={J!bhYdx>+(o0u= ztohj9XX{Dw$e!2SJ}K|^d5L>z7U&ewR^9+4l9$Z-`o)BM@fgtMS^sqn_a=?+xhmlb zCQg=0eOLSs-s){b2tH%bz!ejVscZ1>ZkVpoIeW3eBq#%l zyBU#Gd>$KI3Q3-Wr)@_7=H|YWmPZ?c2o()w(4-i2wdgp{#@>vOy9~m(=S^xxp|Hj5 z3<1Wp8}5EL%iUodYL6T4@_=ld_p;H7*5X^pkj;XqJR;u`2)jm$fKAO1=0dM_n6i>L z1Vc}=w|4rKbDbY*x{xgLxee!G3u71Gxxp-#(qYs!Wp%sK*jCmAj668GwLt2IM4xi3 zH{_|XumoL299X59O3N9djDr})W$Gc}Tux%wDCi=+j5zIjO5X~ith!kweI?{#o%d`! zR(z{JdrcGGbX%=#EfdnFY7^ZzOB#2v2c*uy+opxz(MuN;dYP0Ih_YVTyr&J$6=7*N z%rVA&%h=lct~6-d(EwW@^?m?C_-7_A&~$109e8~(`vGJeySZS)qf%g8=D-Cx60tDt zbG`h<4q}FBiY1sIeZY85{@GjrX#Nku@9x?uBGSmF-?t?(S)bP1b6ZxmkDlDIvB-Y-*vn)tlQF zSl(FjWh&ryBA5h9*bmbB3jCS%XC>e{!siW;T(0~f$rugsb>ouh`=Cq!8Z~0ggxY_u z)PR6i8+haKOMQnab)`wX9*UGgjP3KUIoe;w5hs+N3|$CYf_=s_OCqKLf^j-WTbvqYjQa^~35{NkbwnLpzhVDP_GF>Ou7R7*#TKmQ_F=_j+%nye4z7yCNVQ!=rd(tTNGjMh*M{dGtiDyn>0Z* z?c9z8q_jMILhHl)+RlF{rvVZ@OZt2PVj}JWVCoRKFR0PmnrzC%nVC!#nqYUfBNWho zoqAM0ufv@o#M(rmMDJln8x+tTOM=7-&>guv8Y8+C6CJ$OfHL0IJOrPgEnzh>K$7p^5Xj{qJxZl-l#1~h8 zjhigwd~zWv9-LDa)Uj(Ho(-Qx)%lMle)-q=cSHLq0yq@Gzpj55Yq~HSWq$~M%Yg8K zzg9#*Tgn7tV9fFP&@ssBclzk&D7hY((|Cul3M%$AaxAZHjViB{t9`~lDM-fK2ib!s1{3Np?F?x zM}ccJ3~`{!MQ4NxpaI^qZA>gMRxpj{@O<{- zx7OMew#o|e*5uITchKX!v~-wy&z`KP2IO~OZGM8kO>wBAt>aS@D4PhyU8XvIZDEX# z3D+qD>j!yghWvT-X&U$f61@*;6+TCl3?ehdx(e2oK^ZEB9z+-+D3L;7e^HfNLXgQ&8nxVZRQWOyNZ6d_sY=NSn!K1i}W zT9%Y0AvvePL7-(8`FXxL2C$2d{UE@EA%Ln~5x*C!o1`@#rgaoJ5QGbK;={ZC3~;|g zdCiad67O&9q@H4t-Y~Y_UcnTAFqRtt`>PW3OB%?5yv($f_bz{*#jFLo`stKWcYVXn zC9NukJaSunA)Wb{TXoYz+(#OTmD{Mux3SMZi6(A~eb-<0(%H?nYtW|M_>WG-SrpYs z=1sm18PmJ!=kbn&&mOTg2>amKu8X6D6JYcj+UHtfh;z|LDA=EZZ4KgKgK|Z3=ypl(42^p;d)kuJP4Q zxMA5$>N!aHh{g=)6pQxYV3;Ny{?5aUZI1Qwt)|y+y6|>~Y-zxLV4Fhl8o&%4LSbTG}9x}0;GrVmRZkQt@ zb=RV0wEzVvKV-Q+a20LV^`cV3Sy1-51c>!i$?!*Zltt$|#_wmSGDdb~@$MxxF{6^G z+Y;IBE2f|kzPRUu-R&2oXRFkmNGyR|VexXuWBhes4wa)h=VP=u(wn}q+uWkeTmSHY zuqRhHtNysS&SpDAiUW^G72HIiHV-PoH#g z%3TpIPI|eE{tvqd>e42)kWi z$X~fhpup91_hIj~?~N7bE0W~1L3>1H`Xc;+Ep?jHrFMtaS_>cwM?Bj~ymHf>72?Y^0&W@A!4}_Bnb^G(E+O_z)t(G$vT& zp7?li?1)N8s!GoRJg8-VS%tvTObMIUAN-) zur--AMXY-g5Wq2e0xSSL16M{(n}BHhXIFDC)d&r?oS$=G&sm57PprIuXXF2l@>Y(% zlip-v{z&wDetu5xv6#LlNC^7jzy9LW_yi1vj0yms6$lxCx7gce?s#XuUKzhgGFtq= zvx9?m)mzK4_Yw@&wiK&}aZ_Ad>m@dB%3E$5n(+&UIuSGA6XmS$4v(`b%Ort|YQ(g?3rS5_O z>YD~2HWLd--dh009+TTIetz2mqL)4+Cz2N|RpaIoV1n28T0PzajatjU*UR+{ICBpe zfqS?YEdLjNFZkYi_`!%(?edjw%Xjm!y`#i<(;>K5n8z43%(D>ly&4g3^ctM_nQI)J zq52(>tbp(8)G$d*n#PfB0CNdPBUWT?Li~csd;s-R6{=@PAKyOSsjL%P_h_Mhurg;` zF#c=b@Y8w#_{#SEXvu_Ec^feF>GuKHce>7Cjf1}B8@Bgurr_%n1EZ#>l{4s929=?2|3cd&E_4e{& z%cuVSU#Icmdz@YJk>fuO`a?DT!(cWY@Av;M9-I6}Q<3gc^uy^$1*xw|n$vrpiqc6^ z7?aGVtrMe`Ab?pw;f;L=GdN#)*@N=1ia-nvc4|o+>ojJvh5-}u>Dw@(k*@z$)!q9? zd79CGx-kyllZE?8=l{V>&Hp``jraM#cJkQhKXV5n6Ac&>@OTId$7J&5|XtRUmR4O%e*WXXaFNvW&(H$m{kHg4Kg)r&B64+FmQQ6HjD%r z^40Drs^~nVY2um^&He(3HmqhHdk0iD3fC}(d47>4H@G3`MO~AJ-j-IL%%GyB{P&pg zKl;;wn*VP+*vJ3f&GQ8DKh(2h@2RqbJ`>4JUCZugHp}jxFV5ee{B-^OF^QlUYGOFo@a1CPC z?v*$_P`}4jcA9ylf{CQ->pp>oPv~=PpRPxp|JM7zfd*)s{%1N;`Tt}v-rN80EDOX1mq*Q653z|${D%v3O=E3@)@=$X1=Hle?tX!@`tPUXBR(@wdJJ4SH}L&uZOBRc2i~SYLCkH#r)LjnMcvh zz`_^Aj}P7E+$A58$z-0z<~+w4DPqludTc{1Fe|90|J=705+?5|$LjPQT- z(nrnx%92bd;R7hiyGQvq$oUpfexpy zA&&nRCb5Bvg&%u}kf~|N@k^dfmZfwh!6@SG&`TY5>zlS8)WdF0=V@(}Es`vk( zKi1-Z42Q#g{Lh^{jpe^HnmFz$q(7cw>@j3N3ap{zC+5X_u-vC6+4};dK5IfmcbAWr3w$H^f3hZkW*LE%s+g1sUPy1E?@;{w=2zQm|qp% zO=R4AqVAh#rDPSTBNKzO41y0C8k9VxOxvOTbb#z=E$y3A)Rpo;U;$NX-olT)uTh_D zP`aAz&52C-5e7eoK@hOFRLjwJ8w^)S{Gx9z)j= zeI;ogUjV!y{|{c1T3L1QH0+$a)eX#ISis!R0ta+uoJ#F}O>{Ua4{f+ShskF$Wg3^Z z8C0ibX`GQ|!^v3In}=o96f7Sw`u6s%1K*%Ieasa~Ync8ndb^Zfa8kN$yv!?BhsDPN z%}UiKs%S7bHP+Sos~#2%Hc3V@Sk|G0kQ^we=wwlWh`jfUQ-Emd4X4OFcpKjFK9{Qr zouaa2Rp7LKMYc(kFfMXOFn!I14`N!m5AX(G#IoDJy3GjlOq&sBUc05N*5ou$-LT`F zc-zW(W;HWY-%6un=YJCQ6Sz{rrnZQ*aGjj$6_Jn{TCWN~58x!mWnfJK2(L^N9hVCU z;J|4`ibm_1JlY0wBGS|nX6}0tJcTTMA^=)`6NS8q|5F54r-(?3V??l>@S_iL4rNng z<#GKIu0yn8jZ`fI(hDlfy zMOscP&Oa@NPZh32Np5Ok_PBQ+7wk>aZcnd~QsLDg)5`g^rA49Ti8o^LiW3d~ic7q) zj*p0uP!<1{BxM6m(#j=cp0b-!Jmxr}ta0IsYn{^ts0}WSIZlik?Lh~RIMM9WTRko zzPGYhg+%tx(uFPUzDw|XXq3jJ;a3q-|94M`ti7~DaangZ=V{5Vo2MYha!u=VuV z_<-d3KFsqUlK}FJf>@;Iz2@J=jKU;Fs9DQLxU5Iccr3bR8mkEB~FTI+Fcr^p}O zZl!G*U6B?EKpcjLs#O(It};c&6P52(3{n#@?s;s%18IESG)s!aPa=6Ly1@DV`ugIE zD@?2PrEJ(q!lFF)7Z8opqA1ebq+#4HnzT}s9wZr&RM~QKPNP*`!0hb8>4F0iu8Mu^ zQa(y@=JSI3bolHODbIgOd{rrQe=mlEV9GuTHD*kE5B92#BD!laKIlB(BeLc4ATN^a%67R`VwQVwN-N<2%Xxqsx$ummIC@*D!)>NSy zC^3mMf+nAAqhf|rXGp9Rg`4|bP~b~EUFt7- zC1&x%+Hpw_>x#-)lHW~M)Vk$Mfww&q9T26~I3tul;=nkFK+1(Mdvx%{wB_TK_3QQN zg>Ws--XDYO(~FKtcU_h!J8wW%y#O*oklH9KlyZ$>d=9WsDKUxjB*1!c#8!!Zi11d7 zTueW9yS$U^mCyzDO5pisZG&k;5JQ0&TKQ?$_8Bq2E~Qct^ot}rHqkcn$+Ao2&yEFTP;A^ZX32p0#@<&O&pLL_Qw{0wV}yZH#uZ3f*vQC+`BnUjl7%* z4FaucNNuX<4Qbj$b4p_JvM*lx*!Ph6YW7ckE7U^&^PU{q>T7|v`TvbH`|r_sJlyMl zcJW~S&m}BYSxl4d;3FsAP(mc1vtaWahz2R}GqN}2P75I?LbV+f+*WooE@IA7=g zaQ>IW%@Gj2wi~QwFh_)q7&&emGr7acn8`-dsD{HPtILHLvL=)Pr8vBzL)c^hkto9I zOA0s+^A2uu1@TYdHq7$EZaXaid=%aIzrs_8{xk2@{1B6VuXf@;`fQ>9WF)Pd9q z5bZUl4gzFxGrX#*!x~|(2KxAjd**(7)`il>w5EY-Oc7KK7}4M3i0q`vNULSwGCboGD1=1)1PXKkdhx*cwMK$FAD7-oJVOAWzNB_NQ z68W1v+w6Y_L(TqYHrU7i+{t5-|6x{0!MmBY3wLa(ZS2CSi5w0IX2thO6iAV71v?&F zVc9;$lzfVs!Weyp9I2445yfhjc@J5Om%c<@<1KJK^km%HwJO;u$teW@l=^rTaQ z=8?|3vZYb8(RDC_q!VRtH215n(XNV`zi4MRv@E@~7e>Ux9I+UhMY~LC$uRpz{B{11 z*a1$j*TbB)aq#(PlEYW;{vPPQV&Zj5Beq0r17zErBFZ`2DWcr1mQ~1g%-g)tLP(!2-d0mtu)uVsJme4Y4_3H_TfxDjVa*(PB^Ery0y)T$I-T zJ@LrMevt80>7;Zq(vhcu5O;6~Hz1Lwp?cs2p76yDC2$1n&@$t^-^7f{5#2UYglRP& zDuLO3abwkTXc}x~zC}S8gYe^N`8BT`w{pdsEcE$H*{;0|&?mM74!B9KI()7$Y=Ril z-MVkYUfyQOl1G!rVqIm=w)E&3MF}sC_K25>SmXaHl^y7i3#(C$i5qInv#$8}G|NdK)UCTT7tp`sgOL}cy-l;>D1&|Wl)K(~U6P{Yb*o2^ z+U{p7Q|Q#agxUUSM*pd&LqiSVHu~S!^nb(QXdnM)CyyxqQGexTq942CK%0-nKf$Y| zB84yhPD5i_uT2d8G$NUCPZ1FJBuyE8$G1GG;_Ow zF6gQZN~V+9E9QUnfRWXPp=ZQzOVZ>rKf9rB80Uo-`%vzgXlAyju7B328T}`V>5=2V zjAt`d{vY;dd;5=_JeW?s`Ive%$1-;1NN!2^7BuNr@+1-#!Bl|6KROq!C{!;M!PMht zC2Epn(_sMh3LJ0`VZY#^T`TaK>PZ=^hxVD^CN9&d#~l*~d5P2>CWY!&-pI>LX3 z%d6GxZTJy5J;yACcTRD{9N=*bZdXyX0l%%hD7+03qexRcA#UdvNTB2L1!@CLP7ZFM z@2zqO@?;6|0gh00GL5$(i~{0v6ot#MfB{LD9p>QRW`n2r_4ySl8^&{-ptb9E&Tc_Q zH~;}cbNJ?THQ;w4%>{k~!74|1=D@?qQ*5i3Olc$}EStE}uE>zygG|A-n+rI9I(>klJ*0Z)Jp&b*G9Cfue1SYBX1$$aP_tZ&F5)Bk@Fp7z}jMji$ zsf^2xt=452b-l~@5s~acQmx)j1av0~OB~TdDm$X(jh8vyGo%!j&bAOoD(5P?0->V< z#i4(fl4%Ch2;0~Hn**HpPILOgdZm(eDzcvVezJ-SL=q4MsqRTG)j3youb{S-3%VpI zm^6EAt!hdF&4jRPgBr_0CAFo?10->Oikg6|3KPjgHc4R?ZGi8gMZp#crHA)0?dQDrNGM)T^BHTiGAaq)k- z|BC}|e+%MmEbq4C$fTFqb( z<_~HRL#Wl((#t|GxOq@(6o%SfEyYc<{m()|KBoS6IO>no{IA2|bZ`H;lLt#T58B>l zzPHw5unIyV1tpziD8w>BO+ZcWDr>EBm>H@ZB+IZUPkf}N8UTHXdL5Ltm#e(MBY{pw zAF{B3Dpq215-4sH=mMv7tzg(lEtw>b4u*619N>Z=O@fosnBZ-g7bL8e{GJSb=`JaL zdmZ`(52;d?qA6auzn<2N0I)Q3G=L_8Gnr(eQt6S&aPs0f!DEX%W^UQof(a8opK^I= zsA-#B%eWFHx-_KZl{T8>b*+IEWXq_8ZyQSiaP47?yc>NKwPscD6=Nt=1`fNzk%uwz zZj7T?)-*0s<7atvjYXP{v{z^8+FPnO^kseXLN?=5)o$H6@ht0G#%Rj~sjFT6Vw;wy zS^Gx#P3NKRPB1oBNmLBGKx&qbHHl(W(v&g@KsnAhVFgJhLPwZvWSHq=dT&T=UcjX# z(Ftxt*8obfAEGcXuzKl$B|#Hhxw>-n0qn0{z@-~YiOodioc{e@cfJ=%9PK5kPdcOC zugYT>z;(EN__hp^0A$Pfkdj~c2$f65z&?d!H5{11+q2}CVx|g_%EOGUYG7N{W=X{O zT_Pv-*R-%L`C!YzXV_2}+N>l}1Xe9hQ31Uki7J*Uj>QF|~3E zr7bUcu6V^qbiB0OKolSiW)s8_cY0foMQ$ySACJ`1225nu(sm0HD>Txayt0j=kXGsSlTYoVky9PsqmWVx z)<8z}2Ah%45^{a=`38?8b~+6sIEMkiLCwNqgH8(YV*x%aU@XeBA-y^lD64c?N@|~y z+O7atyInKLxpsP^LdG#&DQHJEqpnfgi=yPi1q1OW_q_;j2Mw06*71nt-Wq~@m8KC~ z!np9F@3Lf-=AcLbzPnnG$S%xJQ)WRpLp!Z-{0bm;0VdOzLcj6in#(21uK`?tXZto! zSNb=Gb-F6hv}HXQ7cfK9EcAdj7skdOSY|p+f-7aR4WnZ2*sHcsl+}BZrsxe$l!rPs z=Tl(-(rh7@1x=&RrVb4HVAuykJs5s_6tUCvcNafx+i9$rX$4UH#$zz(&#bul$?_(Q ziDd}U4tr5#S=)^5i>o~8Y9UH1IwtvqD1i0#ej)TeW6lg+57Esqbx+`*;*GO*#HZ0tHem2Ay43BdA9Bv z<`M%GHQiZ}H_)fZ`SI-Y)MQBvX*)wyi~=js)LR<1T@u3@Yht){zyId!{Pp{* zHii$8nmbMRbB*@EgHMX z_h%NaS;%n`UqzvHDg{+ZA&>xNwwd6F?2t^Df%X|Hbi2N2RLJuo4`e`NN^lN*Z)7IE-rG_QP;1F#@i4p}z zC6RiZ-)ezU+-o*bvZRBO97$hGltsZ(g2AYn3IxBGX@g1wC04Dy+6m9`&6Dc zl0p46^1|gcvt`@m1lC4W;}ctOBV)A%F+*VWS{UB%y*>Y>p1Ss*+!EsOJvthsB~5TQ z-m=;pbc_A>Xr$%;pNyyb_%AzoD)avr3kYta6(l|yw@HTIER$6%G6nE!as!Hmhn0lc zD(>9C+azOtQrNjXBI@FbtZ{-NmAt%!zg`zpV3CDe%uBN$$!dWb`1LXMR_4{ zOpa0bt?i;gEF(&EEcqysAlcsl^uWp6w;cd7nB(-_Jijs4gfZm#S5c=^Gix$hwq6{N zCVRj+yb0sOeBrR)J)i#x{Y3))dLrpl{3OeuU!WNmDXHuJ_22LB^}HWm5TMWNlqKi- zHjE%&cQ}P^QjmNghAPytE6j0m2jFbK{v!DhgWe^WOkW;PrZ2(aI*kum3;z!M#WD%d z_xZnlkiUUXp8)9-DRb+EEScdtjcJtN7uf4~ldRCh$Ecs@-(Ic9;NB+IEgnaTTrVEg4`E?o-xO9_n%#Y>Swdp!#I%%CKsZBM-uGFe&)H_l-F8n!P z-N+y5ixPlV!hro=xV1ek~b6ecgmmWr`h?$D`lcGx z*yZE~GN{%{6y8FA<1;-P|M_sp1rkzYa)w*NJV#rM^IYNMkL9;xVRo7W7q+JXys)!P zDmECek0n9m;=8lgbO&Oswlr@Qhe# zq(CBOzR3%?lqiT+1s&balNeP2nqYY~eSi7p48zi}ZT#1_S+cB$0V-LZKJUet`!tc-4{&n{ zZ_8?U_w)B%1&IJkLm8Z}TZ#THXLjnRFdSSc{vm{=k5n;BArUa<`hlOd!Yr`q=4s9!vKtno} zanqe=cghF837@UCbD(@{EDw{cSIgjUt1yEBa7^9HNt`l#O`F_;rI+Tc2JnQ4Y3yp+ zU>_tLD}^Z}6Y@+iE+D_eS(8aOdkXq$RuGzb+>y74G*Yh^j%J8#E1SR~Vx@oJP(cc2#Hwk@12_lcG>)#U@Hu zA)O^R(2O-VO+0+w0VMthx$e2nR`C4f3S6C@ynO>$n3@1!6YKakA)Q1ebu~Jo0UaP& zs+1qu#fyVOQDR$7%{coLzZtHh}(ksAMJI^663cJdJYU*~#(!=n&&UWm@x75YE7Q%eDuCV?3LN0J-4mX4(0#amH* zSE;tpZL9SVl@(mU6wlJN=qC)G6}Y+j+8di8xZF$@CKzDk}PZ3|0}$ z7%b^UeK?CGFV0D74pc(;*$f5~kJ;aqwME~eI4{*f{D-6=k&4Jtjina?oYQEP7cl!a z%<|%wuvmOgN-9E&rGm~MB&Tvm8-4F3M#kJyyheE`_6=8Xt{l1tSq=8F{5G-0Lit$wbdx14954=-RA zVp@^J0j?yJ_)aTeS^tRq@@o?=xm1aHn!${P^fZW(7#3D2Xiu?Vq-XgVvFnbF=gjV zpIUEw3ChFvyaeiZ-0%_};%=7_Y_Ziv0NZBP*Vs=5_ff9-EnGvseGUSA#PDpq!C1h) zPN-3mG{NrU&tRoGxC--fB8{J$Pp1h?z3p04MWt$|=-X0;EZeCq|DQymmlHuw`1$a2 zQ=9~lC))b_xg-95ICSq8ABgeZWq&^$YLTQ#l*~6*X$HOEG>P*f^FnGuXZ`pX?M5&w zgXIW68^Zn*YQp|CpH}+6tY{Pie2f3bU^dqB{|*QH{9ikH@D0EP_CMwdKbGf4Qux(S z_u(rNA+8XQWDv>W9n9`;O70+lhQ1@U zdrfcoNa`5)5!F7-&{3N>(6Ae5Atc8=b2H}s5IT!{@r*l(s{k9|lK(dMEsu_#1=&cB-Ep4ez`E^8~TAL^76bymlP{;J0LgN^eeeNs?{ThrNvP2=yr{p_!%DE z>rG1X8e*!$)ACT}fQy_{c8LC#+!x8jisX+J(zvVAoY)%s>^Q=apbxZ)^qvVXCdpi$ zHc0}ls3`!+w>*Wu$yR76@mR%{zBIX0mVh+zBA-`L!hTb70bT_DCY5qde!70=XoU?U zC$?Tvd{Zk*N<<4p%>1j-l@t-mOTF`q0}5>@tWN!cKA7=z7DbVM2a99JG;3;UCQYQ+ zK>X{q!+MqyA3DuU-v%J}7Z3?NB?yeH6@qoNaUTjly-NJM>Rwb1sWj(;cw%Ucj{z2E zXa|gyxAvwv^mIF1(^6tkv2B1Cy@rvu;n!HgG@@S5iKBEIK7Li6QV;Pa#4UAI zg#!Fdj6B5CI+GASq#-dgsG%hmv5`TsBqbK~uB3bkp#rq4L6gzPa*h;!^B{&I2&dIp^y$_N$Sn9vYHfB-)@0w zBd#iAzu%sGS4w7UzqVZalE;WW9u-{;Yro+B5z^E!8Ds4iT1Zlf z^Z#19AbxkO=&u<;6gja%jpUgo zS;(k<4D%w4=a|sTWbW`eIEg-Zn;fJWyoDL?Vjvd}Z+RfC92PwLhl=K_swR7?#-yhr z@vd0F>_eDCK+q@>JlhvPpAuEQ(yZD;ROa0pW?2{*ec7<57FHtIDq&GY*UJd~J1BFc z_iE)xf7Z3P*VX;wV)b50Qw}@^LW&@2Yg--Q+ax1e#VUlh)-VaBrQZ{)T>M;$B}8fG zqd&QcIB!wDq+t3nWp4ooF4JQ3I?Uw##okKc*JMdg1hs@gxY9I*Y(iV%-DM+$NOEV=m= z`UNLx+%J}|Vxa)O%Y!7mpGb=FISnm!wv465O90lEsavJ+<{8kAWR;!f7l7n9S)V2O z7a$w8#AIklE%NvIwz{(9sjnN#TYgLeUQc*+tVbl-1`v%hKL+3*$HHqH*QM zRAK|OpQN>v$>^mAH9zFi^`UT5{<*SutkgA+W(xp9r(&SC_k`RdNCbu%#)*ZAG;&2Q z7EG2*Ca-zELC%u`cwp^CVE{A~4)E=@L9(c)xqEaa-UFVR^1tXRaQJ@dWuX_`oW;Ll zE4ytcfi3d?WHM0Y|H*hT-OK;GcntAhnbU6$JS4#f$r7Yqo_|QP0BfOOoUbx;S}54g z$bsi)NuGmM8sH@ZgRsb%T#46}_52_?q0oiphID0#_sVlbOb|QclGwWU_1Y=@4=^!z zCx{e?l8eqz@WT1r;uKO13=DLLNOQB=P2~p(r`c*d;&MqaR7ZGnM2ur z9bl+%6-2dB%txBxD8Z51s|ifQkx_Ihyg@mHXbWM7g!9!BO#0@bF%~lRmI1~i17lx~ zvtaL7*_x@Q#DZ5@M8|?(xBeC#A0B?aKK^?Bf4*M#Xe-B~QGbe6?&=1k|NfN2j6{Q= zNXvWGQtP!>csE`S0h@oVm#Zv_lRR&R<^Rs}Xqg1?6%CWRbF9Mb{DE)7VK4?94B0ym*RKRqE5 zL_~gSU|b0-;v}uLmzEQ8TF?kR{~z9 zk5xL0!=lDD&^G^%;Z(K%nDqO5|BszKhVvgg-=#^Av)rLt&Q_M+&;i3aKeDUIg$m#v4!{j z5_4CW(^jnFB8)&fe;?)<^nwlO{RE8t7XIYK|MO?iTafDmGNGS8|2qg0kVg=vUL{dA=37BzjXc-%0GdHZqxr!1nNSge^!AtG`>Z3XF*qkrZ(OHtO@Vdia|bR z#v-=(O9>&(y%V>cJ<-!(3h>M#7dg@ zIEutN5N*0dWzfw_7{m-b8+wIfp{FlKXtb6#Y;r~DAPu26^V6eCU z-pTW2o&WH{ddSfa12CTY2&x5wK-N9nyfl5Z8`5?Xd<5`FQ%i}k;I~fVcx=+`Gh^5#80=v;|Tke zz-oxsxIP8bQm7__*-Qu)&~6OBuIT%aHf#bfT1k)IkWI{O(AZwc`m;SX<-b)CM)~1; z8UZtG6#i+O{5PErwfKL7ef+20JlOw#9WIZF4@ek6M9p6<(XjXncubtZa3s6VB`j81 z3_Or0w*`ok0G_busAb-ejv?oUuxwDR+(iI*7^OS7ae(vfyLV0*AL#(c$aB6qxpdHf z|I48fl5A3>rG*|&p#g7UmciilDhuQJ70H4T#`CjzobcCgK0<$m-N-ut^r(X#jD5&% zW|v;!FW!7iGf2Yhi#N6`d!Z`@c}7o?B2hZYj=@OcCG zu|6p(Ml>S<4b5T7Eo*5wX8H(;ZX$X{N6nzQ&>*uQ=RY8FD-Q@u5Y>>6J>G7VxZ3Zt z8%wsgyWQBF!S>9%?(z1VmaDnehI{ySGiXMRpujn4jmsS*EgI#BJuhr`);fBxUaQ}6sQ(uQII zL7Jh%5Ha2bl$2;2fG!sNj{^>9`d|F>GD!;ICfh3(Zjrdf0+Q0enMcWu7h$$pK>*|y zI0r0kwOIrVm$xbya+ehfZ?2R=Z$5z{xxyjxdC4*e%rRyjN=q0}<;ejJUO8%Dl_Tir zWlni$#XzzmG*ju8K`Be~ZsISmLlTxwh{{bTrMx{NbzvYzX~IRsJUjPN=6VLItgE*w zH>#BsPP~RGEa6m4p-|{4XOJ%c*NJ}zGk^{M!6lrBd68}C^&!BF85{&K&7kiUFgOOQ z90GZgNKyzf4{jLe1@wY$#X3mK;>xz-Jk+|g1~2U2hTU@Cu|ni`olPiV^@t+~k#yh{ zXb!0=#VhZs^NL~8#`e(%OBC+650C+$-<$b2=KoY~e_a0GpN!P}55wVfZ~w8Arvd-} zfgd73UU+eU4&7uySeHIsFRZwbx4~*aVWb@NTva5Ph9)rxU>YSG5@?%oI`KG(4OQ~B zFPGScr*s~zMwP>SYs38ap4oa&v;ChJNrt`L8WDhP^8aY8$^YZoKK}Pkp62qu$iJ`1 zdH^^*y@?mI1%nf+lnhvioMk=+h=J(J!vLt{vr1b$QOYy=0V7GWg^7^>#gAN^Ojbp@ z5|hnvt0=8JS2!HN-+Po#w(;nyts6nxIxHzKSh9W63=l_!HO&$L>Cn^`x7RSV$&V=? zPZ1fTPPb1vT6){G_gW@9Qz`R6Y#EBGs`rMtmn_$d8H_SiU3Lt-&>&9%QE1IlLm|AUvsVLWfB0obzt2mR4lmH(%c z!G8bm;%Tt|e<70(yqjcIP}OyoL=jeDd-JM|&({qtf9=gH)c==BQdI46BQ#M+$5+Iv z2KW=m;2eJZHjD${^s;~aBlx#xpYnw_oJ@~N`0QU!F3-=-zdHt(Wv@U03!Y2uYApu{yFF=Y#8`L%>jUkESUt~!wgvf&tN**-~aCB`3hWkMFF!I zYgfs9gAWTBgPT?ueyf9D`yz$gOfY)5QjIo9EQxVVgc3+$2BI*AZpVFn_5P|zGT8YF zoZ2mVY6tAh&%iy6{bKttJ1gQ%ShW+8N*B|tT<8BAFg|I_Aw)3327K4D?7!x1m2*gR; zTYA4H894a+SA*HhX)ScZJYT{55S8zCJGMR#Y<(WI?sH%1^FZwLi1qo~@FVK6pJW;I z3$P6H!n?!ixv+VF7e)AbYn9G3FMuG7Lw*j2S#Ir5-`1ag%l?eqiPE3Gxj)b=P=~yr zL>hH~btX@tAKr#O?#b!4j*Q%ixg#TY(z+vKsUstIB6eihZZS^B%@*TyY+Z~acWmo( zy+%xZ9w~hui+vun>+_`E-r#+n3@Z9Ovh{h?y3a$U&m*DFgQIqR9yjdsxT?<MGO?5d#n0!Vh4HM9v%*1v=B08HjF^jJ*Y`6#R7c4G7>m z^r4+FSSa?WHN_q&6ni95?7^(%;Js`(crPm!jD@O?T2u9*wn;>)J}^@C?|wSN^A*G5 zLz3N*SgxeAgL-)I&JOzBZs$3GAJZg61Y`@_G>>pXjaA@0f!`7Q_sBF5S zyy>(tB-iQD1}*qi3a~>#&&%fgtVKKBaN+dr3ukECEW_5DWvFbHp}bj!3IPZbf3<{h zLF@^Vtneb5>TT(zSU$i3ro#fHUY0|wUq@?6-^c*h$yde|rJ0u3w*>;~_Y^_|{v7Xkkd}py8hC_pRL?*t$Jv-R-_RmAXC9yKO|J z?@rCA^xb-5y$KarLhZX#5tV)``aOMFPtN44?&ZWf{C%4++ixw*_7!2aFA1}4`#hU9 z>+@_@(PxV=+ixw*_7!2aFA1}?`%L;vUt(qa0e;n`W6+HJPG@%V+qVg~{no;5U*X$* zNx1DFDdhJy{0O3Cj!#|W?hAFLBlWsAZpAa`aBi;+;W%q8_siohR-2&U{8*kjpyX3YCO#X0s7E-Jjcp-PQ>wS zClE{;3PBUQ5QGr4^|_@$aO4h0N}tCrVP<^Do^-wAMJF4ifSsFkeTK9LL^ml0NZ{0c8iOvCniNGr=fNmJkHtEskqe;L!YFl|_He@vdiyAX)5P zYjIk=lA@HK8yc-8Rsw1{`x;{O&|oFN6?E`DT#|7;*Cq9KagC3AVmjM58Q-B=Q+4pEmPXx&U28#A`9npn9)}t zBhEC|DVR1pbWyuHEy5?=-;h>dx$TzogL>P!7qG1m`;>voIQLzb-HE$VhqoN!n z2BHv&RcvN-Y@%Ij$xadMj#M<{$!Si0o}MH=BK5Egx=jFWC4Zudis&gyp8Xn7Y&GY%Opq480UL2fdM1`|}u7*3vxN z;s9jO&mii0atnNz6}_Cs#SsaM_Vdr?R_&zdsL-}wF(_=d#`Au24e56${BTfn^`-IURtdk zjx1MIM{RGaUaHgEH+GQSQ=Ki-2x6NTtc=OSWg3OIp^rTxa&Vg^OYjYG=OSHic;h^> z-#EXt%1#-sW>&&9vrONt?exv$>6=wgA2UVA z%T}~UC&pMmdMQ|VaS+i7r7Q)H!L*s^H=0^SznNtL%-Sx1scaoIvn&8kp2YLGegQ4p zt`XS*h;eL^n_r<{#EmU~g zmI_a0Dm;~_aM?kb3KKJ7c6UpzZ`Mh)T0%ea!X*#ffOlcK_Ww#r&Zr?b8dytN-T_nKyKN2g)TqXUARWdwkMh%BYn(mfZMvy>WSb0Lq z60dRU(-+2b+Yp<%{G=_HpU7N(B5`@)HkC{9d4kC&(fBOk@&;x=NZ6hwNx}2o+WKH- zIP3g#H*feTw*fdfMn?|Bx)1cR{sV^K(n<+$xQ>#LBWHWaf zwKR9aHD^jEUy7ZqdEqo{Xqq{+n`Vw|Hcq3~HclhO#%UzlIEkHPCTitz2E;)^QpXSQ z?nc5!5a&rsRHT9n=y2LhEE-O&2iK9!Dr(f)Dr%%yMU6zOsD5u~J)P5VUWcVfa*P8< z^qGlU5YAyb>!!FwG%Iy{rJk z7r+a=6yHrC0))@*=!ehZ)9A6voREBL%oYWP0|gJBT~ECJ!p{te-TCjAWd64V;0y)Ep4Z8 zO?Bf9%$=dK8DeNWhCAC-guiK>LeeUkHM}L`q*&lxJYx&07^o3bSQM(lnEi zm^3@l3?|kS&B$WFHEL_XHF6aJ_DCECU0;n(c55#~G=(k;a-u0R=q;l#h9I~Bt1QZa zH@BK}k1Q5ZqqY`NiZT93u!y3)Fr#6UB3lcQiVQh34kq7nOl2T&vsD&R7Z2v{IcVtk zI9L6iUOnEeMj?wAmSV9Y(tIzz^?JP1>I^Lb4v-iHF8Cf&F;6O z@Xdz$^MTzI%NAj)b$~4;zShVUMK$b=Z$`r=7PXd&6rpHT4-K0<&|Vyn(HPc4!^+9q zqM`EfdT7`fW=noKR41ih2Mt@CqSj%Glqf|*c~Zt!G|ZFII&hE@H)tqNiX9E}q_hv$ zqmD+u4jKbn#D~@aAC!0x@@Uv>(XC;8+Kxuw9mpY7Mm^n@B&_YUNp?=9} zs?o5KvWK`}4b)ZA-;T=+p=?^M5W(waUkOWjp;~wV7=G{Snt@c%AMGlJ`J9iQv z?c_s@T{i{W{iCBs=d+_D%kgYxW4p7~YaE4OUL3Bid23`{yIu_4CZe&S$OJ z`AlKwGnJhWEbbW}!VJz=UKRituff{Oa-7$kn86xNMo3dO>|1SLT(hrWFK%Eh4n(}V zBfft>Uz}5W!JH(j`2azX#D6XDg~7oF7G0363Xt5=3<=gQnJB@mwNNvYg_@Zv)M!0I z^&?n7oLmRHHm>4T4g=mhtiR_w4#wV11c6lIHp$R<*m`IZmS$~*rI{?C%oI6E>mKb> z5?O4^1lH>&Isnd1uyE-kHhr&P$uwt~@2 z7K~Y%Z^OJGD;&F@ke_55BWjdpi4XIf z#?cPK9IgF8^g%e9HHz$WG_wTunOS7USzDQLCd-U7MP{t296V}f9&kjg1LUa8VO;4f zO>W}JU^cVII3ng4xV5uonk8#&;e`K!Ac)DtqAfy`8Df*+d=nSm$B@omBWu4So3Y=_ zB5KdtirT26A~;BLgKpr0sT>XhPZZdT)s2wO0uA(c-=AKBWte4jYA21HXO1Q>)!R}^ zT7y*@g+5w3j1sYIjo1}Wk?3s0XA?`>OC|E~Nis=aU8Fyvj$pqmQbifMWR)S&Q_2s5 z>tDiKk2u>sr&rrFJZ9u=5ce+<#xQxXA+pVKBpBpj0DaU6G9Qi1LyjgE>yVk{j5BL{ z#+k`yoSAaQ(FYSp97l{4NkSertGw`v1&`B0`0H&LL2T#@y#PClbMA}>qZuWbjEu1{ zvQ>PNpC>WSg;*p44N}cr3+7mfEti#vX?DPvR2(pDvR*4uZ>l82nJFi}GFq{?OfO+x zWGlZQK`-!P$GLA1trQGo%b_Zlau71E*UX>m$mY&9wPnL|m) zSyYl0sPEi;`0i!i^NQXgq2>}~m{7-?1@t(wMLDKentR^X#DY}qOI;ty=b64WW+&}q z0rR3XT?&cC?@_bJBS*HtBNRbvuiH=fk=kj?gv${ERw?x)_adxbknFi=niL!Z#`BAn z7eyPiNMJyQq?urZ{r!ILG-dnei5_eIzsol#uYY{=@Z^6r@;^_8LnZ&;WHOlU^Z)JQ z`3js-zY4@XJDqP=F)h^p6f8wIA1$NWvd;*tcdgxC8TlakeKf??iAHb*1r=IY9lKw$|VTfnk ze-8Hp4^yXu)2@a&@WA&lT7tK9Scp4mnYa4-`?D)>`u)k}H8{Hh=kKn;k8e)Sufg>@ z@XZ@=c7Anz^7ieU*WmTp<(t#%w|~PeUJ(b{PNxShND6Cz0sT9Ca`^jitI)sep)FE? z`6>)xUh)KU{k8%8L&FA6(-K)%beY{|?tV><@bHQW*Ep^dEM?ZJ6bS+v$NT z2yr+6{!4fl+8}p3J#bp0^g7J_Bn!&Y0eRuh=ZD45`Nj43zg!m?s)U*Z9{4-vWKDQp z3_l$DizLZmx6|wOIww&CF2nhv$dL>Rvo#Dr4_wPjn_3h9!C0l0{x4v(>{0E*1DQZI z{hv+8Gd2J7tUuh-|D8ODh7rSLL|J+yC4Z+Qtm`lbX%;TMEQ~fJDKsL&SOVSP^?!bH zMGctI_I5kpCm-M%W-q`8NZoBoSuctx{m%i;Nbh9}d4e#;l!2ymrbH2wOuVE~53thzW>fMdQ~@JXB-|7^_hMLvRlus%WFGp2E3lFI z1b%>sx?gWnMBUlwp}&aQU8MCok?%=7pz}#MxR#ku!6&My1)sn_??3+&d;(WEN9qQ6 z@y2-8&A|d@*!vG1ba~Hhv{Dt{|oG+49#1pOMSW|QdH!fi_Wh4pTi@^=K zI&lHT8XY+WJP|3sfry!Z!jzF|qwoxr8N<=a@FG;dm&Cb?isCeX7(P*?tTGsYRUE*K ztOkrw*{JI$0U^Sf+Pfb}Ref)rM$_&&^Yk`mknXGIMJzfCft z#0=xxpc z&73ChE1Sa$)(ZY@m?Ov$`RAX1|8LX)V#Fmtnl~5*1k{HxiqIsHlWvhvjU8VsR5d1a zlZhXUxRA{BRB9D!62&OaEEKUMg^c)^J1`Fm+va$el5I#RA`*VdV)MXvVF9vIg1p(_ zI0Q7NmWQY?R>NLheUFx$y=9kp%M&`47a4-^3H;M>&=6jFA20+4ttO;zyc|x)26*H{ z55}lwpn`V6FAErho1|C>6X%hHuP^X8XA~iX2#G6}X3&R7s)m+*FQaxvu0wUy-h2#m z?8ikfOzFgsokCFzuPm<}D!b1Yxfqp-6ZZTD5xeNJ$B)P?Pq8zvVj+EkA&Nc$k&P;OZLc+SaY?eH;~RK(J1-U0_c`DoMIBxySJ|-pjXhM=z5o>M{{XK5w|@0>++2i z|KF9OYs2iicUgK?8Fruud_faZ=15=f0RLPbfF0jl;ri!(?=DMwrmtUol9rr*?n_vH z$4?m?9;UxgA1xT*_@y=&kuC*G|0F6}!%UmvEVw6DN`$dLB@6tzd=s<}C$N{!<+HX# zyd>iNnnr72GQ(T4r!nb5eN>hWwl-Yan04^MY&gfeVwO^Sgt63G6$6AMmOLSHXepS& zu67m@>j0Ru@TFGvpxkY`#7B+XW}$PsV1R(L(`16&8%K%*P3Z#(v9C|7RLB~{M`5Ip zR6^9mMitI(1{Q2N$y4R^u1c}XTx#@!qJ-;khE!tJP zz%o_YJjy+ivhB^fN=P*}Vy|$N=axb4xJ1l|Yp}|wL~YBMAiJ7YED^}&f%hv)C^no9 zW{~OB@yv>_+=(y-q;X7BDs~OK;5mtDDh(>rBw{It=f8xPZ^3!-+iy9EKNQ~YTe}AX z%0NQ*B9=xZ6THWxHNo42rZ-)3r`$+AX@TCP-HhRG$}s6YHn_Sd#a)yN+BJXCLORK4 zN?rmhws4nfvX{9EAVIcGk|j%MR552?#&4KdD(kE^=NAfv+7S|hmuV0c=(&4k<3PVz zN4cCK_lf|z?MGDwFVIaH?j4k?8U7bvqv2$FKJG6jqs177AtH@C^Cn1;sY zDs}|`*$T!Zl&F!|h5d(N;UA@_!`MUK&n%~Z%D#!Tdb|tWQNt-L%e_qEdT!bor2_1J z%;H+4%^Xuja{|{mz>h%Ogsjd(hh{imEj|)t4Wh(FDvOrPx;vahAQIbT3F!H zXrV=&dB;ft3avat1Ic!dbKA7kx~w``!(E~CIxg~Cva@&3`Y?K;Ks?bj1!Y>b`VD z&a|)gZ=I&*hR2Mmcyi)C1Ih`+Jxh|LrtmLsHIO*oY@rw~i#<#@m9}5TFt2yMqnxtz zXUe7gdqp?k>(+oq;A2+suOLZ9wf5GkxtFN+6_^Y{9^OGfUyz|(P$l6Vsh85kOoTH? z@2%U_bGq)sz_xSdkM#SUS4iK_rV*!GtwLm^G5pro>e zeT1=p{@aI+k8_sEf5E1{EbdC-qFnN8*^~$(7be>ZY3dm}?x%Mz<+d(gtV?oKRA*T@ z{Pv-AN;*Yvpt5Sdqwyexit)(tq$gw6x~s+`qeeX5&kpQx|TU+Yemz z**Rz3^1Lv(l&fJ>rdV2&N)zE~s`X0x=fA0s{<#koL;a2q%;%r`1OM}fj?W3oqc!1n zUCh0k_x#P3TopMS-mxmBiMUerM->`xgLYm{I7{w`m-2+M+ihkX`z%#y7mibd6S2)S z_u`Z{=%ISAJ~u%If_eUBvgLy0FKEt%@6i~%EN|>Bf(NHGY@<@s_f)KZRxO))$s~X*1n{cU@DOt{}b2$cl6C;>^4LpL6fs^`-ah%v)Yu zUA=#P?mhYR$qU}<^7jzp_xbY^@3LqBKP0_-k+Y5d&GUl5tOfkNcD$R9*ICl0Cy?|G zVo-Gd<~Dx_lBXznnF^A}C?a*M?;R&P$cE~?SR@1lh=AK)s%(1SQv)P0fq`;we?&Ps z_aM3^+-0iZ_U)WoCNOm5=%UH!1OriipoQQu3L?sHz^?@xNy-m>P6Xc41|S)crbv|X zO5(doScsA!-X@6@3f3Iib4-#{(40V&zr;h+LT%8{DA&TbzFFL6#~?(h$4nD50`)qp zy~os~17x|Cp=x)_`nlh=j;-G$BdN%#`fHDfs3%);uj_44mPxW+E@kVSaNSjY2O0b2 zdlzBc)#$r|fy0Q1s0$QyKT@%Ve|C|gyLV9(;Qt1f|3 z4`Z#vZ&&7(x{~??pFnd`J{a2ysTq(=N)X?98I5j@(HukatGP&(Ms&xcn~dcGrJ`kL zn$U)W7QXDN8p4HvajyijN&AF+|FhdR$M34iVZ(nBbs(Y#A)P%3<2ek#fm!JL0|of9Fdsbx?iMp z2N{u}h!}Z;wt{Vtpb-QzU4k;nL7TMpw({Xa(1rsIlJ&BTq*y^#Vflcxz`|{~hwZ68 zIw!%_B)6AUWkX-VEKfPfq#i@gN`y%2*cJkQ7}wh0#^5C>?rypEQVNx7^{J|RpgK@Wi3?dV{)Fz9~nW{M7L@z;Wn})CD1m)@;^aQMs zIC(TyXnizR{Yz2ed5;?6wpAfhCR*7du|i5Grf}EffQ*zyorX=bEHFBl*&F}ClAt!^ zLyB0*Nv)3ZZ7fx=1JhnZq{88M4Tr&NshB`-rQxY|Mrx~@O`58wGI>YtANfBbq96#) z0`Dd0f;o}IY?LzurQW~*=s1cG(9F_gSA2$ED8D7xLndZ_*Fe5V>MT*5!`H8_?CEQ# z;29HZ9Yy)ZJeRIiODSM8f1;zId}2~@bdY_e@qy_2QtS4x z`s+2RLICYVM>-0UZ)mC*l;xP@hXe8Tduw}#rDN=iCMM<}-=-a?POlQ_ZHo>hN)zrG8rCD6bhn349^PXdiqG&!lZ&TDS19hWdn>Sg} zQQ0vEdkLjV%~h@iP~_yM^gcpx&AYd+u4L0KCr;p=9KiEuY7$Iv;oh6fB66|)9U9`y;HMFTt@#RL!L zIK+d&Y!=R@Bnqc-G@4BZgHafb2Y58bXgKOeE%~Ly-2W*gX^Cn4D z0~!!x-;@QaJQ-PT3eD(7uqITWT@^5=8v~WW)j$@e*U6+Y?Ancut|lF>vX}9Xh$3>q z-0$+<#LYwrEsWFZ7AT=PVF&1bT?PC&+%KblU40}|rVV2a}*n&Ig@91kbqA{x)bQU5rq%$6v5-VbdExAB)9%tv0i+rVZA zv%YO^qt;~LRcWoqV)8c7_t||eIylGMKc z=oW-~^RnY*cTvY9n@sGU)4ZeY+D;Ll)F}$T$#X>AtTfZPL78#*wVhA@ z)Sp=l>9!{1ZDUi^_Co#ZNKbcAYNG0g&}OIFb~h-i>-f&$SIncHbCqUc#NJ^FzP4}$ zrs?WMK87(Am$h((1MM%t5bk)s;YtJwfP~r_Ot08Wt;Vk!pKK2kd(s`L65TyrYFb}- zx}?EY_ec zvyZ7Ny$-KAHlk98@zKnGRXlV5ZT3JxpJh}{!&li54d}k_ec=%NJ!}t$oUgu199-qi zVj1MYw~W$IPf|2>$%|%vq6{z4mcwfXR;>=?p3PzrB)61 zs?&NRkJ69*0?XRiHq3&A}9HQBIy=NJ5jJh91Q?mc~b@wywL=$2sRzT9y^HfOFC4Qr=eB?jag z2~YOYmjnzqcwsc1oc>8n{zj8uQUX|A(Lafz@fpyflw!W}VuGL)_l;ZvNXgZitUI;^ zha@-GsUA3)AdVaWd3scOM(gwmvT08WyZ4%dv?7~~sd629-kNYXt)N+`?`Ro;)bDl? z)yvlHp?}}m-qqxO|C`qk`aLgvzHKcn@ExvuzD@r_cDyF`dtLf3&Q5y3l%kB`i^GYf zW{FwhF)oK5HGM#tKZJ&aC~?4j>mOX)EOe z3gu^a8=BBM-LHOAQvls}xvTSc%ZW~EVgas`p$_m&t>k?$YfbgFNmH3Z97Z|8Dxjy@ z@7o126-f6+a}>??1$0z^-7luYLDd}3QN?mXNJr82FxnQQjI&!Heha6r+Utf-f{RPFwNTter3LA4U{*)3CtZ{gNX_Pg(}lsIf|$b$e?@;Dv4f-oq0;jKvmP$ zgzjK9P8Ahd8blMEYN)^8^VRu|yq~YHm%68kD==x*APwdBp8U_1&CEMPo-+prEf=g1LcZ67;ly zu0U-XNA(KXzrI|``Lhr6s_BDfP?$7jLObN_eOzsAECaXA&|88LJ%%|gq=)5B3%16d z1;V5FvlwanBz#*AEzmwNi744fEK%t{&hO7?icLnegcU@^xBVt~ z-6(d^G{Mujz5wh#YW26hM*KzH{y!4>7l19`-6K@_l%<2Jku4;?g>U)w@%AJx!t7yn);thz7m7e1nhFJ zr>b!AmV7KlsxAgf@;1w|UM#^L0Jg7ZYg(8q;@ULZf+T`@8Oyebk~g}&%^cN-B%FZ? zW8gj0^+=TOR6v@WQ-VsKOeBr+T_%+CP@k+Fb=3~HkdSW)u@ZNbQ=Q0<(p|{#P9Zm| z=!7Kb60$K(^clLR?(FK54>c8*IlZF^xgr1L5lVmqwPUN}yY-;t%GL`@b^Ofq$F`ff zdVR~7cwzm_rgF9Wg0TAADUP{@3_X(!eN-t2TMp)cm)ExYvO*3ft=lEEt;#}KpR9{Z zJI*R7n!P|9n$U)nYN_7Q%!|!;V94U4TZMlAVk!&0T;7d4^1stoB)cZ{<_dB$uLO#2 zYiB#nv@+x1aoTshCB$Pt-=akSL8p`3ztm}Y;CzSHiB%=(kK(HG0Qhfn%6i> z0lhC(Yo4`EM>7H&Y*>=@Y|G$#|xV~JjV7XWCo-bE{r;J$n2W`$~ z=ws?3@A`6S89{!%A)?r+Q1wghpLcIx!B^PV&JD@FK?#)K5OIiei?@iJ_7%T@sy0-T z$1nl#$hlAt1ep?X@C7X7RRM4XSu&>9zP68D{xaf8$8;5EontgtZfsW>0ER_?WPYtW z$SJ~F;26b2zqH}XKd{c*xT1Xd*DL^?d%y#7u#V%z9m7l2`0r7(;=ryk@Q>U$ygeJ) z9zxb{V%t`s)RT&|1@dxPy5x7Iql8BAA>+cBE_;pb z20N$R|K7!??XGVJt?PoeM)OJS=Hr^kHFq|$0a&O!#%OCm(egyZbuB2d3|kpifq5*9 z6ZNLECRmre?0D+se)+o=S_EtVlyK|p*%C<(fhX?4y*e&{6_}!5(vV8^y%hvl=HMnr5m}O)LL2}~v0K`?4;YQrOH*mBKob)|kP?EGfulhZ z4*<%!+7&l}`?Lg`>*svzqKx*WrjRg%yVmmUWej)k2EE6&EXdi1+JH9Fy1pT85xQla z5d5-8Xd@g}S--qf{H1KqJmD@jPh+!nQ9kBW2$BZhVC>z&p3%3~6nvRtdG--+%|0GK zykc`2I~z9@NM1=>QY#WKP?Cfwy1izv*bV7 zNpP+d96xs}g0GyK*)+xUj^Zs!q*-@ss%1hMC@zqFx70r4v-kGnJyI+1 z``v#Oh?*}zDmYHK0kJ&~;%vav5Kj~IgJFL-=r0CiTO?(M$T*(&2lLTH*SS$`wrY=MN%1`|_{A@dh4xo693?vqpFYs0n2ZCze|xxqn^m=-7bhY_rZwz!58EY(SzS}lKkLvu}cVF z6C!-C_ai*8|1(K8UD#mq*T;_^dsh)kAOv_DYPyn z%z5|F&%Xd;acUWi@<4>!b@x*vHUI8)`}^nbpTB?p{`u0M{|^8F|Nk^O05AYB2>|-U Bzc&B? literal 0 HcmV?d00001 diff --git a/incubator/n8n/0.0.1/charts/redis-1.0.63.tgz b/incubator/n8n/0.0.1/charts/redis-1.0.63.tgz new file mode 100644 index 0000000000000000000000000000000000000000..26b4f2e6bfef11ea46ed7bf078b62ddb2e573dc7 GIT binary patch literal 68677 zcma%ib981w(`S-NGV#Q=Gs(op#F^OUgimbSwr$(CZQJJa#N2t`-Tn68z31LKb-Jpn zZ}sgyx9Zp3L=iCPVE?(kXuxRo#T6M1#bwx~-MH8cSX3E}l-SHPmAKgDR8`q!)GW>Q zt&QB26>Rv#jV-OfF1y~GH^k~W+P{vK{?f8|TuKW(B63`D;%LNMt<{rX97~x*FM#2a zlOpf#l4{_bXq~W4Uu03eVB&(o#)8567G9F~YTAk9Rv~)~siEhL_Fwj@YtekRHKa{uW0ClFO!}&C z+o)jtiQy;_%VfVLf3lV`8AK!s=cHSzwVuy~c}>0dK5pvlVLqH1F@MlJDd=6NS@vru zw25U($)Rg=n{@c^MU7-{ph4!yboL_geR->42knus5+H=TJwWcU8sKSY#@W=~K$>qWuKX>w9k?FSIv0_K5t;#fY>!5Ors}cR_o(OJf;py-*mDyk z7-77Ip$%~ZCy5|QmI&B)v#J1icFs88w~%zWo4Md|A?XnI7l&nH3kg>b^nod(dJ!;w zaxe*>g9MM(s~=e>8QMg!HcXhQ6B`pMeKLg&W!ztn18A!u_C%q(HeF0jTe0i(ATBia z;^qe0)#{@ULqU(QVTO-TI|r0|ND^R{q!ZN`S{-T=kWP{{rJVS!$JBio5j0dO!ZdVE ztRS@W2;Ft--R}&=oyOVRmtk$ASy%hxmHFE1O!wi<4fwco7nxyoSl9mY@JA7i@05~JDn?DnGa@m^ru^GZQW0#4%^jBt%OtNXI^14aUS5s| z#$0ZINIRRzmV{izVMGry8=chA{|+7~0wzkX15qDwORw+-1`)|dUPk2Hp1pG`@ybuc zSA|b@~O3JVB@5X&f26kUx%f-0tvYpYjlvSa zFR}$W%-C7FxUw;sr6zM8JH>^2^+~2>wSS+~C($xuGR$G**@X*VgL#~N@T3eR;|c9C z2Hs%e47!hgZ6CS%lt-okPk;mqazcmmTIM`VtjEf2J7KaH%y6VWskOU4Q)96e3ta24 z55gJWMpOU3TCC4cC*Ve>Jzp+If9KLS8j0@h+Fdo|Ijkanxg~Y;!SC6|u&u#jBm-XE zdha+0Khj9QVzbHVoP2JA`T@-Y{%^!a2ReQEvc2wIVF2AkWYKHg+s&u^v1%}PzT@p- zn})d8_uJjm{ezdiwY#~`?W4J~v5}RM?;)MMo#2;nVes)}YdpVyd%fM=KCB(R#Q;38 zux#XJegGkPp6FKhaCBrdIcvyc8WunkI{GL4Uns9DW40)aU(4+3{LZAWbs^Z~KEaDb z^|zBC;k}j}XLmkpo@rC$!D-1$(R$*{S>n~RIyq#Mqew8M!Peo&Vk{gd)+ zq4l@yPmB(JfGUvELGJT0=L;q#&~{(Ci0+u=UDTD%6LVgbffv*SN8buOI;_Dk5?ApiS)!c3*l$Atnk$e?7-MPsye!Ps4l5ys3G4S`vcQkGXK zQii~V*x`oYExC;jX0Wwy64xJ7E2=a?3(@RV!25jR*Wn_e%fxWqae-etaov>EW-i zS7M6pjU*Pyy=Tf;x3xDS9UBu3kS`&Mgj~!>GfG&m!X0eHMH1gIhXu%GUpVe;gdlDMJZ0U{;fe_cAx?IBqAAW9kZvWI zTAFVyEN~$Pk!sC@698G$-WQ_TG5;#hP4M?BpPqF8wM4b zS@?b*a6n|=TiD2!3$ct9$1?Ow{R6xpU3rW*_mQD$cuZD(wU{yLfRHCQd!^vm$Xxd3 zz)(JsIQHpB&_hy0@0?4^RRQ&Y&D4CMggJuve*o`4K{-%Zq1>{UPw$UfD?y*PGoD{^ zmL;47_8j`Ks`ozrMK2FTX``(dUq9~9m$&q9hMlK$^!f4JJPa}CExYrKLNOpi&L<^w z%D>+KXxCDVJ*{SXVrp-&rQyMmv;XpEYEbKIwV;v*5C58U?Pb{@wb)=RS( z=4Vc${d-b166Y&%=$kkC@1gIWLTUxr4mt%7bQF6wl3Cf$XZS+slDb#HXE39~sW65Z0L z7G>gIA{HVh<|W6O`T2U@UF{!U&-Px1U!@0}cgkK}R(M>$zQlDJ3W4!fhD0(OKJ}oK zKgCxgh6S}CtXdG~9wF!xJCHTfpUSsq?PVge)STUjsyb#S2Y%7##g5`dxtrp?v({(K zi<)CA-r4VQ_+v=NIt|M?Vgt@NtJHIN27+fy1CW_fNAS zrFE{Ia0uP$Q#T6zA7|pi6L1I;Y^D*E;OG)~LtI=tmuK1AG-2VlWLPxZX#1Noi^pyh zZT3SQHCNWVG-DqFlliu?2QFi}ct-v1-BtRFr`PXTL=68zvo4!JFKfZT zix2p|#*f?;qV+xBuZ+;0i;JGuZ=W`g2CVplUq<`^S}u%+g-QpM=`hJxwYg7L{H+=H z-B%a)#s64*Irp8RY03X!#1}Nj z59A+GGjNr~^K#9RlH;ur^gU?XN&DP+?#;>V2#6+Gz#4uR9P}5={Jc9T2lj^p`8I(H9TvDJz^Rb%hgf+>0n0OVYfOtG={(a zf>g>a1U!uz#H-b}@8{HG5Q}(J#TsB$npGIR^5*aeMWl?0z+Pnb5WLbK3(OpWc)7UN z;ux`t=I}H{q=kvI?Z&bhsHIf1m6N6IlNh!2$DwM9$E1~sz*gA)v8!h=uX$tn2`Vb2|iAT=QrcdK_Bc3$XceAU7`y8gAsy$yG{|MMrWS zRY#SWc^)$^j+B&)x@KbdROEt;=9fdmC#jj#s}vMz#Tj`@Vq54a%w$U27AFJSAlp2% zwvyk0xE6j$1ZT9bwwsg*b+j2W92zbznPAK?njj$ggk{f@2)12L$B^7TdFf5{c5Su8 zxPNA{ao~{H!(Jd3dd%z>4>kVVzPVyLB0;<&pW`mvbI3+NzjmOHx>j}Zl8#@Yu{CrE zc@Zws9vn>QhLC`Eps#wB%JGqoptXr4MH?<~|Nqq(OL0LVyfsTVC4J{H5Uht6?vY#X zxDz}J4A~(4tu5l2O2@#^ve0ZH!i~tM7n%kv*x0lLWhl1h z0a_+|PI$b^#})hzZMDclBE*qS;HA9|C_y0& zSlMCI?=xnO=uZK{8hsuqgRA%x&q{(kGxnu+w zy!&?Zbt&f)w+ldRAvt{WydEAI=Z?c;=hir;P`4bEP<;|QRoakoUD2ja118H8{+Nc< zbkOxEHvctKS=qxTaxS7eK6HTpqJGE{GUsdjj>nFqp`-flPHd>^*{S|6d0d)DDIY|M zYJx~1>gw$PdE={H!Odpvsz-qH+vdL7WhJH~;N)!*Cc%O}{;I?oc^(f_c`X9Y2E6G3 zQ+`fMz|AIa5NO#lr<~ZiFe_SQB-+LFRyh2fzbsog1c<#(a`=N zE5Fyfcv(kL{*#-L`ldILj%o?d8xO$=W2o|0)|}oT5xwCwE4R}{u|B-9tFA7;6C)ee z{30zkAKkgYYieR+9K);SBIF8`aSFB@G&Q1 zmj|DQ>G12QcQfeJdVi@iiS#xLi`WJF<|-c^4Z~JUB_GskcHyh(dv2_6=bue!ZJ&EB zIRsg>KEN@oxvSLOFFPMqwcZvV!c#F^7^+a||3vC<+$z-Ig>KMpw_jS>^k-7x)2RR6 zWIzVk_&^%6%6#cpnM6)DcuMtHN)8GqfVaYe4u8W)hS%1`W5W_GY4S_4WGz)kGQH43 z$NDA-pK@h$V%a2lGA>?Xeb@NZ5fYqK#?$sf!uQys|5Kx zalz)IcHQV{rx9Rx$#FKv=v)@RhOX^!WT0tO_-k@+xU#K%WU-~JObyWtgG^H@YBH+N zEsAcMkQ}PG8>@{n2PHJ*Z;r+yOoNFY8m1fuc*59aW7bQafYWuF3Dcf^2#xJjT7O#n z(WXL*Dd{9BL-9Kbs=?KA$e;y0jUabIMr{HT2XGP+#IfU z{XiU_4r#AN)`Y_TZStlj#2?uD-o2+%M1fxkzdO&N-%6-vqMIFFgrnZ{jHsu!zQB&? zKUW5LcM4Owisw)R7s%~Z=f__Dq~NSoJ?L^8jLDYi;->c+4@C&S5U#8uODo;TPzqW) z(|?3!UFyK_7GApa2i90qfI4{X4&ix5nmy0}LuS#Nu`l#anQsJpJ8@Q<CLSqJ(Uug-zh12?G5AQ~R+p4&sKetJcVhBYWILj0;FX z6$PIuwSE#`{QR3du3pbUul%H;boV}G|B@k~C)yLs4hvbpcd4_bNdL`@AaL1$OQ^?L z8B4$4R@;;4rt+6Bbq~m{hp>CU&=AhysOiOpY!hGH2*4 zgXOM#)B5GejvFXvhmBpn86LWUd%Rz@)HR{dx0(cb%^XfoJW+Heiwb{|6pW1sfBHH6 z27EN_ z89pnX+DI8IZ@Io@)wY92)Ytv>U6t$;Jh-Sw1_D`hdq@f^VLv=8`#X)1v+?e!hPGzgqrLzE{+{E8^@_{ zxYul9uu32TN(_Ik7KWQ4?@k5y9v$!phEh8m@CWO>r-Zl_gI5M(+2M)P^Zi1&VLE-d zVtTMT`Q3&dUn3=!5az%S02v(2-gMnwul@q{pk1d5Wc^KNXTQQ{6=&ug)zX6q}_8Lx{kSTRY)IPPPN`Laj*lja+b72v~o^H+zG0=q0a@IP~0ft?1>)P}p zhvsMgm|ySIwwcQvrP1Sf;XbT*=!(AsVt2X>eu+`9a+mC@uVl667#_?cX0AChA*=eH|X{n zixd$!<~HO5Nfu7-rY0mFS6a<1HIE3TUR;bKrmT~aMrWwOhKLXcg@Ho~WdUYB2o^4s zCV|WpS3OxjQB_L~VZM|baK?mB7QKz6Fvs<2R6U$? zGK{8YP{HI-ex^IkJ{c6<2N!9BvcL~_bkl8k&V5;bdEw_-V9ev`_*xr-g4tT5!2Pri z`9ra~H3nLLxoXKlBd;fIJ#*KWNdVFf-rvkXyv_uxFj^$=e!8i^(}it+-qvk6*gux| zEz&~jV)k@J%JEl)YeYz1&pdZJ6F<&x&hPe8tf@dpFdU&xHcfQGEk{FlWpU2F*iZWB zs3q!~tv)Eq;#G|rpaX&L<|;?piBI;jc-50_$md$&li3WCm~EZ;2vYe)DYj)Lt3tK+ z%=A4gg#F*6wck@VPYLRYBkL{@WsAWJcg{ zXxAm<@s$~u^=w6j}3Q2SncW7ZM1Z11@6~H{U5--*6$U!{|6`t&P&$M32 zGhd{16QDPKMlqfDo$qelDAB0jpZN!{?AJpWD#wbRwxJ}Ze)SG)1 zdz??Ydn4KUMFW|hDI;;Q(yUD^2lk6r+RNHCm}GPY=a6C{N;!o^$(Q-u_yv!hRx<`q zDM=hW6|t@U6i4NWQ2V5PS8gZojEbR@|p+?h2lFP^*5EJI+3R}LO;|ay~s`; zeTEHT#sqpX-#R7S%6WUMpd)@LvYTr|ku4rPVf}kPt)^M ze|MZ{c)s}`D0FMbOV3}?F^(%gP%AAQbY|1vP+7(mODnl~Q3%_Nos`YPEksekei$+M zY2-H_>RYqYqY*1)q1FBC6LtoTa|}lX{=k^Yl4rNO+{7>8l7z9gZek!o7{*N@tR!1XBKC z)7}eau;VuQ#Z^y{>Q2hbZ6a*G$)8=ld1)fWyoqrIAhCf87~zL^wlBE0^yGVI)%SkZ zs^R#-X-#V@ug~!>4?0Gc;B>UH+Hn9lTYozMO51xE^yhiJY1veBYPXBD2F;^uZwj?N zQYIKvNcP(S5|?_bXERLrOaZuVowEwZg;IQ*{@PS@k-vmD!w;GrmYdP_2}`bRE-^ z$+Ix{>Frc-5&+#@tAh62zrvo-q*o%)ga`TEtlcH1g$}elRcV;rlEH)XYt0x^>hi0^ zJM42OvoX9!_LZ)~AStd#_7_BmjOoYs8wSm2#=5idl!RIb>oh#!td^dHW^OZ+M21wg z_KFk5Riz5X8X$sy{cg}dvj3`#W}UcQ*=GqNVW4N2F`u7wSxarqHga1ta8VBHzknK1%XSlR=PtlkG%7QoLG?773aV=hLujB7&Z z5EKinOg115>*m2$gHNEF#|&bkNA{+B!Cb;F1vn+7ZnJFlW2lhOc=b3ROJ5SX>)b#s z3utOu?}s=W*VVb;VCO}}InGcT@wJPksDKDO#PYj%G}wxfwL=XNfU`UC)tnDMePne5 z6US#0$DS^yo=UiWx;&x|aOTmxkP|f}z+!kS^B6fJrXnmRF~7;2Dwk6%IXZ}Tq!U>8 zOD{JLE3oX8>uT|*GSEoWV-G4XRqD%h2ak$vVsZp8qg8uwQ7Oh@Z=#NX&OP6_!cMei z0dZ~iqy%-QzKbo-HqKI2VqC%UoDGKAshFXSe#QjPrTN?_jkSLf8=7G88I zZKlo*yjVTM1mIrmmTzRP%nr1(k>+t+u)Ox*ou*OALeZSqm(RRE&nId6Gx!SUVysFb zhDMI_B9DuYzsS#Ol4lTvc^(;DFg`wwT3K$~J#Xz$E6W2Eof^n_)Rc;Asmp*0y3l9RHY%H)VfebIH#V94wu{2av~(B=H_Ke3jQvBEO>1(ImlW!@ zV8!jG+E=D|eN;Jr(p;;oNT>BN#sBWw_s3A=faK8TYli=OjCcNijmQ3XV)Kuf{hrUy z)11B-hnnAC4z~vfBR*dfJMKp+Y5f6f92*3$bTE?o!t5ULS28*xP77=CbYq+4SLol2 za+Hu6n*)f00eZMF(^f-2{ScJK7RdE%Z*!g>tFCJG#~ha(i;dGousuv7jQ7sD%8NjX zLqY!aSC&bnIe?9UgZuu--H1_Hf{~7lpLdLmruJ?EMfV;|evC!PCggfzPjMYsnXcBA z6Ow75ux3&Un>)9e!r3vCg0cSPyceBYM9WdjY9>G=oR_myHT24{O6+w#&79-A)l0Z+ z=Kd-1hAuADWK3K8S`>uivG1Y-%}Lg$*^qd>rVh0CYHm65yP+}7zR;~XH}~k)MD4@A z?|i>{5=EUVx*xlh$l6lZ^uFzrN$R-austdFHaVH1 zsQ9d{&n9CNG2`-U^7YQy8cehOODUNGXY%Gtgqe8jb0)-9MBy^(IY`q^4W2JRFJTz&ZWKtK&Kcgdu#7L?ug5fy z5f#i00cIpNyi4FcM8=v7*jkr17PM241Ez>9wsg%$p*M9VP#E%TI7qNLAwVyI^HIAy zB+X@3cU{Kg>N^ymxFbgY)9dViJ3DXhZeGKE!6q!i5YG6 zM7f)B>@w5_xQn8`#?-w|rqb|KyJHn!d!w7Yh95_)3&RC+dpOx4g30*@0Va^K>)Gjx4c0`UcCUO81>XF*eFJ6cYQVgv_&%a8)Ob{mk z)Pe?vHN5$A`3Ko*iCMeY-tKo$q8ykynR?a%Ml2)vn~*JFyJ>V4in0xtv9fM2bIji%qdc>^-9r)BT zjS1Z~A_+q7P7l*6P%F*%SmCl!)9&Rp-L1Cod7TYGT_voWp} zAJI=?jD`O;wFDeCXSRa1Sy&5kXEXXZ*XZdI&YZl|x1KP0oE9GlyCZB%Ir!AZ<+sx& zO}AMVC@ry{)rs4|hh40uhm#NIHxf`J*I91ViC;yFwnslWIaOZ$kk_es)w%x(30#e6 z;TY+Vx|O@EVH?q#G00`>X-@o0H~ri2gMZ-G2MW6bcn5I5SbP85ezYo<+VRu*5Nhx1 z>+91;5N>Q=^;0DhckSLNo>wh3#Cj=CDnOm1YU4IhZ~`+zVC&zrV$hS@Gt0KZFsH3= z<{(o%-m;)u()k5OnOwu|7=_ul9);-~^%$YKRz2h$hgnh7^N9N0IzIaz^nU1UyYN;@0XCm2e{RM$Fv9(^A^r_x& zR>0Q{8;6Jzz+!9OK-S2=eA=boGu*5Fz2p$rt+SBi~ zYkBD=av{?8OWDq;Cd>>dgG1cyU!XLa^QZhh`5pKh(erfDlav6cjXgaL{1K%7TpOkZ zkQpvzXhqoT@MyO&xEy0DIe}1N^@V74-=~5oyNRGch$XRJ{zL_+lLrC>Yo{MiGs15lkFmoBrTg ziEZzL(8k}s-Sd5s#N7Nau2?MwFN{SUD^O$2%(2Msjj4Z4mZ>>s6Y#bSjDCZdgg{n!fyKo78n7E@Sb?TDzFs&Y8M& z0>uAc(bzu`-T#OtFP*3oxTO{}(s#Ow%oZLx1|+fw&M)NwA)iK}B|JHc|1sxeawBK* z*iI(-A9K2Z$4_mO8lIv>obKscr{J3zz;kg@7`nANTZ{91o+Ftbvfh!i)-+t1gGJ4ki@%c+a}LQ@0Jj+5&t zKh=&-dzFm+y4b4kt-E$sVE~JXsAe^9PO|xyv8p^I{J6V+_(6O3e0q4E)#~C*BSbC5 z=#pyZv@Z6yGT)LmL6s1_q_4D5%Ysxnj&$b1qU?vre6!k!6_ct1c3?Jtb~IVt?7tQG zzhD$$rsumfh++nr3pj{TaWHwV#~Urp1Hsa~2ngr1vyYqFv^x+7Pg^K_EvGPTl9g4w78b$OEZpR8f+jMf>0i+l$5B>l zJQxMjMBGfo+bTnv45I- zbC(hdcIZ}x%0tO-Ikw0)@;Mf~4=(v$xc{6X9wS5??n4F>C?plPnaNi~i@Q-q2!=5; z(y#HIPm#Fnf8R3VhD6Z>NJoOMzte^F>rFZ%$yH0XrCDd!S@uwljL`<+*kP?Xpe@Er z0|vhlQz9QnPRtuwX$Qa+Ef=W|un`NGU*k%Lsj5$IUJ3(CP6PWK&r=Sz!Dr{KeP{jg zt=xF;>0Y+i&bDcRvV9>83{TVa4Al%t1)z(76*ZfhovcnT@7fOyU=k{CqvZ4sA<^~3 zP0bIz0xX-F?Cyl5h=3CS*3H;wMhP4@-)6U@s$}hTKe&J%bMwziJ}^i3U^;%ZZ4CVShPtjtJuU=jdFbGl#IL&QS?QAfu_!a ztw0CKMqmo9>Q^l!wM0jWVlG~8Sz1hgK}oBlZ8}v&Qy35~eYk|iCQ-jUYF_twp;#GE zNzS=5fQQ_axz3IrN+InCLpN0z$u#I&3?9f9ftt$*nKuqogsY@d4hE5zk1WIVd8gKy zQ%U#`g2HyX>Y(01bA2UI3tL-OEPz5Ubk)pDh^xWJ)3fdqQC%&!tw-SLTAUleF*38A znb43D@&^25IRa|PO^AOz3fTUy~=BtXi1?`TbcKO(%I+OP#cqk zT?V6qVHb9{dwr<42)y6FcdC=eDSe@^R}IKh3A{SCLS9G3)#S!#*gdV5TyvBcMHUv- zKUdC3gE3BSuN-sUi{VA-ZmS%w4PM!e`<}0bLQd+JFM*+87)`t+r z1m-kVUrQl@U7Cn1)@<$}T$PawKdd$S3QtV}mrCSG!=`Mqt%%YticpM9kUE>64(B(9 z0DFqA6aXH;EM_d4mux^BWDXZN3s$dxIu5NlfLZ?uA*tTMW=R1;8eR&qn{xJN%OTEC z_#~v#U=8ensqAgihq6YbU0mvRkGDirXVQyqN7tjRJeB?f;5N^Qei63#VaRujl8=0wx2%Cp?|C(C2;zeJ|nWwwIi-hFrMnjzwz zZUM=kkpPDriIOg#(5b_6`>7fafjZ zd$OnCFJsqgitKp|OjZ#CmV4S~^v+(b>xnM#ZgYKu1P-Er)7gqdZ$$ zSwa)LUxA1erMQ930`XAe2>lu{y`m(aF^JX&ci#HiIxe5QYLqr8tgA5(PbN5XgF*qQ zk>puvG)UQf73`IP`&*8nB^cbdke|sxErw32sUMUI%Unk_Nu;!abL%3SaBss528OKI z{nUk#AldiMV^~e?XP7~Ujo&Z|uvVw@$Xcwj`yH3N33)5?AFCBbXmgLmOEJ`prckgi$#8T(_f!0Ep1es z+*HRz?{s!}d$_t6Wg)y(QiG>%w})k>t&+sQk;NMS`q;%IGr+T>rW3VGf1yrkMzmLh#pu8 zEln;=RxBPIMbEF7I#b;Rq(#Ox8H&|Aw<=&8jjySd*2ls;`0t!<%#j^JKBggGQaR*| z=RSYr$j#H0gOej2Mf-j#_%$8Zi=B>7~qjWG};=XsP{K^%0JdU&+cO(;1H6w*p8=woy)0HU}S!6>~(R z##F!vMo3dn2B)5P#Goyv9|L2IbV?gbFSjVJ9CN=e2ipQ!TVrQ1_H5~n{R*E|q`_nY zQ$&|Y@+(85J`+hG7geAcoD~SCBnkY5gWGOCnkX)?R7)o)#$KBEPu<=cHXLR#ODlY# zn#WxNxfy8hkeGqpMQq0A-bYdJl>aZU9N;N-0Cq}oyBnkj(}5SCt+KLGvy`KiVoNum zM~%S^ha-{Kj!)@iyye&u2a^t)>R0Tff3qv_NdB9_a}EfcP)m!7yNS9o&9t<{E_7Jj zubF(Rf5T6PfxM7r-5*XR{?m9ZLIzFF zUML9)8>TseHd&2ZGkAWi~Sgy(E z(Fl9&1kb#YKNyAQL|I@Yf~lv-k^lJtMyk9?*hZhyysWa&_^XvG>dLRUDf?NnG=<1h z-KrLaW7SCDIQlnhuB8%`JX#ziv2G{pOP&QuLg9zEsO+|V30;X*qmr}O-NV|$(QhcR zVp7^gd2s#oYDIHYI*Imb$#jHLX%bZmF{dESWD1lhNogfx9Q8W6yNIg=C!|3uvYTXc zVv#6NP;ee|n!eNkCVQ+oHQ3)mL#R=4vG_6}$S@%o1sJx_VRk!idw7i&6@NIRa5fm$ zQQvUK1cg#!4N6qzQo1o|j$Bd}*mLe>Mn%SDCMa~P{9l%2H_hg=tYUOB?0)ouxlHh- zt3sG82xx}F{`HUurL@HmMoEg586x`0f=yAS`tWWoSy1_yB-qH1PCCu3GJWD?_0VPc z;Q1Gn@qWP=#Y`q<_0hiMW0-x*Vsr!SKXTHm2zXfV$nDe-c^pJJ&tj?=J7L$7Z5`$W}k? zbo016**@#Py&AP>)h_)=JF2E>-6vzte&af?sWHf0lvI!Yu%p%*FY{<|2wkC zQWg|I1qUm9DI8C<|B%4Qr?FBsHmsMCE@v#3M}TEwMI^x}l@9_lZO=EP1TU5xoewKE zbFYv{YM(^Zm$o=-TOY7m!Hqw;qw!?^pa=q{CNLPv)(`(x#sDBL}+~@jexv^Gg8JgubotG(-k?%aZ}c7|IUStT(a~K+2oopWa7@Vjb?kLb7m7zCgP4ix~)ieS_aIIe+<{d z88_{%% zBdK>c9XIez>jMk>k6S3t*d6T@%XgdcP!xfx|HwKt9tsd$kLdjr6Oqu8!wIc)5mny_ zxhAPkRTL843Ur&ljw_TafV0S$A<<9a(s|~YVdE^3$J8iw9p4X$n%eVL#Xff)u>nLA z`?l@!U`ma&HCp#@NGbuA@L~>wIb~u&Y4M^Y{|#HxDthzi-;XzxQad3zF%qiJNZ@0Z z9iQDb$Vl2q;v2u%-m~F+eU7@KWS@;?)K>(5beh?p1F91&EG`s|$+n|l5g1}H_&YF; zU1YXae~X`@74V(Ki+G%fRg$?=W~M5dK9#%L-AwD1$i<0P^jNeCURjG4Y|Ss!3L9+G zxQR)c!(6hhVI8N%L)sN=E4o0Pb-MLUOw@#?`VeGuY?4|ikJVrhcbC2>%;$Ky`2yZ? z&BCU;jewKK0BXQ`CtpiPrk!M0-1h8wF}%~5-?6b3=BV$efYN!>E!~5rhE?}L(_W|S zNQKMPkwJy&!ky%G?I%R)AI%Cqx;EZ=!EZKUT*(LuIz6kFJ+ZhC@MTs#v&8GQC!3yP z3>XC;W8|{iKqJ%=E9a1}M1v?T>e`<*ozW%fr+qE6zdgtZZYCJycJwm4eVm=WAN;hD z&z9;u9fN0PrU?z;uYST3YElqocO@bvCA5@`0AJ4X?vGzhzlJIb7Aj8O05iI}dR?pk zO%(mEXki-LQ^0?1bSoV)XY+jGy3{&0i&KI!;4&6IU)a+HWEOLqqt3F{H&Ws@4d5~p zJ|qA~$jHXEXEc}WJRSx#>o@S>WgSiB-}!g#?H)h3j{45dlG5HecnA^ir~1>jVlR>zrUYa0Fk{6gq%Egb$TUL zChl73%oXa3N6r14431XF`r6;1m65H%f<{ZH@V%r})7-=f7;3j-xuW@us^f^SH~zu9 za!wm{18*@Jo|h9{2MZCGn?l}BE{K#@c43rpVy%HCdhHIDWbNt+3KLUa;&Ee`CQi8D z0Wm|SJuNW_Eu9Qu3+(Vczl+oX!V@pGI!@ zJKNnqUxOMy_Wu6Y8?qxH#MsCmB6`^zLVh2&=e>ssm&41gqJJ*+k+{Es{Si=;to4(s z3f(k;BBsulTAIe!`MDW@;fBTolxf~%B&(Zk7NL6t=KFNpS? zY!)-D@HW?$8M42(Zfx%L!JLu)*VdEnG{j41CvP)DT@VB0`CVhrf@Y) zawM^BN9O!j%)beA#`-Fb@L3q@S(`sPl}hI82_}4^g7H@BzFiaTJ|o>>)xSfIvl-Vi z$9gP=_gDz(dfBQ(b=0@{oE)u=a9bGaJTur{-11n3>O6zkwq)O(0wynucAVvJy_@B4 z(cQr5lxEN`%3#eKg7U1BpW5lCWw1_;pXO=Uu}_NYl^g}F+le`JVl(JRWv~v9f7B%v zM%aRQG6F98H{NNM3)^qme-y>jcgkRG7sK0tzQfumHM!J8SS<`SpBZd8)>#p-`_bef*^*h7q%T2w~_R&tVH+1Q-OSVw&N$pfj zMag-2+#D=468=7z+Usc=P&BrlzKr@`_@@z-xQdrTL#DAm`VbQ%o?ny-0S+Ly2WEP< zrqt-VWUWQ`!)p6+TJ}jd&IRtbr(2tgvzwh)8Ge=?QD?Wi$H(>I6)4~;qviht{qgc; z381A=2O%IrO4Q~LhrHM)UWECAiM%sLuPX=Q8(WMBK!h(3GKtUEq-=!~2uGZy$p{C^=JAc)VM6#-hF43d=izZj6rpk>PhtxqF2Jyo8A{{KvH@pz)}n6h@n|-!W1SitY|FE=A^-~ zCfzJ!YXNtWON!?95ct0UsX$i0O_HoNx>~INx)kf6D+xB;!j&Uxxms>05KEZo5LlW? z8Doe6O#=vP79~Jo2tt(+N;RgcQ~?A+MIoA!zj$&OQG<>>hqYTZ-<|}U0Gw(H7U3e? zZp-7L(bco_tNpj=>iXpU)xn2n3Oaam{Orv+IeU4yFYiB7uD6e_R!Z>DDmgnn-N#qg z%C&q<_Fqb`_R!ho+sl)yYw5j$F7cb~t7N4FYXB4ko1wip{d(CoLVI!gx_GDz*!&VX zs{zp}!uInw3#S_&Wb$Ug;a!!o>A;F0hKjUuU`>*>pSCD*-0M-SF|cAuU72e&QOki< zhNiAE#WZwDHVps(m9VN%RkajK6s%K&84_av>Y8O?OOh~9DK(4@L?hTj)?YvgQNaA* zOR1qU^OlOxEn+Z*=)i;))l>*fW=KG%m>LWilrbtR3bhmiDO6J+ga(ieL*GPfiY;XQ z1(dLMYuHNW9h9pNB-e10c(OHY*~+`z zDk#2ITh_TrotxCTNu8V2O~iNbt0nw;;EC@qj`l3m4sKx8ZR3gzz`}_ojQdaoeYg(L z%dP6(P@g%!(wjjP+K$MTpX+Q)q$%4@Y2!7ntFX)ec^x3T)*q-|Y$ud?negHn^@MKK= zn`n}&oo!{YwCiU%2A&n(QJ?XQhK3=k17k$pAqz_SeNCb^Rj7$jQm1=|H&ul#qKfeg zg3^IhlGlq+R>G^aQr2ayY*5T4*r8>NHYsDRt{?Ahj#ssr%yp{D6KonJ`FXqgG;Qxr zid%TIyOX9AYuud#Rk`Wa={cgMo!P&iga}lP;aHNve20d8wNFGTow8YLBySx0BbKNA zdzSeM6NztSWN5hGgVhC2y})N zNjI3OOO^p7W)c-ERMm9Ll!0W(uqwCu94bX(6W?~jzD*6Ev*iAdmcNX&Dn-jVD_;4H z=B#EE>+G2$pv8%VjA#>nshpiASlqkUmd8W;rB7eIx;#C4{_HKfcz%KpPSMqi7uO$@ z*Do*LpOC%1r`z{SS4!~UClZv?y|ewR=V#CG_3@taX7A>bCc9S}Sr}@c)v2FNX;8~%Vxnwz4JYBvPk))~;#C;k} zJ{5|ywOpDME%42r^QK?I*F??GQB(3@u(T}X%I5s4sMe1J=gGMk0v5JG~~R^0h=P;k2W zm}BZ2ecQFX!H>=pJsO5S{WsqrIer2$QY0WLng*bxCfg?Op3IiMnv=E@LRAn}C5!+f zprH_Dq^*R&Se78rWQZh5Z6-u1X*(elqyj)BBtxyCCQ3x zDO-raO12PJx1|aaq^_10RU8{wLL${rg49?EGL%*-Ax=}pHkp;4!Q5<6H5-i(7M<>RZnW=#YsKbKL^PFIC@$$uqsGPrge)2m1 z_s4Vc@$jTSF|ERWy4GBliI!XY%CDQCff;vgoU`|}QZLJjnUO(5W)3431b3c)Gn;4z z+LYf%dpw~=_|daIh9mZoPd%Gau}(I^ZJDUHKIU5HEATNsjWY-aztCGc_{F>#q$}bD zfojq$&2~ItzD=E5+jCf0C=kNwTrzddl2+P^dZ{QbS0U>g&fqBr-4_?feV_WpEUQv2 zV|}Cd4dy2T-bPL^u+4!g6Pe%w@9JdBn2)Jz`t~g?wGK85k_GqI2iGYo-vv^!iML^} zV*70B-SAbUOiID(Q0H3ex3T(o-YvD%Q3k;6G7EGrt8*AlXX)dqx&N1^Nx2ZSOanBexxtmd{% z)Z9cx)?nr)ET9OnN*2XxM7f>_{2GCh8f-+lOoU8{mS;rCwi?|w2SmeaaU5Ebt_^!d zsmESXYO&AuU&n;DIe-9ZPy?kolqYST$&U~qNz;@XnPf@ZWgYi1HBZJCJzNZm{n zP<|0xN}1bJ90e}lM-7pTMOffpnQAHPK;#%~=-mzs8gQeK;@HbQzBmQ;7W+zVs>;26 z$tI!vUew5)S|8?y{{3JaIiWpq*vEX>YnufhZTF+aLSrdNhbZfyF1h$C70|Zl`{zJkPSwYz!*#--LZ`rLo4T>$2f+1y%idR90XKnx|K7UJU6N!~s) ziR4cY)kF#WAdSHj1e?JHq^^MWMWR~sPq3yYx;IDYk^M{%JNM4xC`YYap zM3Hj!u?_C64`$^7LjCm1HoXS{o!H`yuS+5-+xZTN2s8yQ99V*ih|`Vlc#VzkWn)_9 zEj$p*I0wI4&@KZ_xmA)J!YHhm00M!CNMV(wIq6!S4v<6uQ42>WN7&pEfe@)$4M&8h zTgE>0qad_DaaE=A@jb-=NJTefS;ETh!#*XGC;d;B=NqhV>tn<5B9qHE2M-5Ok@Dxj zo71j1;?e~t+oFvIL{qkBqhs#t7)_{(k^&Y_d2YgJHb=gRFl}*jLS5&e=fv}Vp<~w$ z2d|i~Gv5ouYe|HCD2vx~{U`Jp8;touiNTQ@vLW;TiooeD^DW1_D?J6eG43t9trd3; zh3c|QG|5m@T_+F$9VikpO-;hkpvbZS!N8JbRicKb14U6#c9rtjc3a+Fy!o7$v~AmT zkyv>R3_{w%-EOE4`jQC0%q1|h^L=aHu2RBlV_SCftk>PLyU1%p-gR2LZOueVzRXTI zH0jAnD@*@}vO97SflRex2M!ZO!-ftlLM0tANrej46jj9pK&yD2%4S%$7g~n#;K(eQ z5km$HY7#INf*59|1t?&aYGPHJ3opAFmMw%HGk?fF`t08k3&LQaz&c_r5UsGE8^1FQ zUp>220T7IPj53Q2Zljr#P%k%S>r&!uQJ$rur^4+_O564&J zrSzVlz02*ZWTgZTt&;PLBXW6!US7U=`v$*1ym}|S!}9aX>*udd$(vUnqzAa}ZUeDB5n>sN2jPG7%#_UiphOvpR(;sI_zTq!}NN><%wB1*GE4 zkZ;G%P9Y@c1SJtEP?L$&`q<%0rmaq{VS*5>cXEvcj)eilnEjHMp zpCf3!Lw}+5H6&`^^%M~jD9sNlo9=sAbgNhxZi?(M7}&1KKJhBEY}d5SC#o`cj<6od zT7_2>vKaS#vxQ$LDw>2h7hx^swZYAGGuG?x0i5Tx;?R9XyBHj~hBvm|;g7s=NLtPI zv_Mzcm2Zsx*q|0m?SSV`JfDUvVfEvL4%rjKb3^8a{8B*Md~)#=0xajY&$VXJx}_r^ zLP>$!?&fXo7tN|2ui4T|cx|es=UGc@ZX+$>RoT?2VXz=5g&O1kTM1)mGB^8O_k}$9Mi=C7NS%~`$96_ApwaJr` z8Ea+zsQ&Z3miHrm)2bbfIqM0Jd2dC({yIn&1=HH+tyR(poaSfEkcMCAYpzec!ulwO+QJ z%-bnKA{YZ?N)kgRGAY3jY8qjh4os$-hOEfCg)I|E3{s>sOn^cuGUbgZVmq0)Q-q>n z0FkU>(*PEgRjBETfg~9)*|0PXs1O233<3I#>Nt7{_ zXiR68CF>aLm{L_^KrswU2eK|1s-j~V!_9P!?PT6k5fYGf11r!Z6v(P6nJO_AEJLJW zNmeZxLRm2}g$8CCw1CMhWGW`kmiO1t!sc^sxw!&ZIzlp*6sBmZN)dsv-ZiXK9mtYy zFp8LtRasJXtRhBKNs|FX`TDqt%&6V|imhbcQV|5ms!ml1WLeRWg>+&fpz2sNh(Q#H z4ap>iqUok;=&}JdK&T}t2y8?VTgkkoA{56&92Ty^Yf_<3F`__!iG<^qyNj^zqhw- zBZ~v@{_RhJSLwcuyP?FJD9OK*-Q(CvPHrw~JzYnei zZxVH}ds*?EZY&ZQ41mF4W-yp31}0pu-V!Bo8qLDAQcE-q&FVRN*`8@xZ9~)B8!Lzf zx%UnxDEK$L>&#L=(5RtW1RF8jfni&o?i!;(Z{S)U92q(?T&p+i4h=Lg9M?3V;a1Ai zJAm6nwy$c2s~v_l=r%@8sk8cyeTY&Rv%se^MNOE(m`7zG2NJ6cf6$ z1S9O!(afN0^$IlOw2i-+y3sdu!_rJ{U@*5ZFt~GkkA|c(L+nu|GQ=Kvtqf%~ zt>5p7eNXIveqtY!229Pc>&|=(y{&xkx6M)C z&_|Z-8H3RPL8O~Q+wuB69geJly$;$?TNpPc`Adh_;^^|AZm$BPf=KfikQz5U*K{HR%RZkySe%J$~yV^?AzCGo*+=!N(`2&+|?N;O`T?(w4H&I*R)p_|05e1 zXaciU?XRe}P4l!D>)SWfdcR-uO6(@6GHe0i@V3$I^0)6^pPqeq#|$h-{kApGjBQi~ zj9e}NCF9O$76hJ;-5|oVgvmOcQ{;B6TypFt=teea{G(=AnxUEEr^2Fk0&e-~y>d&vXY>Z9UO1pHecw&kWI<&c z-ar-AHx+tF-SvbXSz}|N$Ixu6SJs#sSK8lEtv8p~B<3~^V_+$c7)y(-58O1=>}E@g zE!_wRFJ_8h;*b3h23aoCcKVR!x&Mm7o3MPNrx}Lf*hPc-4){G$ZSNt^^+w5s`uM2X zw0ne)8Ac~_ie9JE`e7>ugKn?eAZ!IKw;OIJ26)r^_PqL@11!6xzLdNj(<+9m*#&tM z?Es}XjgqN6$RPAH@&klBMpy3-dY#LYtJhk;Z5!IF*=U3kO++2Y8-{iOYcny(=rbwG zYA6QD@~eE;SFT~hAOehGl)Tp)*W3{b=MU&<&?i z`d?OXxd4kE{As02wpq+Qx}xlctfgn#-ACXoOZKIn?o?+5t|+&O&po?%)ju-rzSGF( zUae3+Su`W9qE5hZ#CLM5W9l6~%vyRMX*h-Moi>CRdD@Wixrp;Q?LP5Sr1_ynC&j#V zqj+(PXG5GOemJIYZ^tOrTt$z1`nFe}l$RsS8$CnU%x=Zmcx~CuX|{9`bx*T_9X1zSVyOqWzOwq<%{ykC?Sh)gE4bqZ`h=?iyE|)f#&v&+kCR+Z%Z{F!EsJy3sVQ zj+ivi2K_Bh0N z#)exO!FH`3O;*@AXvaV!v$bZ>4yDpEp)wO}xN(7z=r2ac=nZlr<lYGhxp5TKUR7}Pe(7YT-Pg9drLf-JY0J>nEBzZ(Zo(q3U!N1UaLIgPIvC|{ zHjFIWvph?8`*$>GrEvmnG| z108mz&<{K8w?N?i^+zth8@=`dsw{GMFgH5m=5)8l8Mj(v8}+AaY@q&#N>A-B_M!Ll zPgmCE*>}C}h4aBYdw=oWr<3o0?w*?$-+y=W?bQ?HwOob4HhiaKn0{)$W2lnh29>wx zJEmuKN3PpL12pJ4(6nr4Xn4rfQP&>z9mhg_=(t0;0pDo~`Z4*AY3!cwaF|>0oppR` z)Eaxf^XK3@IU>22lWO61Z`v3H@f!F>Gkvx za!t3t0pDo~`Vsj~*K&5wcLdBW_|6&;Eps*YeCN->cZxS2pPcVFz0LJ3Qh9s6W7+yh zN5kI8a(YAnfi4{BaNxMZk?Yx>VM1H)cFpSORJ#HFn0%+--96voFt^}4y|wwy5)<&A z@BFrWr!*u{g4%Z|2~of=+Asn-IevX%V(*vlzJEJE{r6?~aIJmUA15FBqwA4no}Q); zFYgwUzWpAb{Brwo`nLuA;eV&l587k;zhr`L)P6r^Gs~Fj6eg(~1$ZB8V;^gyajXrD zCuV&NPs=d6el(4$?CeB}c7O9DDO$Zz z@J7}X`LBpxshh|h8NGJ9ZJVCegVnZ;#x;616YYH#flxRUVe)Jq1m$ts@ z5*xZxbo+3mo5&p4Lr?FG?0yfKu49izt`5z?uy6IeVb{@hWLZN8IfMRi;5h?lsKk02 zM$z3JLNQ7<^Q(A76gKrSv0dHl^}2mW_lCC79omC#x7X`K!!lg6H|UzCHF6Ah*moUh zclG|ja=HexcQ`1Ih{Cp4%8fxs?^T6-*bc@nZn~S|mU?x#j!j@ZwfyLuf4F#i`N^@* zzCAg<{@MQS2lKn`_oqKz{Cv^1PCtEmeED%D22VXC?|Nr%tn-Vv?~i-k_x7isKb^h( z?)>cP-EsH)yAQ8Vt;Zjdl^AR#!WaX+uREKFFlx<}{$8UlQ_yhSfl2DS0qT5jSe9wp zeY@=TwXF13P5on*PH%BEOI-AFB=X48a6{xj@^Okhe>Q!2b$z`aTI)dGSm5i~gQ9Ql z*7DwlURH)+pw9LlTLoB4{luHdm|A|sHjq+_5OycD5^!4xt)zM*O$p8Ya0uPINi@T# zbInKo^+Oy)e#-Oo_T8a393sbZtgfMtdfvcA$aVT%t7m!8Fp)EIdtK9$B4jj6Z==!e zFq(xPz9kaFt>9KXu7Va3XGlBzi*y|z7_VoV19#|vfcoq@m-98ayyZvEJ)T*69 z-_X~P66IRXhFOg*0z+8?WBtHTveFKuc**pQa#*ZQVeF-NDlnSnTl97g<+g@YF+c^HcBj>(`cj_2&DNn;&o9z53yYPoJ*O zfBgB=^~sMHr>`D=NLFI7R45FLcBN3L_cW*1E&3lBZKG{?n$ANq_O=iWVS;H=NZ*Bd z*H%+Etd2hD;53T08TP}m7GkLR;V77)&_$XXdGtP9G)uHNiM*McY6*r~ih=-Z?hL2V z6eYMLCCA5as_rTPl?vTt5vS2Of$?O4!m%GBl=$J8q9QOLK<{A^VvWW(jbfBw4UVB7 z;#BiftVQ=>UL4*%=&d`EPLMW*;X)e)@E&W?Nb_beK(3bz#~UKQ5@a3H$!r=EDsH<; zdl9$OsAF_BJef_S`*!S&Bql4$)!qV369lL2d;EWlqEe#11~5f9)g}mffgd8=xxUs+ z&9SV(fcP3|4ja!Z}eu{#No&(prr3pJAOlKCfFemX(7I89(U zCjUkik=r%|vJnS1bWI9a&db$_1#Gud9%)6d#~p(K#31K3BriX zN++HT1K(xz*f~AEd2Q%d*T=clzcr*~DDr&A_fZmflwd-1kHv`SwxQF3$V?Y>e9Cvh zHV3mbvIw4gLpnu{+1CrfL-OC2fk`JQL1Q1MbWOBpciD{F9ZZ-2x}{bc9Nf-lL5LDK z^aHZ@=33kwOzoOS59}PN{V<9W7q$K2)D5B;8$uO^k8r2!^whJi_3JKM;i>2T?QfNF z-i^Lyn0@JODUVwFZL6(o8z(rWim2<#INoy~-Me#4-gVMs7T(dn+$bFRgn>=Te?+`V zBix?+BSCW?`%(DPbR4TUpq54g;iVd^{ZX4(%Ev{EI2xt*FhR7TvFmF6nxn-vDs4E6 z1I_66?cR=Oam!1p-5r=u3$PyJUT$}X_j0?-@8xb1xV^ih#L*S7>Mc~tx)Mob%lT>z zyKhvl#pQK2wI&e?U(cE(YiwanGWyP%cURR)%hvM(r)cWwH4ED6%OtjPJ)5?n_5OcM z?&?2ElpRCw8-~*;t`;e{EM~~c)Wf;1=6qh)tGcrTj65Ej)NXVSoXxxVSHmeB28bDF zyEb?}gzjA&B`Fw137C^9XC)4+?}%>-ZNpVadb!pjlohsFgT289Yfx0$d+_W%cy{8! zvvb2~_q!i|IR5_n=H2nDpKa&$$CImfpB(e_?WdpK-rT%-ef{{R+m#q>>ww`HgAE-p zWX;XP7?{prt*8mKeB-zSwDgj=1MK@&5`g`iNC5hvp#-2W$qupZHg0b&0qiakOdgL- zYHz-+u5r^|t+3x#_uJ|pbz9xAQjfz_dIQ{NGcl7ln8&+p?vC-76a`c29P5UNB zN9i%NgDjQ>SUZd{YpFq>H>$pY?MJv24$WTAh89H5z%&dC86&#~Ez5z9s}F|I9k`>R zJ%C;l3(&eSHxyWDm)8u9Yi%1VLD%eVcilV7N~NdP@8AA>dGh|##V+hbO7yZxELF?wrfPsu87j{vL41+Ds0S7 zd%bl6iK#WVV5f#tk%_!}AM{QTZHAFsq z_OvR(+Mz?31Z`~TX;lGheYbN%?;2gB(J>q;xFbu5B%4ibArincYluiiJq~ASKo&0} zWx;v#ml;ML0miFYf2@zuN9U5;T8l zv<>RJ>qcRU!crm1e&c>p7ZV&AXZdjH! zHixnU)C?t6P4#8d&7dry^qGg|b-^X}zLa}k%Dpe;-sxlS^zl1z`q=wY?)_kPf7Y^M z``ufd4n5s8yJi7u>HDU$&V_K~ zje1?X2fZ$YPFEkIzSDO{rU%__e_-3ap5+>**Q-&tw}-nG(HeundQ@u+8m*FfF>FIjE>8jyn>sHM)nuY0J&)n;ojr2@@^FQGz=m@`E9}Jz^Lg=y?gk)Nty? zFw_d#k(QtUrpVLMNOLF1y~DF9E?WX0tC9NE8${#wgzk|(O50)7p@6YJ4q-Y=kTyq& zKjJ!nu|4I`X*)Q(yLLkeVT)@wqhTX3|z}y1fQ+s<~pE_4Rz5nj)toQcnJLl8K_g8N&KHmIv@&3(E-S19+ zym)+X@0A!l`H=i(p8%!|>n*$yf{^8@pfZj%np@(=9Do zN8~9?DovkV&FtDn>14yw|K^SGSaY_Z>?us#wjYk7&Od^e!`V1Z;4jp%VEWQ9Ov~&! zX5X}Qv)iX{?_XxLy?)gV4I6IHu)3B#H1yHHg9srL>4Sl8T7wa^^&T<}qmOI|2dLkN zJ>52pUe6x%TqQKocm`cKjRLfpf#dNoSd$ctfi@VJ)}xTZ*iYLS&S4nBiFBKA$9~#L zVbUi5a*=~96?drj`nGL%ZLjaTgVE45MqLZKsMj6zx}$+%^t;e7bxAFc0=#EauWl;F-kx?Ri3!qzM+v|QU>YVJv4!fic$LpN<>9aB-U?#=?T z5Zc~69t)|xk4m?XO1EWHx|Q)noPoJk{1IAyO-64Tl%^kn(>FaGF$PAj>#TXC!Yl1a zQRic@dC)joeVItxd`t2Mo^4xQXJ8s#eFXcXk<&-U(13Q&@{E4Zb*+)t>*X!Yy9Zw{ zoz`ppKJ>R>YH*h^a_~x5&H1tE5EWY{X;DC|L z!GFL-1U}{shhP-VLghH+;6F#&s^>ov;*+)Wm*4J5kmuu$JAp}xDP2Zk=Y;%fFW@xT zO&iql+qUVyx~>=h)g8a}A?EnBGbsVV!0KhB>GV}`-SaFU)x`@${K<{8KaOt-VyKO!dPpDe|a~Kf$ zd1nk@>H0VHu5IhZ^>11Be*Hhi^9*Pjcpszi?Kp?*capNB(%0(9^hsXW)N5 zM177);cJAz5CzfwK@_8K9*1XBI7UYY08m)h6vhIi69jkx;08VlQ{a<=2LL1}jIo%CvMXABb7h!S{kd>6fQ_1S&%6l3(obwcmmC?b2M}<*mZ`cYYe*39@;MIx=wF2 z)Ll~_jI6$HIbG90L(eiCZ)C!r=k$lR*&PmCyFaw_#u&u2AOLX``0nBW&|jDI#}POi zT}0_+f-vdO0fqL-PtdnBn0V`s`n{i^F{xNT?iuWcLoQ)9fTj-g+-U13jkgT6C@&@`>CW5Q~3F0{SY=!Pi8lPF5p9bHkcesm?|hNCOW zuZC66EV_EvvusO8Ue7f=+ZrLy=zBxYFnYaV&q40c8M#)^F$`OS@qh#HY&1%+jYW=GUTP z7{q>v)*We9tA3P^8PtXY%%H7;lN(lx3X5V~ZGF(S1~wcHAsXmCG_Z%p$Q*elGCkzD z_Q=!?*c}dfy4~$rrfs>fkA{Zh4g0P)?71tOUXSfYI2|Vl|FS;gl{J^J-VAzE<|}J7 zftTOr?6%R?CHdOOghO*=dA5OcduSrtGx~<9cl$%r8S10q$kqo#r|Y7D)iu4o+cWIZ z$g)PR;|%&vqvo3q^}#rZhA_y+2&DjqAey5j@jXNpG{)l5$bSIQi2fSQf`BL^T!neh zOXr}Fawtsw1kp0ULnA-*>BIpEK&|QH>yzX2*GFIk1B?z1h^CfAL4Xno7lm*bAiiM5 z*Y*M6AG{-~yA`p>iUOiEwdwbdFz`JPQNfEsc^>T{3;+znC}mgKKon9uvN|0FWJk7j0MuINK2DFoKmWzxb5#*X zQ^W`U832H)TI?=et0)NkaQq?mV9M!|z`EwWxki=1-iN0sKq)GN$iOpTr*tR?7~qe?C?QM7$K;#9 zpDe9J1#v{pin9CJ7#CWa!Ur%5;T-w_S$edV@_QXHc$SPA0Qy&r!B9Z< zOLB`VHlqYcg62NN}V0Dl@sNeaVM z@@&dZ!M7jISZ4&}BhaG1TL-*h!Gt-jPp2^Sp5sFaM{KfW8BoL40WU>SjPa7% z+F$qiYI~=^rixwD!R>aGCg1nE1h>qQmGRP2h399kH5YT5kd9 za0Su?d2xKr035In#Z707Lc|0Qu?unlOemScSlx%%9>yWa!MTL#1kmsoV1j}vn8U;; z6)-Is!*p^4zV3Wosz+LzL^yrH$l(D_;{Y9z@nFCpU=cFF*(I$@${qn@V73jX-*%j~ zQwb8zqI3#V--SW20Aon62YbK|i70_-|7bn_;xbCoBj7lWGN8+Myg2d>;>bI$*wrfd ze-$a5(k+Fat<`=0VbB2;N4C|8D{*0GE*mj%R6vT^OLG zAZ`DT=VJ=%?+1{V@k7e-N=qPx$rzd0i zhtv=Jf77|XM2U;SlrU;iu%DHCho(`oSXz|z`h;!EMDz1q1YI|pg=wv3!HXTUVg<#* zS0)1rh=79xcoNM54-64tk^s>{*J}vD?jx7a9lg^$q>47xL;EW!$dUaREQ}q4d9o^Qx)}&%j`t~LFOy_r7rMV z0kyVviCs0uLUbe#kH1|Pscclru$G~CHKW5{)yaf>%2gnI1WW;LwBn^r`#5145t!1EL2rojTx z@G29&jS()$g*!h?Q8I!qox#fhK};qNzPuP7-4YN$AWAykqA)|!r)8* zz=|SD$@l8zWVJCA$p@X(%h?DMI}Vw*Sz5 zl8T}uqOlVFj3}7TC>ex{VdO0s0xVX9SUSqFGZ^^+Y9BCUrSgAye0}}t{nhCam@YJW zQ#wjK-raYQN=I`)i9)KSO3AzpZuriYNl(wf^&(8+gD@W*9Xtcahv4StBk_u)NEJaBw@ zMk*8TELO}JWowSUxup6VSqJSf@(>w?g99mXmWDU3C)cW8XQm5Q?0vX}-=nEDqdew6s>0=NOhOa;%31u5A{ zDRB>((HOfEj-M;hsi<|aPX6NR$Cj1zp#=TuM$mEw9Je@d|M z{*Fwp=D~1`l4ypt43RqM=z&bApHgm1X&9q4C9;cnA*?8$CMXmtc7)Rlwn2j_yh8vJ z(SY(QlmairVy}$AXD*Sv@e`bqCG(cm{d}MRDXL)E*4zQxOUxDA(~D~{F8GB!ED@r5=tU{!EDKEG0wf4W!5o1Q2T^o4ivjcA zB!V4Lbiwy>sS&8N7*kx>PDMyxazD1|Fw&&0aMwhxHMfiw*9zDHo7j0-)HkFG0!+^8 za2boDowvJG@@PuvVy7qU`Jewx(CA@NPvf$jACAe#kT4U4k6?`# z>^x)pjvtP-bb`d|!vnTGT(h6&et3uT1aksIBC5^yQy2sw3WG)afd4v?Aa~pvBH}&re0st*V+MUr=~Vw|AMm4=N({u=Ckz*~ zrK}KD?+6Z_PhCx6vH*UHrnn7WlO}Veg;iz(=Lq zJ6GbNqz&GpK#{_Lo2_>;oGOwvJyC3xZsQJBRa(}sWmsmgDsjC`q9H0B!fRR+e#?Y3 zQJ0Bc5?|$g;LlM=6jQP=efk$pVUo^bEhf$5&fzkTtD(?@G!2|{P#~_ro0O@B0)W6l zIf;6mojeCQum?mXB3Z%!_=2F^wRg10v}m%IfZv#m?m zEGT;--#g@guI2uF$hsWEbRz0hHQj0PQ#&Fvi(k@qNydc<)q<$8s&5w0mU5%k=Ah0- zT-FPaOBBt|VkGHIykKauHYQQvVF8hQDF|*<3A>JR0LA=>%Rdwn3{Fu17uU#*LJuDS zL+4*(l=yU$ExacjGMc6GLzllFK|h!!=w^~2Ob{ktvZGE9`Ww-@TxQk8E-7%?i*n2`>htSnQ+cB9}f!+m?7m3;A z@1H$m*6AsNAqIX5CPYpKQ~2OdXH$Yz_Zv%pX>@g>6_UD?j0l!s7K0%(hWaU86}Wmu z)h`@JKR93#E6lmbvE zF*$LWn3y1Ht#Xm_QG>DHA*y*0K~GB%izb0PM1-6hoo7-Z(u_l*UvVs`IZiT+v(O`& zJOY#GzIjKoQ(IvK_v+jSKNIcoGqv%2eglJG2;IAz=sX(Z_u=a#iIUI1(J%-nBi{Ha zXOqAWGfHFUQXoW#(VZ9z1jY$;(P$O~izmXK;!az=EbSLXeOb|c1e;pxun!Ak4fp=2 z(#KZ-KCVE4>r~M5*!c!QlY4GS6^^Kq*q{0VOvDMs*Mua$7GPFleMEgF{IIl_m5(WT zjfyQTtNRY#i6bAyNlG{lJg0kvAF@pYzaZNYJ!weYcDsG3FlTylLw1NM^EZScFa($v ziXE1o4MkzF$Uf6rFu6k>(RVot3^e~y!aC>A#0uq$j?{&=L=!pJ-d7X zE+P+IG8Zhdk;|{lid5+=T;p0>>s-q_aG6AN(&-w9F17(o;ewiZ&@VGTVXUyy2c^Q_ zcSE!`^7^gs5(l-UH$l#aqO?sau(+j{y2%0M6p6EjRU!qcmJN{7W5uoCkNL5DTcx6K z9H8qIx_2+YC1tgzGZ^p}SFAJg4TbB+Z{XAq7Q)J^fH=s@XMPMuq^M6B2UOjbsD&s) zLdL zcq|=@6%1B^vmuXVBVNm3YnW_~Iw**cI?!izq9i>klqFn?^dpVjC}=C+u4gfYp*RD4 zCR)bl7wq3_^2g1|B^RSUoL+ubt22d!eB!D}4DUk#iGGuLxP=}Vqcr3D)MJE@(ub>a z`jzey*{PD!dxr24gAZcI2Ad4rs60Dg6Win89~erfDlqju zFSv&ZQpfX+|A4%A0e~wvznTAr>8VqB;WM*bg6Silzb9piAA|$pUKq!IhsKt4%^F<^xK-%bGB{XF`p^ zst*zkvNT}Yh5}Ifm9^+Z@hN!rtgtgqBAjNsqPoM-FWDkxsK1Rcy*osa%Ac8w{gQea zEAkJ!bVc`Djk`0pgUE$JCbJZgieWm*kRkvwX_S1*^p6a)OPEgDpczU)TH-socg!M6 z_X>|luSCF8B3gmJzXV3xur<8|iTQ_L(%aygjO`$^4Ww@; zBi|g=XlZ~IjKuXB?t4wO2uR(*s1IgD&`40{4+8qLC#Y_cD&UjYv>5B{yBY6aV} zWX)Qr6|9@}^s$gDv|fp!bSiEj_bX*L75o{9uR%m_;M7b0@@6a{FIW1Fu8{sEf>rXr ztj+E^6)wo-tL85MgH@O7@^z~u1qwhG10GBv5a9$1{8(NUAoWPWoVYQHq9ZVb$udgY zn#vl^A@>Taaj44hkw=Ey@419)?hKwD9OCxUqxi-Ip|(UiT}Kx?6*B2{*gUaZemvnM z|0lG2%T5P!VHNsYC*qYSNjdx|os%9BN{j<^`SIih|MTtT3lPuU7XVG;baCn@FZf>f zB3o@Q=srd7&l6gsNB+veNIX|HDw<82FKW_2ifCVyq5tFu0hM~F$`meSe4B*p<4lty za4zI+Rtf(TH5sH4+ozZVLln%WNGNOhvt=>B>WzWVo&O=|+(x6@bb@YK^}m09!HaS) zep2#l?Q6b!Vzs5=EX}VH_Wm8gh&4!&V|P-(Gr(Oe%jXRKNClhO`)PILQGXzf`2>@? z!e6??kk_ptUh`+|^9$fDLOAtZB9XE99%L}- z{X(oT=3F%@eP}3A-RMyBm9uNmhtIh z^Xj4G|HFZ=0)xTeTVDcaMumtfF^nP!lV#UdKAwPC9EIRB4X!c^`5lJO zoNu>t%~Y%4lV~83gGx9%1nO>iC^Dgzg=gCwVdEP^=gZ zRC?2~DHedqOq04;p84=SiGHW6iZz^PHS|#G+W$9VA79bdKe7?~3`U6N`lL6P2_5nA zctJUo3q!GYW=D1YzuEemQgDFxhEG98V?62;cm@ncX@3aPn8PH9#&|>8n8Tz)s_&`e ziK&AzJv5CY8Ude=&C;1Br8k`BbQ=E-Cz#LfpKo%XZs{kp@Tg7^Zm{%|S-7W*=5!(B z!0=cJ(FnjyBc1Y)G}}!*0Y^m41ofYvp-d1y*FDloKm2a%uEJ zZW4r<>E^SVJ=xXZdB4WiF_{A>}fQPXhuLrlD;KnDuz~WGvwBiTO7p zW_}AQqv2XhGcBl1MbN$_WT#jb|G=g`rN577@H?euDrS;nGx3pwjFC&NJX_cz1aDzB z2lk6}Aa{-;t;0w16%dv#W}vW5UHQbU@Y97Rf~3^Yl{mI)LRzA%I4xa8U%6AJvUj9n zLd(!#MtDLY*)-Am?861`Ru(|$4@|$0O}>>g&X3ktPd5*|)NHO<;nfq(TW>haMX383 zu47PM#-OA#BpsuvYL`{UGsil5yiu6RF)kEepWm!{Lu5~zBhvbnVCBgNSsDM!6^(~)IMM%OpWIv z$Q|Z^%IKLjjX9=jj^r(UsTzS>IV*6BerJ|jsyaP;2Hq!t9vgtb$EgxxnJ8bgxYUaB zTAJb03A$!~uhG8wth8in;r$^%1 zwEYj`)PFC8_DSg=q*1_coZubI8HGvbCxc7JKsHhcuS(?em%x>IXOc^KBKufr^xzV&G-re8dw{!3F=>o)6WpQkUL5F3Jz%>E7+6VG> z^U(o#20kG$!!sIUKS6FZoubgAz6VN}h%B-PugM&*BM=}s=hqx)yZ}P-t{=@Xf$UBq zU-1+odq|r_8Gr$ffFF{*fZp(!5QdMLFA)aGEF>zl5=)PV5qSad%$<*d4L1D@1cY6@0MPrt8BUoaJ;WeHgr~z~ z!Q#O3@WD*INP-0zCe-yDj#89>ud^}!x=lkikr`q8t{cyefUWELlp7bPG^bPlTc5_e zVY8?dH3|j0`a3_1bjI_oaz8A70*e7gbCkeu~Q zm}-+~N>@iGnk8BmrCKC?)kK z6L;u%A#-X*2~hJ<%7jh4pn4Z)dEQc1uKuYe%!O@Ld+NqBOGrSvGT2y7PnJ`rc37iE>zk9%y`ZkH;9r zw`Z4gTRN&$eRYbrlQ~x;T~Wf#i4iOWU91_y{KSJ|t)eeQ5GbKO?VX!a*Egn?%&BC&S_c(-gGi)a-W}A8mW(S?xsQ1jG56fx->#t` z-DJhq{e27fTq&A^VX26nh+n&G9<*6BeXR6^fY4 zc(7oxj|Ino;9EaclHL)> z3sG8Utrc;2EgW6BU63zG@}{~sEV3|@>Cr<>)8hET>>IPZtda*K@Y(ln6AV8KUYtYe znrFBWLSNw$p2`lhz!jMvb#a4euiTOI0f;EWQK(%y85e@P2q9GsuTo~-S)n6fn3icM zZ>ul@xtJXy#v#Wxi$$TdqZD}d>`|gpP{0Wq9WBdOu|ZUdTm$NlEJ_8i97FFhI#5C` zl;|Lo(F@ifgv_#DcZnLTbB(%iGple17x1h)Z0g#}Zq!!XlO?sQ?z~cly6%DM{FsV$z0E zkp#MtOeAYRokXOJaFslii7CnrGDct@uFgrX&!an^ejvn=cec2Zx5_E)jOFz)CIRqT zdDy%cK_qSm$xGv0$RQOv-?T}AN`0MoTuBb0ueUBjl;TOmu49RHkwh~>0`zq#bE41$ zCHHm`yGV}peB=~9NFqok@@p(@ANtRnWj##8BMi1P>iN^*a8oJ1loFy90%Mk5@ zZ#uvJdhq3o^zv!30_{l*TR{7jY?|b&KLYKKY@b*1RJS>!;00OHuO>01w`h-EibS*$ zDm(8M$&Oo~ov+E%&E}PV{q;c8v;!FXT>Ur#3U-~jIYcQm4(|NWI|4O}=wOOc$lP>< zXXBSIStlrZT+fn-7BOSr2}b_`p-;GO3T#qU#Ji_W-O%3ge1`z!u#RKgnH&7XiD3KX zOHKbX$0edp@lgOk!M$pt*vNwaNZW!s))YW4g?J4VrHlf~-~iNo<8=VCG712T13+ow zyXr7k6W#I@=3+QBZfd#W2i!uq=07u4muHQPXYvhe;CPM_I7Uh%D@Jz}Mx;w9^wghA zd$=U|`i7mHX7_@&=w}1Ga$OZaG|p+n-@i4}{T)3k_J0@z>+SVb&x-wD@0xmk|2Ld& zZ@>RP$wT*lo;*2C7I7r@`tp{|)A|v0oocEHqAEJkC#kX?up?BNm~IG(IL@sXJiLJ? zboScq9|nQC{dc|r-?B*0!sHG^PgOB^Bzi9GPzF}3sP0*AZ{Dl~^6dF-3 zuT_YDWY)4`{mUy1+i-yu>)$X9tFZoiJ;&Ow|EGB9`oE$pxe&ZfE(Q^1N_c|s?4ETC zSdvWLGG@Wal_+*lX(PAt5*UsV_=;3`0lvzv(;U5&LPGX3FWh9MOR54F`DFnHi2zla z(0={(K$h-&!y@-6CuC~Gqf!7mb~%I&P}U$nvM9FO&Oyp>py^KOpP;Q#>p9 zzYI?Ii2UC)or3&llDB*Q{}j(s`wwAic?%FVkW!ksmKWYCtUmmFXC1STq_kG0afO>H zn2ADSP;EkKWWL$LwjwG}-(O`T64$zT0LC1zOrxLRG^mFqd82wbUn77jMcU$$O(mMk zkW@osDtOf6sbDFLO9^73=-&D`jgkcqxuK}=N_$mh8DN=^iy}eu#-A%wvutwOqV9Rc zTsaK9plc3ZAs7Hk!(G>0)sVNzFyx!;=O;Zk_HpDLm&bg`xEFva2An+YZZSmtA{s@E z&kLm71lbb0YVOTSxgn#HIPxkcaW5o1+Oul^moaO%5CB%}|CZe=p8x2kVej|1Da;KTBNM(DE{dKPWb>0H4G+>?b&;!VibBT6V9m`a;S!$BDx(wn24(~Hq^-xFvZ*N{!Pa=*ZBeZ8(u$|R5`>9Tbo3ImT1{{- zw^_iRGQA1J-=jrVu_cD^FzcO|j6&}?LN5#aYGqHv$tka&bKI0L@6ZBQbm2ezCT$sb z9>9OAi`WYJkKfz5i~`?XY$^pVm;VgiG3=uK&*?dP`R^$nYX5sxvhiK0^DYBhPN2N0 z#W}ysTTg=@)f@LX9mN!0ORhG>3pGz^fqkjfbcv+K9*yFR_UIyZ8L!7U7Z z>)8~AdKpLFwPH$G+F7M+jnQsJc~*nq&XwU>%bmgo11zm4B{Ro%Mh4-Lzr zTIJ9$tIKD?Dy^A)!AIbqExrS^{-t)eDP*(+@M{5g6Tlp0ZCL{X^A{j%tJx-5vy>D? z3CUaKnIy2fmIl%&qYGXuja1tEDr7PQy|$J6;K#$#hYVvseicOSUG0aq>w5_(C~@%+ zykzO4q%%4%uEZwry@Z(p>mjM_pa&PlIo*Q2$y>E}-|H)B&8?5s>RS0th2ja?GLySx z1c%@`lak2r9F{s7C6(3M%F?GG>WaL6hzUVZYhh6xq?2EqkrEs^l49tWBctjX6=qn; z^p-=Z;E0B)z%CE{D)iKWDB-AlY>KD~Z+&bxARTr0Xhbwhg)+I6KIRFf2$7PCd|B8e zCHe}h&}s|i^kXq;b+|UArn>rD(9zNnT8n~~LfSR$lxQg@m$2*qyqFRerdAGdYUPlP zHnp7jPYIT?YFo?I(`YL8(#}Tnv+wt|{oc0U+nREw{oc0U+y2OV+mmi>IXmNTZF5{< z|C4v!9?}2ba;%d5Pq%t|``=SM)c$vk+$i*5vQRI95|%0q`9TCdo;^J+gf*`<`6<^V zbBDp~u$ku=Pf-%W;4Dm0GNQrZl~dr_W5#l|7H9)yMd~1T(UV7ks)(oSk7~}J)$8#z ztb02PLZ})iL7j^ZHHT((q{m?e+sQD@;=wP)j101fhTbaTIgdk{S0;aWQ;FU@4x8as zjC!}mu!*Y82TjyyhFUT3*czybs?AXoHCCYZYUT%Cb|Y{K)A)B?*}%oSbQW)4ifV`&i?=1W?G>S6Jqof1xoeoI&)dv8wBrER_~vP>WUh&?tWpR_gpy%Y&=r zzq$M9@jnbx?-k>JIL7|||C2nW`~R0&cy^u*l%|*4G#UWig{qwaQWbrD8LdJevXjZTK|1E&V=*zsyj1 z1LIaA!lGzO=u?i~vSt5gQ(soDf68?q_5P=6>qYs$XFL1#|0GYz{v*=cZfNh3X5D2M zKtn7dZi3p&0Y^UmCBoc;#?Z%h;Lbk|Qoz0~BgtA3)MdeyHmq`%!&KiPx*O}|Z^X8S*6TGxhRz$*E_S3LhQ4c*?y z|9X-~k^fcwdTl)*?@Ca%-Q`QP8N?NOL(W7{sXvI_xwLhb6p6z+Ov3GRtyCBj3XPO( zHkG!XMuE3>tbnXq|C!Um<~qQN^>16IQS|?_oc;aZCwVrA|98!4V%HIXa}F}R$X9bI zs`I5Kza-4aCvrCBjDA&&B_BXg>BR5IguJT=g3AE!kQe<T`Y{xK3eVW&k!>)|?Crj1N;Buf}o-hy}-=HtnT<*)` z_m!4iU6{R!K!3H%ZXbCso3(j%v3}}|NEeD!r>CI(zr&y&?0>>H7ZS4O$*WO?-_||V#wNmAV$)GXwPzyW< zRX#~%B3t7i8p5CjzAAaL{#i`%zsa*){%4-@9p&ak=T^B0(NH5;CI6d7G5?3<*!%lG zPx3JNUx@x`B(k~{F3UvWfk^u%mT(97ArA|LGAn*f`nRz^N8#$+Z>3u^6<$E~_i==+ zuk#H!j$^_PnEH|RB+L5FP599Bs0ads6Y)ugd;G$)MDZFGd0~tAwq<0aPW0P}0RmhqHpW|4zlK832I zGQSLShZgcMg;Q<|w9;gTTA($JW?^~>(@6`oH1e8e+HJWroJP|YXw4PeI0lEyhRiFk z0b$KohH2^QsyoG~K2Tc;r)I#GA6~VJJfQ->rsq`+PpitU&ce!e*P9IykfP~q)CG|I zQW@TMC7im!TpDh+G#ea3=NoW}Qj|;yPp3E4SnlWCIqCnG-l@)xOBor>U17&j!lT*7!9YJ$ zsFPDG>x&$Z7Qv$>J9Aibkk)i9tPJnFY%M6keYaQ(b$|cXa?pS4vx)rAg^k7s0;~Lg zdOfEo|9ADh{Qo46Jpapy2)>70SP++K&`*q#r3Zn_Bx176dCGhF{lK46V?rxuFce?U z$j5eq;t2a`lq|rnzaA|qn8Gpm_16}Ic{vLL7WAoLjm+1HWie{dM(!-}(*=>Y(E|;T zl+40o`~jon2z1m@m07G}2_Ms7PP4jt3HYnWzGN!=YA4}G=a?=CO(lwT6G7N zRW}DJ$3)cOLwWZCd^M*7S?>E?MTh5VC#y|EJeZ4sq);KqNS*AnIf_|VYM`jaNt8xz z6dZw@lgk5`jIl~5^`J>fdU(ZRZB=(k11(LXk^%X1D^y#&rCI$^W@I`+0&!C_$m?hhs4I(@eNIEGU7%57S6FKw)O{ zHBNV`E$&aTL#!?9v5l}Ik;59&B7-3vPBws$SKJElnmDlJHm{s>0+;OHMIJf=X4fH` zK#Hb(Z_~gXT1a`7nK$Dq5q59Y`=dRL_`isIw~6tu0snXGlKgL&d;k9@c_jarffTnj z{>iY4m8L)OwaV}(zO69(<%=~j`sHinO@3?J`~Yxa42OQ;r@nBQf}SV5q%?5x`sVid z^xfIT!5a2KB^c!&(K;xpXIHjCbvz#5GDrv*h8~Mh(HZ(-2T$nVnoIw|0YWkG!;v5Q z>0&j~J2uih;kJNx|KPx46lPsaFW zQ@p0lSBCjkf?3xu;HseDwI-fLlt)+ z0Z!61z743?-)&4!69;-<=O4#O?B+kRFI3i5?}Lo|0I^PX(rMh0-)Y0ux5tX38$@@$ zkcZsBN1@F4GfRS_TsEKLRSh?RG2*Mebi<;)y)n-2I{aTWyp^-mE?jL$Vd}ei_%zQT zbr>sLa0nt729pS<@@?_j3m}bEwL_lU+Zd*k+gq+{kRMcGsJTM$UuMEspa1V%|2NGF z{a@en|0j9M{C`{hU)>7I`oHAF75cyUwnG2U7i*&b=WA@K|F5CcEBo9ZQK^?Cu`8us z9goLX>Q{K(NMsuO+_3GcO?Kv&9hABmU(87bt&(Gl=!_`FA(h-k>S5*`N6McP1iklR zusEWb>bCaGY2b^qbbkLh_K*MeXU+Xz&hQTHKSs|g#{V&U`}luP^VHdY)Ra$8Y5&Qx zKdqrYR@;A6jdu6;pDHouk?lX(*sOiyPpakhcm1*=jryFWtSWVsgUNL?d%gB$zoKPg z`&)mqAM?k$>Q~t5AN|7L#@g$e{C|Dtp9c1S%Pi`Drfu%;e>};v)c=PO?~WXQDi@tb z58t?fZwtHLUS8brX|(?5aoD+~i6tK+{-dFr#rO}p(=+$$|0$k2`H!a}eM-@frXy9P zzID=^evzptTTzTcmf3XU#HbkvP%WUy#_s(Djb|{~Di5m)q@uxtMiR$74uz~yfeHKc z#t(R;>;G1B_x>q7jrl)c6P;T|v%A#)jb1VTx9N2E`M;jzspJ3RIuM&}AT|LgLs%44 z>cGb-h(?vF^#Ke$S`${>E+U+i*`G)L>ca)enX6U)NL*ri42_?+{e%j??Csk6KHf60 zkLWAjbugd(Ui15U*605_kN;rxoFf0Xy4}70|0GZ8{^z#GzZG0EJN@M!s}6tprxjR(xx-S@ z$P$$&@hkdP5Bntm&y|2-|L?E!R%N+1I4t&YCxh=)48BtsePff+ucy)|0ne+@6Kr>e zQ9_sd;qr1Z#P~i+JT@{YoWDt;Df3leavV<*3RY+4EZAfPk5`Z{`$H&R52~L|X3%Kk z2~3dJmIcKyGGy4-`ir6kn@4V%q@|?fe?jCMQL~A^11TH$a}*+sFOz6U8_Khhqi zXywryD%O|(b{_vjcMP-S|Gkg@`!vrZ#Q!Mjj@n~o2mMNAH%&dezpC@>{&;zDd;H<% z?GcNpUf5Qeu-s_CNbO)No$D(l#Sx=z1f4PtM$wg+WO z$@S~Yo0GS>8K!Q4wdNC>nosg}qero& z*bQwdcC{^~+{xS5Kc1X_IDLJ3@%rY|`>XG-Z_h42+9h%-!!L~epWhDEaO|AI*fk!N z)x`YR=9!(?W>D%XGRXZ{|8KI=Jl?Zh{^PO#H@x>Ro>l%IJ*!*H|7=@({qIShrTJfB zA^R%~gcJTd81FRqt4K0Y2p_;%?r0VSB0tD#8?;uu)9?<)qIL#KDOJib+s1Q)$G4aW|>EL;jGrD%_}_He|TN0&DhQ?p$ijKaj4c^AGh7mZ@Zy8YWq=VZnQYh z;$rl1nnHI%l+#m0{`&QAAqh5I z|03SjKS-#?Nsjsta z?R9fm9H9a}rIE^iUov79D3k}TqELetinCs7O=K`6Ls^7JQ~Fc{_{gWO}uU$oAxn-kKN zOd+TNm08~W2koz-A?Z9z&Y0A^X@ z8K6>|IVM3`%q5|x(94Lv%vl~^07{VmOKGxHwm5ht>{@rTAxc7&BJ3t!3moQg%B=eh z(UGWZ+i<3b<#n>cG*0VgusAK#${CriIT_Pt^DtdD1=B4?zrOw2fnTG!@|YJmZN>B- zlDE^`3&~1XjaN0rmSM@UAhWV;5iMyDS2cE6>Tgk5sPIXuWP@29&Ip-8!9}MU6NtL^ z{_YGQCG$orO&}Wice2kJH4!Z;iDoHH>z5{rIP$|3w-nb`tb9<@%H5+OJ%|;je@&ZF z=9xF6&V1>Va=9gE4bzQK=hV|yxo0ll%!+Swqf@{C<+z`+E2Uy;)1VZtQ*ymDP*Ove zs{)__n#4E@tf>Hzm3gA$jF12goR-F9w7$xZb_F|8d1?j|yD&f}NTg2$pp@UFz~0pV zF9@!!G+-%?3Bzvr4=$oPl&c!c)b%Sg_sN2-*SQKUnll#_!|%~&gDRQ^b2 zL3VJ&XJB42{A|Xu)@g3)ib5@gqH~#`424yoP4eVTfz*0A$0Fh=pE%=u0{fg9PP!5>INkSx>Og? zlfDI1_o`4P_l^q$=-=6^Aa zz5mzKJZta&;y~pwc6?4{OLu)$J=|u;FRGbq?e+(%GWuI>`MLJXySVzb7E)1y!E={t zn~GJO2C-9^rZPMH@F;gm#cS>6bc+3Pc(~NJj8kNd1fUMXwr14=D=%(}Voxl5U$#M( zM2s&ow&3&J__pIDN+UN4@>6jLT5oS|F0ZA*bh*7$3_D9$gt0q8WSk~x8sjPp<7&}l zBSY!)C}EPSAh*^@FvBTI&MsSr;5iFdB|aYVeU#Wu|D+*_#B8M!uWfvC0N0_o;HEDk?8)Q^oO`N`+T29E;$VPB zEs1OSsaiD|b=|-S6W(?_VtGbcnZnDwKwDK|IZ);jR|%SZsvDJRI8BD6mZL~_ze}7a zkh9Bmy=Y6_j%UNb$CHaFC2GXt*z*WK6eLmiH8;A;K`d+BkKe$lA1qY*&A-c^_f!;L zK61Ql5WxLKwWSy@- zws-(k2_e@;Rw0vXD#qtI6)JO^#6{#$yExfanSF@utrWSCe>^;tofNN>E{Ipko?mTk zs9F%rQ6NOM`{`lbXR-kvaxN7hH;s~`D&EFE)vS{IXUrq5E+*h-I>RX{^_MbOGUu$Ru+7i$#+Uq@pFI&) z)$+NUIs^uF=+==3%j>$x%VKsch=AV{+mrdf2Oh^LF<~9*#Dgb4c&v;vFH=GMxTQ=X z$fj4Bq5j_an*6=o1nPQ<}WBWDepPsHW+V`$QAc-rsS2NS*ol{(>al zt8f}&`;XAON)XXwPQ~nBB^}eCaIZZ^%O5di>kZC2(2|bPSMkI2yxcwj*2lB!{rfN zeZLwC<9_+jq1HT-HwWVQF4OdeL5$P%W}Sh~rr!abB8b1E_uDDo=#=Bq9K6}UOwVp> zpA{{2*|7NWiL;$OkyQdDN6o2&23bE0PwL)Lov2WQ>ipkVF??=?+~1-0gM`nkNSlKrLUUCU>?K7p^>wV`%`&VG^Ck*%H27ufSM$v{6V{ zCSAjtTX^1!c{bd1Ona2|OnHxsX*8a#^SBc2aCUtB_2%sBjquG=D2Pr4cme2ecdD(w$Yi#<*xQb6nR~TokP{(NG>%{V!RnbG<=4C9=q4O4aKlDu8 z+VyJqDVZ#*G=14FQc}|?K^K|M4^2;_X0zMj2#P_Jqp5^n9XkE0r29)nXJgwEZXk|D zggIj|vWj+D(o$je_vCBx_oM?l-ENn2+Q!M}9~l8(-S_W7HC9Z&PHDuJgl~Z9n?qw# zupJtcAe0=$JrVqFI{X{jii!9DXnI9+oGi-x@&;pJ5O2`74q}cskfMD-zQ2#`)DNG} z{b|DgTc-cnng6>#o>b~TKh*!cpO3o#$uZg>z{u(G97>g!tvR0K5K;s%kx8r8Ig0$3 zKNgMF9A5X}We%_3$BcBY)`UJqD7#3rt!6bVxtj8y6<9D>uQD$28w~DmXe)dU)D81a zjLOam=V*PTZ?YT_l+e=qzpJZ^>Wi39n@$=RBM0U(2;vTI&=#b|GSpAJ#uL7{sRSJj zJGRXV-tS^Y<&5r{DZ#XwPnE{(zPPz+IW-NAa&bffP5^#)Q9dQL^H%P7mxq4wqv_XP zCg{`q0gnrpTzmQgZQ3+3wa zZ~NHq`L6CFUBS3Gm1@uN*8_bft29kEl81<$y&B^7ARK1o}{L5c9#jwCraSpU_eVd@w2IUv&D&zV0{?ZTnryYkiZs&{!W-14X!3$z1;JmU@TQmyLPdYu zX46q7`|MhGz55Nx$dY$hKZDYDKVQ32r#?uS?LT|de;MS^#savD{`V^OzkYxCkpJgi zKDzuTXLr1d6GCAU zB6DQAo7n?({j+}drvG9eeUAJuqv_O^|NFh(ga609d^nwY_AZ06#xf7(NarGb3tM?F zdD01s<|-iaAHCGQDC{T|&DG-vOd`25HLd_ToVLHxE!=1uxKg7#uvGgIsU`0YujDC2}|L->|F&K0{zl7@h<`j=aRSe#?|jLfW=T zYW<2F7qf?ax3v5iU9QZfyw6Fz;*r zw8h%XAUQ)cu%f{vChj(s4$POzyzJa--Gs4kbXlPyiZdu)+wUX-c@niP&gh|(9ohEg z+gzR*(TYoFJBXu{b1hqeHc*Y?$iGX;G)Gy?{pJ}`#_FlPS}_t-TnG<+P!lt$WM%6X36hFuu&Rq-gahWjpCNAE7Kxx2xhR)-nY> ztvr5jrV;W3hG>;01bN`{r&p*kSVAF1^L5MtyC7f51}@m$ny^|5AlSedN5Jm$@z>zjVO-_bA!L@_vt!@|2cTAYfEruY;hIL=kuMX%s@q ze|yXS1krV?>c6}1|E425|8u`Ldbt0)mycu1@|D&+zmLBKKcRdf&Ow}pFqSM(I!Y+j zL1udt&m`p~;M?QU5y9H$D!wuRT36?5nl4a+a(42vl+Zy@90PwJ3E*sHG<%rT5+pVXU#VfVL};b!miud+ej zx&3!A><#Vuul@e?!Teny-GJ4z|zgp0a^&oVv)6% z%7{#b6HJnn&n+LAyJu$)E=-E`G}{|fE&Dw5%&Rb>8&fKNs?4VNd9R7oWXrgO@0&{v z@ZQrH!&!9}E8W`QYvxdU8FbVYjya7noH=K)eABr}osZ4gbv9`_({P`y>+fm5sW0Dm zZ)7(zv(*cdlHwX1<|SGy$<=W~Oc?7yeAV_8hLnS4e~g`>|}A|+t$#VKl_ z??@Gb+F!>38yAB5@&U{Y2oWkm?5Pqw;7fC0)o1h{#*^lmR>Gxnw0?bZH z%n7r_S{qdWY;+BFRaxa7tVu4gOFT1r*kfspg_RC?<#MXbR64W5$)Xjr(t&^3j7p7g z4>HUUs*qtdYXzV>5-b}Vt5}2v*(Xmnc9P!evnFRx;k@6utM+wQ`QxRmZ}m4x5qC67v4!^BJE<9(0Ohv_KKy zNzE|bGED)!qu_Rl5?!9f^6FTltj1-jc>6-U9cX|nw`&eL*H3S3$ULX31l_USsP}jq z#&LRksX#m6;o-ML<^_jvtTT`}dc^4%VsMJ`F zez)9c3Xvq=RE0=2!5Z8;F|w$Tr*SfpZw?)6$pPw??wpba_7t-|o`0R1Y>9#FXTX|C zU?rN>o(65V#9)s-G1#>!2A{es2ELtO2t8I+9RaGMG}i47Ddg}rmKC38rLVAO|CeG9 z!8J`+km3-=@s{^;aen#c<+JNI-#vf%^v%_?*S|c!cvfZC7ce`IA_v0_*Mz1k?_*B; zyicQT0#`WnK382o&C{%|Z_jhpx#w}&ySqV+L}vuP!6@>K_(=-@c8=A(AVh2co`LU) zgbBijMKR^R;T!wm$=>fZ=+7Ffxe01}bPlmNpE=&Bl;a}5ibd;e3Tl%=S)D;kGg2+A zCGx%&B{<6pS%=^;xWP&EoZA%2Y%pdU9n|AW-02h0?+r$bS{5|Y2}MsOTa5aN5cxe+ zL@FyL`dKaF@@adVv)0(|q=qHOC?NWXk|YWpn?zRg{MHMU`dRadk|iB9vin&@* z9%>iZM85;&?uu7gj4pq<=r~aY9m?H(JJ}|z?hh}#A1`-+Tc(6wLb^0Fdi>_1lZX5-_wuQ& z|4)|)%;Gfw$v`&05-}R{H0Qsp(siOU1@O;w2IvxUBVoQy4rXYc<|pd2~7`6%tr4sa}sr%NDq{Ttt?hkAE`0=1C(_33pd;kDm!G(liFW+6%H|CZwg?#Z;x9RLzHJNQ&m_(w>F6bQ3aB@tR9re8%7Js5} znSyW54SPzM<~a%}TXCJ72EjM~`Tl*i?gxw__IQ)2;#}Y37!~`Dm(WeAs0ZSBMFw_Z z!kc#hul5@*)7u1eUxV@FH^X2zfn-Ms_ctQR*AEcN{krIuaz&A(W(K6#ENPB~8*s{$h z>A=U2qV`6%3Is(G#WaY@=wXe)k98Hw$B*^+@94M~9oqv!3>70e(~XdyeTn4;6i0rO zB?7KIBn9SY=IZ)vohF_1E|k%yU1Hbh)ivt}MmaA2n5<{!L-|7qpwhyD{ey7p`!tjP zWI#B|8^r=5bi?$=n^BUQ#Ay z$0S^6E4pTskM(9y9-}nj`}Z{h#x4zA`uXzB-GaOeXf7gQo5OPiqgP41eVwM1iI`+dC|Vg5r1A<=-Cm{% zdj(Vk%d5$o*U!$MzIpZX#ecnd{p!`VIgU=h<94l+0_6?bs=F{)~~uK&IZalLI*#Eo}%BX0dBm-T}pc_qO+sl4uT z`7|~PN;cd>#oQ#CGpu11l8@wg)i>P_*4R!)bH~oMAXsxyWqUG5O6O7}@gf-t@qEiW zJQg6B(ucex(c8cUp!1Z**LVs8+NQj0S!YdD_nOT-B=HbL-=S@(F4s} zV{@8JyIPKZU*jA_pyL`I5qZk^HElWvE0_`W27p?|G<7xY@DI||N^J?nf;_4=*N|WF zs>x!QT?>7?Du}E+-Z77eF;h5^^U#Lo5E&mChtDyY2KT7Lt~{1<(Jjb++k^E5B^$*xsyBl2p=ogj zl9X%YxC@G(N=j_d;qo0P`PKIda8mrPhu)jL?4jIfr$t^!~%2>^PUP94rfh91xgI$I~trwptU59j@&X61H!Zq>u+XEo- ze~9az>wJw~o?n5hi}M%HfJ##n0q$a*%u_K)*0O3wXEfjd7@jKSLv``e;i)LOuV%$L z`$KUv!kg+IJtd&RF|z#0W6^h;{~xut`~L~;ht2GNSsJy-0JO{g*Y6GO{6FL2gZ=Mb zKEnQYaJ}T|QG_`UGhMsJ{udnVWdO|5NYDRc$c=@SPL$x~N74SR)@)Jrt*)l1tl;X4xL8Vs-tw@uIzofPJq0+#! z{~7r$u1yNbrB2MNILvrRPlFtZn0leGGo_M|J}1wGcaQVnO3$BiFuJ_;sQT21t1#>d zDn{u>7T~-=TT;`_2e3}?@8AOlA3;KroB(oMoTEBw+^U!?3De< zJhD}w6`j{HLr(w{0g{eqS|2XuQy!Hp29K4dUx9JRwYFVMt3s#C-SBg^$YF$>yJ0P! zd3HnfY0KSE1@tMqp$hE}+YMDz%H7~Vv+-`Iz-YM}igTosG3(?Tk6Isl1InkJc>~lR zc;F2@^wVx4*y5<`0CufxSYbak+{e1+_izpK_Bo2UiUEDR!P&sSPoz_lvB1IIuVAe? zxDNAjA)Sw#FQ*I4e#doB6P0b9lE0QRWZBQ&^8a~^ArXR{_Vv^CrX-C}QE2Pq#{>QQ zr$dKxt`PIHtN#9Us5H&eI9+V7vK+zaB25U*A(k$5-iLS5Z;bLXS&sI#A?!b)CG3CZ zr>Xrfr_FPK?}-2CPe+ydzx}~O{jYoZ@Ed?j9)DaI{8XJA!{E1vxsP9wXnBQ-Oa`%; z-oYLIX4M`le4ovdK_<)3WE{4Ppsr!(yrsd(D~$yVkq2BRqLIIex4TVm`9$d$^p3rK zoHJEh1kk7(Xe}kjdlhC}j6)kNAH}00NZg(v)3H*!wSHeZCFp_Ok1HN^W@o8cGMRF`WM5q83fX77(@HIKo9syCDMWhIGcCUq6ND+rM5JS}9 zlvhR~4&2a1vOJ|}n40DZ?jD7H*PeEMyuQBda384Z?^mt|*B89KxI&b_o`LI&%gR+} z`II4EMW`A+?+0qIUW*C){@!)|8`6J%qu7)I?27-JOb0goAB-RB|K7_-(0{(HK=@MQ zGy!qCz~O#WU*0hn@pf5`S1{kIy0}u;wuya31(6Q|`Fc^~T!*Q$Zgk4-WNHSzN1Xv_ z?@68CY%KXkRUwKYAtkz^S&7?Yag!~dirb^TM$}PdF)Ta|51ohj5ue@bZ6@j(a;j65 z<&n&RH+d=9A^Y11Ula?glRwd@!d>_^w{8 zl87FNocY(IYZxM|AFG2`98l}SVs-Wt_P~v2XGv-H1EOag*Q(jAl{ArY2l1~r9W}B{ z#L!jT^nCzGxI|3gDM4^#y%4;!&Bs8)>?#d!>PJyKrN)|T;)$cTVh*@CBM0DodFN=F zL(g`@b!{aDmHP(3_$i9vwz$U9mXRIfz|jcQPpbmYM9y`Nu9rC?%QTLvuY(C!;XlCB#*)WaAZisv85$-?lhW|H{|8yU<{iVPi^50*Zil->CW_K0sO9(Zfg92cA zBCN~E1Cc$|KuN>eh^yA4u7e$yAQ}u6Z6q3~Z%v_y0pw{07u;Aa8rr|^fa)WzHe-Lk zyZEkA%+`Nxxe1Mk5q~}^xf?biE#f1LrBO1*CZv^=q{dsW2GyO!4;F7)o~z2HVb8rA zNA+pT;`}Y|zNtRlwM;b&^>71mH=j2Azo`Le2mc?9r*{3{!D#YO|MOlx-2Sth|Lr}EN+csy{;Rpt=W$jbS_9lF(vP$m?BY9MjEKF42 zVM1}T;Dp{JbI0F;^Y|8S3CMCZM>&8AFq`9fkw}XmT2%kA(R@4o%e(?yN3`rXr04n`2>us( zfmhhR)pK@IGAuUK+ z5f@wRVyywc%R?f)pH7Oop2oJi+QvrbB>->FGOSYjE|m$}vuFEToYuak1d? zWO7B#7YF2JN&y5L7~=?3P7`t3Mb)C~|iNSZ*)kkLs|MNYfgv_wEvWzG?a zB$$@$Kg>}?#HgZKmZJ?$*TPRKO>fp2=xq8O&=Ck&<0Bai%RzEL9YseQ0S_y(E*3x1DH)l5el_p4rTxQ0Ar2o zAljXBKGF+NDvEBTHz=o&9U&f&@N&HZW&Ecgdj z_U3xiV8QD=mUB^DxBecV9Up(aIs1C^f4<&yWiMyLVQ<1s?)Cwb|Nl%-F0w&Lq|LMH zdFv^pa0UqiYW*vtT<39;64DII|4m4|N+a|{rb)ebtg{&6BujJ32$_XCr)3;dKS8U7 z>x0=G+&`mPXhGsXk>6tx;>qXOu?OyEmRMii)t0TL0}1iq9uSbgT`0&$pAiWmBEQPu z?`w4M-dW~ELMqntvLHy0H4-5p79?snnAeg>6reP!u`jS-oyVZVcO?VSXhXK>gYEqL z=!czLM?ZTU+LoPp26pEihUqGc5k+QSe;~@N9)_a*{x??0=RgLTt7-j_wyPc?l(eb7C{Ss?e zxXV_o6N+PyE#6>~BN%N#_h;Z7xAtd2{6BsK-KDrb5DWV8<9~uE1tdl&0|UUmB&g#` z*Zq9{GNqR}A}FDM8Y=tce%jOj{SAP-?0>^irT)`+@(}-VFP|^V{%0_T)+RuUIqb7dF8C%zxS9a~S_L7P`y+ClS~en*6g4tfTWCraKS16=-(n4ZynaZfzJW=FHi| zH~xCd;LdTXUR#(4OW3-~sQo$~4F`tSST8=*>yFNMTN@4c#occ{`~$|a)09|C6Ys{5 zxDQ01Ezz2E_g1;P3ERV-rl~mE$XZ&}T);9NRB_ZAfNE$~vzMn`Px~6z?xr`NiH+@v z&)B8U(Dr${b(`D1I1<`;Tpl~zXFckFMvL72ewylkynQ3@kKOVA{ocgZ|9XQ5|L=SG zd|CP*-(8=g`f&hGtxtgdqZB^g`={%CC72y*Uo?Bpm6o%z*l?%Uu_lB6TM*PcQw}-U zIt9*butUkJLTjT|Il8Ps<)-^k>b zxOw`gUGm>#GN|PL>pkRux}Oh^|KH%%nTP?wF=EvG$%;)&xI||n7>sAKJ9v%gI!^!u zB%M=`q!Bt-*-^{7AqS3{8`|DsZ;^ljDAFk1plt_qzJK+qQ|3o{%yZ;*zB_;2VgLSj zM`lR!Ns*o&y1ax2nxi~N(bIK~lf{*&f`OC8^F@*tKReN^%E=6 zCbtMLmh=qt4LWVD;}Yi4C#@p`@Ojr!^uS(Gp(*<>qn-))8s#dqru*--mNl#Q2@6-O z89VG9&=IHQv#empEbNAU2P$xl_o)Yj?MF2N4WJe%q{5u|erW<#ykS6ffmt|+|2u3kZsYW2+pho?h4&KSQ*nR zXYo+e=leZSiC8Y8omUy%YLj+oH!VbNm}SAudWP}@QA7fq9v3g2iD=7mf-BuQb91?i z8CMs@#zLF`*#P&I0HAm{sPSgE} z8ltB=kTf)2cz1$^cBFU78TYOK?XCZFN6qHC|NpZ`{=Z4z_W$k=dV>f3|2{tZ>Hj)y zpi2a@oGC-Xc^61hQaJ!}$MF9;;ISxu$L%IxT8qg&YtwCoIr!yFHwpl{} z%pM93So&(K3>ZPttLDgEzChu^YQ=u}0BCx}Q{)#d%Oo&ooOxJ1aX_`21Dm{Z*1(!D z=5fS$TNlIRPo83tmQKscEf=M{JreJtNYB#5o9K0R-W!$c6{zyv zYOiLem6n>u>sZ1PPR$Z(jXviJ%I*I&4R25mxZ^)~jTV^Dd@HXH0cXtMafGrQg^;4? z46F$P<|2ur5PBV4oDhm&bXc9uGMYuI#4(%ht#WR%4uktfCy!Ax)q7G6{pkHN$#jZ zHlf*K7oLVbT90Z0^Mw!dKYC^N`|N%G2~Bez;MSY~?2`Y7ql)}L>OJKDzL!sP`CsSX zS7K8DUY_2?i`A~-1yxE0tYyw}s{wi6YcwS3mGlf@FrF~&=c#M7roo>f$VkQe!aG!wA-#dTrbQ~524(00N{Kd2Ge}8{vK?7E@ zJq4|F>A>&0@`Wy+2cE1FNIA~*@i?@5cY^i}*f3tGV*8>SpwEixS``4QLbH3^{f48@ zLQQ#h!DyKby8WE9Rqb1jzEa7~)yh2)JEo%U)%T9Pm#Wr_8;mtohyI3y??+Hcjej>Y z>dEr$Du`4hr_g3VniS*gOp1*$i{N)d4;B`4F5Fsk8 z)Q{i42fFE5=7A9jUk;Bz#zh;}wc6%UD->Q_0rW^>c;mkgD5?G?(O5E|G^T)E6lwX0S;C6`;Fk9m|VpJ)E;SImRIQR%|gmY|5yF6TpY81)K{`ej!Qr@7~ZTi&ily0 zw*k4$4!#X$@aEv#fUelzX^s~M-~RsxUx8m>&g0>pKYd0Hf-Fz}i9&i1;0VEE(L7K8 zc@S(!m`3RM-+_R-&i}=a=P!SF_TtqK!793oKI+f^WYQa1`d@!EeYpR*pU+p|VhNK4 ziqpkkX8B(a4i5eTxo^S~DQ$I6g8nENbpHC6WBAvDufF;U{AN7($73apEHGWJXIu`U z`5MVR1+$EAtPJMpSbwu01c3qR5Ii3A27_*|-yMt&4_IFeJ9c6ZzLlZHAQCsmB1Sm| zNt$$5@SkZ89{=`Le|j?63mr_z8j)kx{_ya?H|D-?%>CA5?pb5*>ti0OF@KNWu@Q%9 zo}-Y06($tk@bX;TJpjfrzusDBiyTG>-~<37PZ^m?X?zWdzLWUGlbc;W1dc% zjd?n)8M8;2?X?zWdzLWUGlbc_$1KJxf8@sa$NZ;5IS0+i?_}yHzdfID+iNY{_AI{L zGlbjTsYQP0_#KGT1=qU7-6b31q~Q=Jbwl*9)n041+Oybd&tR*)c1DBAsNtALbz}B$ z)n03^+OwEQ&)}-PVaqW$Gn7n5enUym$3c2+Iml@+m|A0&9E7ot?%>qLI2D6rA_6=D zIZDzEn+Fb^;#rK2WaN$V+!Zr1Xh_%wUc$!EcFqKQ(0V2eUdkZpGto`~ne-bnu)ddp zF$8^MZppMygTdGu^F$wW%TwNKxX!&P*F*M!Jw9zVpX1ZI`E&~e>_O}K99i=@*5|XG zKrn771daVd5JS*6=9U7%X)qXCV;*T^ZfW%xPnzwa@uZGcxCH?Ap!Jvs)|iL-m`@xA z7?l?wnu+v_jChJvePX=(p;C@_STkO?G{7FT9&g_o@4z|Ueb=}uABm|b^se!wnWb+$ z@ml&A^1k_KDJh%=gPt`XeSJRKNebg(!!Zx*#_X09*n_rX?w?v?)+L30JInpJ-%KJL z_q`G!L(ntk{(crL*O*VtG51fMW0o6P2}UGcArRp?&ud0`YJRZJ<8KH*^{No0%Dw9y z&WUe0`^}j(9Eu3-4ufGZwT5(}56OEOQLdX@P`-Q(S^co#Jt2R1m zcIZYYb%)L;MC~d0x&~UjlmYmn1sX6w<^Yqn+>`3BiaYATMRy*)>*2HH$K z98GJ)!@e#m8NX|YjVp+)(hUMIj?24oP-J!F-cHvS7q11j4NU+eZUXpLWIifjUEKn|g0=WpL z@h-unnT|i2OmvOM0yb*6aYv_hz?#XGqtUPiSVIMVG?>-_Ylzvvz)Y@{LBIJfj8I0n zpBdYBi)EOL+p_dF@a}n^c-U_x9u|k&QW5&Pi0C*&ceu0eWLA6vDi19RZuYxFul46HsH|szKH;pjY-WjOV{L!~``!b_w{XjKo{(|c9PvaXMWR9_g*nc|?RMP8I+sfS`PXLoElMX9VuWJ88RkQ*-f7%*E?h zE*T5#!!@Dls=P-O8G#s^kRu_1T)u{cY3e0RQ_u2E+b-YKT)t`j@+ntzzHN1Xbm5Hk z6U@L8CQ&RGRI(I42a{%^-*Dm;{idD`Fm1a5CZ>1L)UyE!@}%qI)eC6TcTLC+K+j{7 z&i;u)O60UOJlTFni-|{`nzWUtCZ;?!G36^Zd z&E>~!x%}AV@?(R`YqzO|6i-r4K83|+g;q0^1Fc|to~E>@ck3I2n~{&(GV-y>$j1gF z-}lOGFl{EO45nU5W$a<(5Unh}M;NexkOGyQQ}rav~B{@7spj>+JWa#6$!ZonA87(+sk;QQQ!fWR^(l&4$J z=SIv!Go~;&@!D<29;QET%k)R~JoKFNpiVAMC{Kzb?I!5*mkY7{?A!LoOLJoMiJ;pI z5jhYU+!s&XI-GiF`7(`m%*S~YspXeu2VR&25&*%A6h_~{7$zag!8w~3Is9fK z;J|Mw9r_%bhOHf&hL&T~PC2GPO9YY-j!+?|Fk-JSTGQ)`eX`XKkb za2hmp%^dh$GlxDOr(tU!r=jKJG}L{Z^g${YwNjk{NtBAx@qK=}nXnNhB+Z10R0{ze zOqz*BgNavh9s0bYhOND#hL%^FvZaeUY+YU{q zE@OsT3em%$Kd@$JsLhVU=l@dVZ|Xh^W1JBLGMG~^I07(&8NZug1c>YI>`SQfFLumwbuIoT@wnj zJl)_30h!EG3_e`0(g@5U7T0NTP16kJD=f-1i1j&M4piLB z(`zkq_e_zyr-|J4n7BpWUOSOj+9mp?8Sjfocx zx8T}qE4W(uuX?56T91ZXoNS%^s%J0CWIr_Aa!~8sOjc^9UMUALG<@2GFF#Vt^hm`% z9htZc_rt|UN7|DS6OF-sXt+5|>(oM4W}#lmY3kANk+M$-!Rp()q_-QFDMQ({Tg8Jm z*i0?HCm?C4l+HaWkPY4-z`gcuV+BE!@Ze4nqn+L+Jakj@-9J5Tq@SIhdepP2kL^xd zv)!r1cBeMmb$B_sRJ7A(_s^%k>*uMDolje{^Qpzor#3t9d%`nragG*im`4C58?b>n z;dRZ08?4i1M0DlDzSZ&NZ}u$g^#feV1Cgw6MC{)$moKHiAQ6RXZV`ym?C~wvA~)qQWV>S$<~VcP$EO~7XWCZY znVRy>)RK1`izY5AHd$hO?)dO^2}aYlg3;6zjHZ@g!wZ8 z9+)I4<>5jvFri|H^Y9b#RUBhRjj}uq5g{^g8K;)axTkUOw3&OrsqhXkvohnPHdtER#EZ#n=8thI+%b4>&sSNVZn%dN{|kXA z5ev(Xh%9EvU53dvq3|7+tJlce@6_k)H}#0x)3%~Ed(jdc47s7|;KHdKPXaFt*vs`y zD`&wb`iCDcUV|0RbGfwRM!_?u;}iR~RFc+coy9n0TSrkMRjrYS;#m@%Z~A;Dim~CpHismnB}YrY>FQO!PGBgYfrXqd648cHhdYZJ8c3hFiw{X{s1zk!(mD zGr|M|f+G~NL5THe`t&TG_b)2cC<5VY;XB=mYlu1I6yH#F7x-9av z2>v?9G2)KS2u3_uyx`7!GMZ6>@z9wYBVQ-yyMb_guCXrkR2< zu2C?2vR*4uZ(^~Hy!H*Fm70TWIaTFWjxw!PUSC2x{1dIDjx{X>i%N6K#$JRE-<*&xq}^pI-6g~{v4J;B=yB@H zaxAfQkG!pmg?P1R41H+oGd*w4PB})32rXTgu<-ajZI*fD)R%ZfBIq4;`vpI>2klvK zGef{Slab^w=H>;%pG%fW;W=PnNY^lqw``N3NK8pH!HCEE{n2I09zLJxB?kw8ThCCQAd1Ktc>C8U{h&Vydfnbz-t?))ZVnDUfY)Vt=nsH<_k94r zpq!}>;KRX(uJ-w0{Kx*{5T6(Eb9@|pnhp+l*;Pyc1V5s91zyN$5#gj|-RkQfpI?EC zAJ1Q3gXdS^<*RG()3fuJ*WmgU`0g2a{_^Vj{KboBPr=jYub*99zxXfSi6 z-0OE=Whm*gY4T?Y)T$@{4 zdK3Sfu}T;HU!r)`m4=7AU;_2@e>xdWEA^kJ!w33*FCRw3gkv(JEL~BO|KLE|*O-7T z$19lQcq@uRGa}3-&@JEpFVC-}12a3`!NHH|E!v>`2;3qWZY$ctIF|IE0A7(E=8@=C z^b~;Si6Hw$X)p!>uebuIR|`|V)MAeUoN&q@%Q;J;$Vn#O*K7pb=s(+*e2Kllk)dhf zicDaF%CrjHw3;q(D7b=}nGfJ^h*9_JZN{j(nmzWHFuUutzDne~1`jy+pee3p-3x8MV~;x$sY047_fu1mlY5ku&#tAkm3fF zFhqoilHdV&PWM3Y`!p9uOq|Tqqk@N0@EhA|Q5s6l$rx4|l0Z|`IV(!nd6yGjgBEus z=3O~q$6sj(AG&8H5O%u=d;qgFWi#=14r7AYHhLyadg~;qj=$U&IFVKPB5xNP*Cyq0 z^;>|F4bIbqpVtk{G3%4a;(cXze8YOdzrch+j>Ug(fBOgPfHC3{psX8=A_3|a$1z(Z zq3P08TI`C=B28o3FqQbBh>NI9FQr!PO<@@2m4#weq)-tb_W%}{`VPmdOdLZ&5t;BS zHX8&#U<&e5f}Cx69s-$D3oP|B@`6qgnllI=z}rrTP2p>J%ONOe zdqVmS5;Pe(;E4xal(07=8*~7EU7`fcQo7U@4vK=WM|_@hi4a3X7BhR@v zQM(e?p;gqLy~BjZamfo)x$x{4dj_tR&H&K6jNg!9u4~MA7G1(NvO4exyv5O*oWQp= zlqtZ;B1eSmaTZ|$WMj?DY!fA4H!||u(G3%A^ptmFEMNc*@*CF2#B`^AFNXLu!_N3xjo~|gw@f~cH0+hB@3gIG77edG+OUw%b za5*;ZOq1)Jbr`J9Q71_`^HA?o z@vs2Hcl@PP7@iq$FPAR^|8Roh(%Iy-2J#GvUza#s z@=d1p7JE~vbTi2+O@+|JaYqdklwCbfzUFhg^;Cuq)F(p2;=P8Oug zfN##ymTH|rcG_f$j|#eOqSKr(aEG&IG=ZIsJ;{N@^p1$w=f{-^WDfFCDk&&o5GAsq zwX@y8f;B;TBCOsv6}!lpL{Bk{iF9X3Sg&%ttg9<2pFZYig_o@8!b9*XiB$nCm6Z)( z0#K5!7fTxv+c%>UwWR#O#MJi?;u;u~y1;#j1JDsaR>ZK!~ zRwT_e4`bfxe2x=Lw~kZr6wPtM6e`suOcTP(e^HRHx$)w+-*PnnM```ODb8SkQ%<3e z!!!v|M#(V=mnd4tI9YVjMwpR~nFhK@x>*`^lQcrdU#Y&jFp0V_p}4DlkwiMqaDtxm zt?1cZqDk%MDuD#qI*u>X7>AZR`+WW~rI$iGtIYYi=t7(b1_5Legatj3DcLg0mS!r@bjU9nJdl!8{tEL4+pZ zXg=um;dpjB?TyCM;b1fj;R%}cC(-OAjAqlY9vj{}!zg#iD6cjs&lwxz`W9=UR70h6 zm8XIOS<{q+Fcu>z7WOY{3;&gox+nq={FvtWU+mqOX+7Xvz9`|8nq}=K(JeRrjbZ_7 zw^?+J)V*WuZW`HG=dO@^AL{vYks z&8DYO)bCGwv)OQT0?}|3PSA98Iv$1LDLffh=~WdgwU3yr##ENttt1;gCWkvVROvV8 z*#Z|z3N7=@Yeo_-&@vtxux+Oqw^d6i%L>jq+mDr3GAYy>HEz$@S44Y-?XLM=PJbl8kM81K{#2`F8~$v()+ z!Ut7!Ux)`gMo#lIj#0j2Dr;Ihr7f_XhARqK{HZ9;Q_zuW7>wvElxPdt4JEKh(#`|VROtzzFvGu_< zHzHVPiyTG>6t6Me{b|uRIbsqqj+BbPf>4KM{dBo4p*!{Cxy(p%on#VUW6c*$jkiB48n=SY?)!YcJ2FAvSMc{cYyUwv2jmug&> z-!%Ifu6V5RSv@^3A6!DjFsvzN+N6*~h?r`*lAW{P#KX>6hi44!9Ci5S>zsA^osa)G z>JS9;aEVB41DwcJqTXQ^!MDw@8idBz(v`Be^9ddK2KNj8vsF|)`I_DVejhU zbr$>N1e9#J4~l%>-R2!dc>?3-2}SuFhN!Cb{Y;Q_vcWPg7E;O`M7Y_XiEQ%RV+ABo zj)ClK-@+W70q$Kh+h!u+_RR??Hi5z;hvzP(lPieq0WJxT5)fg&;C3y3kQn`td?Ems zg#(fzX#zz?uULPJIGw>bn6KlQ5rsk>sbP~Sp*Tm}%b)dwlTvJu&@hq2w|ZFgX8Uvq z6OgJVY6PM>YjKY$QRk4^QRZ2@J?p1Gmom1jNrn=dWAW=TqTw-XNkA8@V3skoo?o)o zIU@2^_MFq$Pd~dbin_A#AwKa(TyhdNn4%RFGr%?}f@BLa9Ns9UdCr4h)kP{( zqK^PxWob@fLOmx_xi;+7@Y$=fG1{r*mkrzM_$!E$ZxozBM>SxNq|Wy}eutu;a1_Oe z(LLf&0SktiDhU=Q1?2)O_O5)@-9;mPyqHZJ*1U>nK{h(!65^ygg9L{iPD8kGn9c=u z@&$SIOLK_k_(p%is5_?-84Qu4H*ihU6{I-ij!YL^m?T`9Ec9(*!{<&L8Z;iPmt`o4 z1Z3fs&pR!9A%(j~@uqmFae}o9ZZ}0`gqIYnW#VCl=5XSt7G4i9xu5GfB`$E{~YVnWPjjHlacs{`v&;gZ`-7+ovPty5yt9il>U5 zue_Id>mm$a(g{q&J!peodEn&Uz4F$3_bR`XDV}S@5WTH%nNr@$MJEN3l7T5iS2=h@ z%4rpcm75kQ8BCpxe`88e8S*Yc%rH_5R=%Dy5p2h_S2_~z@LLBn_=yQ7{B0rOiFS%= zi%-@3f4T=C% zKKok-`ZTU?iINXrzql&6Z!rbmrF1F1C|{~_=|Z$*1V-i>QPD|?_!wQ++AZ`pyEuPC zLxagNG2PqA-fFzVyWVK+cdNf%A{zpiPNb(JMfnORVuPl6g!0{v__E$w?XaYeec43$ z9OUcdh-ar4f%HX-BOZ{KESOk>*>Y3W58ra4=NQjXxD9OwoR4oSVqMu%EiT)K)@6{Y z=jag>)nlzTMfEaJHVW3cON$Oo!yG?LFcD&|FfDLFjvY#H%bja}e*NN#HC+>=IqtCm zJpE2gf^sgby~!*+7yb8`1|aV(=6QSzx1@4mXSq1qx`qk6!PTXDaaV`cPAXTHeEU*$ zWjXGRqv2@SL(w$sN2B2!Mg5a#7WMnn>1;Yd;cPMwhto;FKb(c5el#3Ka4_tJquv0H zPR8S12q_Ins;9+N?$ANZ<}ON90U98s-q1jzTg0{DJ?SNhv=7-r!R zjwiE0*gqY^(QFi=aX6XIXT5OHJDm?tdc(D_TY?gK4@P%dJK zS1z&i`J7v^Zeb#$+j;Jx1gIAQuj+hMO0CjjSUkV{<-*kSG+O0AXrAUFs;DKxOOHQO zP8>Y9B8Seq{gnv~iHLjP5|T1t=1PwCbja_HDjuzJ^uKb!%J3JJF49sBF-3*IxH@@z z{1=AWn{@t$F3}tD;$Pn$6*fAWf^WLt$h$70L!Ygwxt?0!h%*aN&9m#locXqC|}vOpbnEBSMQ2X=j4& z8k=kf_*%VuA!P9>-*sThrfMC;Y+zMc}d4^&vk=0%)?1W2PQft3@$Z z%7F3kIi90HU0gaw;Gh2W%y%GvmO5&fCjV5aKDhe+)}Ul>1Gxv8%m4vd&$`?gf)k<+ zKw&S5$|GImOk-*hPgv%`uzKU4Z9;X`U!}mjdF8JEtSl9KB>(*J@(5&`@Ccw)Mz>FK zekAqUqtZX=s7(CE_=vb!apSpynKJnK_|r4_IGyuwTjlb$Dnit1q5gTOr#>h#QB@|i z+KRT_70jwKzQ+8@d6aW5!YmZo+l|5JCa!$bbmb!NvoXXj^Xv)@+Mi-W=;OJ^l?Vg? z2G#3KFSeIhjbCJctUaIDMt7uwbRWx9)AGVoM~&ZyMrgCw1}R9ASXqfl8$`ZR)x!N4 z`GSxlv}qB0RNF)KuHg?1J91*`K5(6m=e$Waxbw8}4GrTpU*ETCh;RLPI1Y-kJ6q?3 zqtNJ-6rB)6FSQ~Djx%|#?EPF=(JLN^i~4Yx-X`E}>y*K|=S?2zJ&OnJ@ zu~8)spXER}y8E)vg@*8#a6B}0KKm)r`Z5nou|e+q$Os9wk)SD4Uby866J8)Sho4fe z)k;V1>2%878%m~F_%v{st5ox4lD+NdN0^8-bL9KZ4cd0jIx23kbJWR1tnO;t<#|ny zSKDs!^y5D)HZ8jqaO)*N3za{C5M_;l4Bk?5oUr5Doxa^V) zz}qYQFC=jMj^iSPV)7Qu5#*`37iuXH_ao$Oq}kVjVC8Z>e~e``ywvfJ7=9&yx7Q3n5-ZTmz|>y zuR)@}$A9>lpj>{}%MkE(Wwe#)0i=)v3Olv-m&E{b3S(a?A1+XS)Q_QZt&{InZ)!@Q zb(gy`e%B0i5);eeY7y!j9-)gIk>6`!R+`Fd6IYtTXcp!u5)M7~d-vzWRCZeH%~3Y1 zbLg;uwe#uFx^nw-*u6Ax=_p^_-L0#uYBq-cDCh^hA|1mB4d84rA4a1->WyXtG>ZBs z{XuVhG8;^0z4>fD>YdIe;}D$=$Ajo3oc2fa`EWQ7CzI2Y$!@F)SB@N~{K(fi8q1dH z40$E7OZL=S%5HZbV>gB5hI3tU)_KrR!LYU8W4u8LBBaYSJb>d&*vD4 zx|D3KNolRCCXq3wD^Tt(gu9oa2)q?*bH)Q!-^#iV0{SwIBcfob06j^dEvT+>*jLD% z>x)Y^e??(lF@3xlPfVJmR2t-p`?$*56dTw#L$6T;@jjcgfONOJvjAJ!o@Ix7?ay+g z{zN9m`d(s5z7{s0LN1oiYUa%}uw$_N1I-r(9rJ3QiB2pSXG!ZD}i@Q3k zc2X532Z5Fwu0QRg-boZjQ9qi5z0=uzemXi0htm*^=A-F&GCM`6*B=h%C(+4hGVGt8 zOy&>{2E*}W03D9O7D7sn%xBQMZ<{8=4xWG(AUJ2Ik05hxzZ z``s!c0l-NZuT}gdoTVG2D(fq948yRv)#T-iYD6(i>LZ5u`}e47=ZK{1JglS=;#sjs z=j?qa%+{T=&ZyVxtvW{?VRq}BbxwZ3osUNy>2s^K?3?Yzy`OOBqhTvieJY1t0**x% zF5-#D5~#{#peXlgmephl1p_GF1w~E^bwym6<{}{pO+l7s>sZhm*}jMzl}wWJK+$6W zzLWV#gzc2_FgGm)72`}O3G;16h4D~w)+2G%&Tk=kye0RQ*kFQXAU{mDvozX@&ebYv zE(tP)>>S6Eht}ksefz${b1Gcsc!OiKK+i}BW4;5WVe6=)=YwJ^TTLu=)XCKQQSq9( zdVQUy^!vijtTI>Y6@962t5@Hy;mxSA|1>QD{s;6(-JwTux=euUzP<^o~)9~ zVw^T8oP7^hIL3~UY9`*{49wMYz9GwtZsGdn?axmy-v&S^vFrz_ z&Svm70T5hYToxOFJzXGLo>ZRoi=CgJU%%i_`MK6^Na_YfVZK0g*Ul|#5ozr$yMf3y zWYA+i0ldgL6$OG+ia7p+Ysha)fNyz}jLNky^<#a1De@$Jx=LQBDb3c6?c0n4=8M3C z`K9Qk4ZPTOT^Y(JID%PDe@?#&C!LYM8tK)Dba*26stfL z3nNI>be0Iql$S?9RPJZrCDB5Wv`S$ya}w65{g(q?O_*Y_?SrwaSEeuq4^$XY1G~HkH0F?f*k&%GN2XHt{2GX zp=-*7+%5~LRKocx%gQ_DFQz{84bgi8vbQ2H%59D*MM-cEWAFBBM(@oj_&kXi??Ygj z-tIrV@^C6WJ8~sRe#>-8DM)+|<9G(co9pyNx*)HTXL+9HZ|`?v(pZWfRkf>-g?Ysj zz2&EtJ>d{}iIWnlyriaSmd5E~dzCQ-{GzD1QbkXdXYsw!rbdgJJ3eJ%-W2#Q;qbd< z5g2u^PN~yByD=HMzWy(h2+0iNpFRB$g5eUN2=heUYmr7=g@W>W&m0@!md4|guZxsP zjs&Wn0B0-V_?ey&{H>NV8z&Lo;AjnFrqWEpA1e=dqJN)8SV4nBaFDfkH!gFG_oyG|mN zXq{1*v+l0X2i{}JwN#IcA@bXG{gD%!KYHCBJ`bOV&%@_aKmRuX0RR84L$t;K`Ue1X CcU4aS literal 0 HcmV?d00001 diff --git a/incubator/n8n/0.0.1/helm-values.md b/incubator/n8n/0.0.1/helm-values.md new file mode 100644 index 00000000000..72811af449e --- /dev/null +++ b/incubator/n8n/0.0.1/helm-values.md @@ -0,0 +1,56 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| credentials | object | `{}` | | +| deployment.N8N_HOST | string | `"localhost"` | | +| endpoints | object | `{}` | | +| env.DB_POSTGRESDB_DATABASE | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | +| env.DB_POSTGRESDB_PORT | int | `5432` | | +| env.DB_POSTGRESDB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| env.DB_TYPE | string | `"postgresdb"` | | +| env.GENERIC_TIMEZONE | string | `"{{ .Values.env.TZ }}"` | | +| env.N8N_USER_FOLDER | string | `"/data"` | | +| env.QUEUE_BULL_REDIS_PORT | int | `6379` | | +| env.TZ | string | `"UTC"` | | +| envFrom[0].configMapRef.name | string | `"n8n-config"` | | +| envValueFrom.DB_POSTGRESDB_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.DB_POSTGRESDB_HOST.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.DB_POSTGRESDB_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | +| envValueFrom.DB_POSTGRESDB_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.QUEUE_BULL_REDIS_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.QUEUE_BULL_REDIS_HOST.secretKeyRef.name | string | `"rediscreds"` | | +| envValueFrom.QUEUE_BULL_REDIS_PASSWORD.secretKeyRef.key | string | `"redis-password"` | | +| envValueFrom.QUEUE_BULL_REDIS_PASSWORD.secretKeyRef.name | string | `"rediscreds"` | | +| executions | object | `{}` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/n8n"` | | +| image.tag | string | `"v0.160.0@sha256:2141ab9bb8e8a820fa07a20ae9bdd1a7c5f2102926238ab7f3aa4a3c9e175ebe"` | | +| logs.N8N_LOG_FILE_LOCATION | string | `"/data/logs"` | | +| persistence.data.enabled | bool | `true` | | +| persistence.data.mountPath | string | `"/data"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql.enabled | bool | `true` | | +| postgresql.existingSecret | string | `"dbcreds"` | | +| postgresql.postgresqlDatabase | string | `"n8n"` | | +| postgresql.postgresqlUsername | string | `"n8n"` | | +| redis.enabled | bool | `true` | | +| redis.existingSecret | string | `"rediscreds"` | | +| security | object | `{}` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `5678` | | +| service.main.ports.main.targetPort | int | `5678` | | +| workflows | object | `{}` | | + +All Rights Reserved - The TrueCharts Project diff --git a/incubator/n8n/0.0.1/ix_values.yaml b/incubator/n8n/0.0.1/ix_values.yaml new file mode 100644 index 00000000000..12997d2886e --- /dev/null +++ b/incubator/n8n/0.0.1/ix_values.yaml @@ -0,0 +1,126 @@ +image: + repository: tccr.io/truecharts/n8n + tag: v0.160.0@sha256:2141ab9bb8e8a820fa07a20ae9bdd1a7c5f2102926238ab7f3aa4a3c9e175ebe + pullPolicy: IfNotPresent + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +env: + TZ: UTC + GENERIC_TIMEZONE: "{{ .Values.env.TZ }}" + DB_TYPE: "postgresdb" + DB_POSTGRESDB_USER: "{{ .Values.postgresql.postgresqlUsername }}" + DB_POSTGRESDB_DATABASE: "{{ .Values.postgresql.postgresqlDatabase }}" + DB_POSTGRESDB_PORT: 5432 + QUEUE_BULL_REDIS_PORT: 6379 + N8N_USER_FOLDER: "/data" + +credentials: {} + # CREDENTIALS_OVERWRITE_DATA: "" + # CREDENTIALS_OVERWRITE_ENDPOINT: "" + # CREDENTIALS_DEFAULT_NAME: "My credentials" +deployment: + N8N_HOST: "localhost" + # N8N_CONFIG_FILES: "" + # N8N_ENCRYPTION_KEY: "" + # N8N_DIAGNOSTICS_ENABLED: true + # N8N_DISABLE_UI: false + # N8N_PERSONALIZATION_ENABLED: true + # N8N_VERSION_NOTIFICATIONS_ENABLED: true +endpoints: {} + # WEBHOOK_URL: "" + # N8N_PAYLOAD_SIZE_MAX: 16 + # N8N_METRICS: false + # N8N_METRICS_PREFIX: "n8n_" + # N8N_ENDPOINT_REST: "rest" + # N8N_ENDPOINT_WEBHOOK: "webhook" + # N8N_ENDPOINT_WEBHOOK_TEST: "webhook-test" + # N8N_ENDPOINT_WEBHOOK_WAIT: "webhook-waiting" + # N8N_DISABLE_PRODUCTION_MAIN_PROCESS: false + # N8N_SKIP_WEBHOOK_DEREGISTRATION_SHUTDOWN: false +executions: {} + # EXECUTIONS_PROCESS: "own" + # EXECUTIONS_MODE: "regular" + # EXECUTIONS_TIMEOUT: "-1" + # EXECUTIONS_TIMEOUT_MAX: 3600 + # EXECUTIONS_DATA_SAVE_ON_ERROR: "all" + # EXECUTIONS_DATA_SAVE_ON_SUCCESS: "all" + # EXECUTIONS_DATA_SAVE_ON_PROGRESS: false + # EXECUTIONS_DATA_SAVE_MANUAL_EXECUTIONS: false + # EXECUTIONS_DATA_PRUNE: false + # EXECUTIONS_DATA_MAX_AGE: 336 + # EXECUTIONS_DATA_PRUNE_TIMEOUT: 3600 +logs: + # N8N_LOG_LEVEL: "info" + # N8N_LOG_OUTPUT: "console" + # N8N_LOG_FILE_COUNT_MAX: 100 + # N8N_LOG_FILE_SIZE_MAX: 16 + N8N_LOG_FILE_LOCATION: "/data/logs" +security: {} + # N8N_AUTH_EXCLUDE_ENDPOINTS: "" + # N8N_BASIC_AUTH_ACTIVE: false + # N8N_BASIC_AUTH_USER: "" + # N8N_BASIC_AUTH_PASSWORD: "" + # N8N_BASIC_AUTH_HASH: false + # N8N_JWT_AUTH_ACTIVE: false + # N8N_JWT_AUTH_HEADER: "" + # N8N_JWT_AUTH_HEADER_VALUE_PREFIX: "" + # N8N_JWKS_URI: "" + # N8N_JWT_ISSUER: "" + # N8N_JWT_NAMESPACE: "" + # N8N_JWT_ALLOWED_TENANT: "" + # N8N_JWT_ALLOWED_TENANT_KEY: "" +workflows: {} + # WORKFLOWS_DEFAULT_NAME: "My workflow" + +envFrom: + - configMapRef: + name: n8n-config + +envValueFrom: + DB_POSTGRESDB_HOST: + secretKeyRef: + name: dbcreds + key: plainhost + DB_POSTGRESDB_PASSWORD: + secretKeyRef: + name: dbcreds + key: postgresql-password + QUEUE_BULL_REDIS_HOST: + secretKeyRef: + name: rediscreds + key: plainhost + QUEUE_BULL_REDIS_PASSWORD: + secretKeyRef: + name: rediscreds + key: redis-password + +service: + main: + ports: + main: + port: 5678 + targetPort: 5678 + +persistence: + data: + enabled: true + mountPath: "/data" + +# Enabled redis +redis: + enabled: true + existingSecret: "rediscreds" + +# Enabled postgres +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: n8n + postgresqlDatabase: n8n diff --git a/incubator/n8n/0.0.1/questions.yaml b/incubator/n8n/0.0.1/questions.yaml new file mode 100644 index 00000000000..9113801c64b --- /dev/null +++ b/incubator/n8n/0.0.1/questions.yaml @@ -0,0 +1,2774 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: deployment + group: "Container Configuration" + label: "Deployment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: N8N_HOST + label: "Host" + description: "Host name where n8n can be reached." + schema: + type: string + required: true + default: "" + - variable: N8N_CONFIG_FILES + label: "Config Files (Leave empty for default)" + description: "Use to provide the path to any JSON configuration file(s)" + schema: + type: string + default: "" + - variable: N8N_DISABLE_UI + label: "Disable UI" + description: "Whether the UI should be disabled" + schema: + type: boolean + default: false + - variable: N8N_ENCRYPTION_KEY + label: "Encryption Key (Leave empty for default)" + description: "Provide a custom key used to encrypt credentials in the n8n database. By default a random key is generated on first launch" + schema: + type: string + default: "" + - variable: N8N_PERSONALIZATION_ENABLED + label: "Enable Personalization" + description: "Whether to ask users personalisation questions and then customise n8n accordingly" + schema: + type: boolean + default: true + - variable: N8N_VERSION_NOTIFICATIONS_ENABLED + label: "Enable Version Notifications" + description: "When enabled, notifications of new versions and security updates are provided" + schema: + type: boolean + default: true + - variable: N8N_DIAGNOSTICS_ENABLED + label: "Enable Diagnostics" + description: "Whether to share selected, anonymous telemetry with n8n" + schema: + type: boolean + default: false + - variable: workflows + group: "Container Configuration" + label: "Workflows" + schema: + additional_attrs: true + type: dict + attrs: + - variable: WORKFLOWS_DEFAULT_NAME + label: "Workflows Default Name (Leave empty for default)" + description: "The default name used for new workflows" + schema: + type: string + default: "" + - variable: executions + group: "Container Configuration" + label: "Executions" + schema: + additional_attrs: true + type: dict + attrs: + - variable: EXECUTIONS_PROCESS + label: "Execution Process" + description: "Whether processes are executed in their own process or the main process" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "main" + description: "Main" + - value: "own" + description: "Own" + - variable: EXECUTIONS_MODE + label: "Execution Mode" + description: "Whether processes should run directly or via queue" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "regular" + description: "Regular" + - value: "queue" + description: "Queue" + - variable: EXECUTIONS_TIMEOUT + label: "Execution Timeout (Leave empty for default)" + description: "The max run time (in seconds) before stopping a workflow execution" + schema: + type: int + - variable: EXECUTIONS_TIMEOUT_MAX + label: "Max Execution Timeout (Leave empty for default)" + description: "The max execution time (in seconds) that can be set for a workflow individually" + schema: + type: int + - variable: EXECUTIONS_DATA_SAVE_ON_ERROR + label: "Execution Data Save on Error" + description: "Whether execution data is saved on error" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "all" + description: "All" + - value: "none" + description: "None" + - variable: EXECUTIONS_DATA_SAVE_ON_SUCCESS + label: "Execution Data Save on Success" + description: "Whether execution data is saved on success" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "all" + description: "All" + - value: "none" + description: "None" + - variable: EXECUTIONS_DATA_SAVE_ON_PROGRESS + label: "Execution Data Save on Progress" + description: "Whether to save progress for each node executed" + schema: + type: boolean + default: false + - variable: EXECUTIONS_DATA_SAVE_MANUAL_EXECUTIONS + label: "Execution Data Save on Manual Executions" + description: "Whether to save data of executions when started manually" + schema: + type: boolean + default: false + - variable: EXECUTIONS_DATA_PRUNE + label: "Execution Data Prune" + description: "Whether to delete data of past executions on a rolling basis" + schema: + type: boolean + default: false + - variable: EXECUTIONS_DATA_MAX_AGE + label: "Execution Data Max Age (Leave empty for default)" + description: "The execution age (in hours) before it is deleted" + schema: + type: int + - variable: EXECUTIONS_DATA_PRUNE_TIMEOUT + label: "Data Prune Timeout (Leave empty for default)" + description: "The timeout (in seconds) after execution data has been pruned" + schema: + type: int + - variable: security + group: "Container Configuration" + label: "Security" + schema: + additional_attrs: true + type: dict + attrs: + - variable: N8N_AUTH_EXCLUDE_ENDPOINTS + label: "Additional Endpoints to Exclude Auth Checks (Leave empty for default)" + description: 'Additional endpoints to exclude auth checks. Multiple endpoints can be provided separated by a colon (":"). The endpoints should not start with a forward slash ("/")' + schema: + type: string + default: "" + - variable: N8N_BASIC_AUTH_ACTIVE + label: "Enable Basic Auth" + description: "Whether basic auth should be activated for editor and REST-API access" + schema: + type: boolean + default: false + - variable: N8N_BASIC_AUTH_USER + label: "Basic Auth User (Leave empty for default)" + description: "The name of the n8n user for basic authentication" + schema: + type: string + default: "" + - variable: N8N_BASIC_AUTH_PASSWORD + label: "Basic Auth Password (Leave empty for default)" + description: "The password of the n8n user for basic authentication" + schema: + type: string + default: "" + - variable: N8N_BASIC_AUTH_HASH + label: "Enable Basic Auth Hash" + description: "Whether the basic authentication password is hashed" + schema: + type: boolean + default: false + - variable: N8N_JWT_AUTH_ACTIVE + label: "Enable JWT Auth" + description: "Whether JWT authentication should be activated for editor and REST-API access" + schema: + type: boolean + default: false + - variable: N8N_JWT_AUTH_HEADER + label: "JWT Auth Header (Leave empty for default)" + description: "The request header containing a signed JWT" + schema: + type: string + default: "" + - variable: N8N_JWT_AUTH_HEADER_VALUE_PREFIX + label: "JWT Auth Header Prefix to strip (Leave empty for default)" + description: "Optional. The request header value prefix to strip" + schema: + type: string + default: "" + - variable: N8N_JWKS_URI + label: "JWT Set URI (Leave empty for default)" + description: "The URI to fetch JWK Set for JWT authentication" + schema: + type: string + default: "" + - variable: N8N_JWT_ISSUER + label: "JWT Issuer (Leave empty for default)" + description: "Optional. The expected JWT issuer" + schema: + type: string + default: "" + - variable: N8N_JWT_NAMESPACE + label: "JWT Namespace (Leave empty for default)" + description: "Optional. The expected JWT namespace" + schema: + type: string + default: "" + - variable: N8N_JWT_ALLOWED_TENANT + label: "JWT Allowed Tenant (Leave empty for default)" + description: "Optional. The allowed JWT tenant" + schema: + type: string + default: "" + - variable: N8N_JWT_ALLOWED_TENANT_KEY + label: "JWT Allowed Tenant Key (Leave empty for default)" + description: "Optional. The JWT tenant key name to inspect within the JWT namespace" + schema: + type: string + default: "" + - variable: endpoints + group: "Container Configuration" + label: "Endpoints" + schema: + additional_attrs: true + type: dict + attrs: + - variable: WEBHOOK_URL + label: "Webhook URL" + description: "Used to manually provide the Webhook URL when running n8n behind a reverse proxy" + schema: + type: string + default: "" + - variable: N8N_PAYLOAD_SIZE_MAX + label: "Max Payload Size (Leave empty for default)" + description: "The maximum payload size in MB" + schema: + type: int + - variable: N8N_METRICS + label: "Enable Metrics endpoint" + description: "Whether to enable the metrics endpoint" + schema: + type: boolean + default: false + - variable: N8N_METRICS_PREFIX + label: "Metrics Prefix (Leave empty for default)" + description: "Optional prefix to be used for metrics names" + schema: + type: string + default: "" + - variable: N8N_ENDPOINT_REST + label: "Rest Endpoint Path (Leave empty for default)" + description: "The path used for REST endpoint" + schema: + type: string + default: "" + - variable: N8N_ENDPOINT_WEBHOOK + label: "Webhook Endpoint Path (Leave empty for default)" + description: "The path used for webhook endpoint" + schema: + type: string + default: "" + - variable: N8N_ENDPOINT_WEBHOOK_TEST + label: "Test-Webhook Endpoint Path (Leave empty for default)" + description: "The path used for test-webhook endpoin" + schema: + type: string + default: "" + - variable: N8N_ENDPOINT_WEBHOOK_WAIT + label: "Waiting-Webhook Endpoint Path (Leave empty for default)" + description: "The path used for waiting-webhook endpoint" + schema: + type: string + default: "" + - variable: N8N_DISABLE_PRODUCTION_MAIN_PROCESS + label: "Disable Production Webhooks" + description: "Disable production webhooks from main process. This helps ensures no HTTP traffic load to main process when using webhook-specific processes" + schema: + type: boolean + default: false + - variable: N8N_SKIP_WEBHOOK_DEREGISTRATION_SHUTDOWN + label: "Deregister External Webhooks" + description: "Deregister webhooks on external services only when workflows are deactivated" + schema: + type: boolean + default: false + - variable: credentials + group: "Container Configuration" + label: "Credentials" + schema: + additional_attrs: true + type: dict + attrs: + - variable: CREDENTIALS_OVERWRITE_DATA + label: "Credentianls Overwrites" + description: "Overwrites for credentials" + schema: + type: string + default: "default" + - variable: CREDENTIALS_OVERWRITE_ENDPOINT + label: "Credentials Overwrite Endpoint" + description: "The API endpoint to fetch credentials" + schema: + type: string + default: "" + - variable: CREDENTIALS_DEFAULT_NAME + label: "Credentials Default Name (Leave empty for default)" + description: "The default name for credentials" + schema: + type: string + default: "" + - variable: logs + group: "Container Configuration" + label: "Logs" + schema: + additional_attrs: true + type: dict + attrs: + - variable: N8N_LOG_LEVEL + label: "Log Level" + description: "Log output level" + schema: + type: string + default: "default" + enum: + - value: "" + description: "Default" + - value: "info" + description: "Info" + - value: "warn" + description: "Warn" + - value: "error" + description: "Error" + - value: "verbose" + description: "Verbose" + - value: "debug" + description: "Debug" + - variable: N8N_LOG_OUTPUT + label: "Log Output" + description: "Where to output logs" + schema: + type: string + default: "default" + enum: + - value: "" + description: "Default" + - value: "console" + description: "Console" + - value: "file" + description: "File" + - value: "console,file" + description: "Console and File" + - variable: N8N_LOG_FILE_COUNT_MAX + label: "Max Log File Count (Leave empty for default)" + description: "Max number of log files to keep" + schema: + type: int + - variable: N8N_LOG_FILE_SIZE_MAX + label: "Max Log File Size (Leave empty for default)" + description: "Max size of each log file in MB" + schema: + type: int + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 5678 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 5678 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: data + label: "App Data Storage" + description: "Stores the Application Data." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/incubator/n8n/0.0.1/security.md b/incubator/n8n/0.0.1/security.md new file mode 100644 index 00000000000..efc4b78ee0c --- /dev/null +++ b/incubator/n8n/0.0.1/security.md @@ -0,0 +1,889 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: n8n/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-n8n' of Deployment 'RELEASE-NAME-n8n' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-n8n' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-n8n' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-n8n' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-n8n' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-n8n' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-n8n' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:d4e2ab2f3d41e04b2e4d1812058b26b0fbf409b65ce9352d8c714ff33fc66986 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/redis:v6.2.6@sha256:52275ab8ef5bc70fd994e48bb6e66368dc312f176127390194c077aed424d2b7 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:d4e2ab2f3d41e04b2e4d1812058b26b0fbf409b65ce9352d8c714ff33fc66986 + tccr.io/truecharts/n8n:v0.160.0@sha256:2141ab9bb8e8a820fa07a20ae9bdd1a7c5f2102926238ab7f3aa4a3c9e175ebe + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:d4e2ab2f3d41e04b2e4d1812058b26b0fbf409b65ce9352d8c714ff33fc66986 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:52275ab8ef5bc70fd994e48bb6e66368dc312f176127390194c077aed424d2b7 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:d4e2ab2f3d41e04b2e4d1812058b26b0fbf409b65ce9352d8c714ff33fc66986 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/n8n:v0.160.0@sha256:2141ab9bb8e8a820fa07a20ae9bdd1a7c5f2102926238ab7f3aa4a3c9e175ebe (alpine 3.11.7) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apk-tools | CVE-2021-36159 | CRITICAL | 2.10.5-r0 | 2.10.7-r0 |
Expand...https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch
https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
| +| apk-tools | CVE-2021-30139 | HIGH | 2.10.5-r0 | 2.10.6-r0 |
Expand...https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741
https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606
| +| busybox | CVE-2021-28831 | HIGH | 1.31.1-r9 | 1.31.1-r10 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28831
https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd
https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/
https://security.gentoo.org/glsa/202105-09
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42378 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| libcrypto1.1 | CVE-2021-3711 | CRITICAL | 1.1.1i-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libcrypto1.1 | CVE-2021-23840 | HIGH | 1.1.1i-r0 | 1.1.1j-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| libcrypto1.1 | CVE-2021-3450 | HIGH | 1.1.1i-r0 | 1.1.1k-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1
http://www.openwall.com/lists/oss-security/2021/03/27/2
http://www.openwall.com/lists/oss-security/2021/03/28/3
http://www.openwall.com/lists/oss-security/2021/03/28/4
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
https://kc.mcafee.com/corporate/index?page=content&id=SB10356
https://linux.oracle.com/cve/CVE-2021-3450.html
https://linux.oracle.com/errata/ELSA-2021-9151.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210326-0006/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
https://www.openssl.org/news/secadv/20210325.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-05
https://www.tenable.com/security/tns-2021-08
https://www.tenable.com/security/tns-2021-09
| +| libcrypto1.1 | CVE-2021-3712 | HIGH | 1.1.1i-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libcrypto1.1 | CVE-2021-23841 | MEDIUM | 1.1.1i-r0 | 1.1.1j-r0 |
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
| +| libcrypto1.1 | CVE-2021-3449 | MEDIUM | 1.1.1i-r0 | 1.1.1k-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1
http://www.openwall.com/lists/oss-security/2021/03/27/2
http://www.openwall.com/lists/oss-security/2021/03/28/3
http://www.openwall.com/lists/oss-security/2021/03/28/4
https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
https://kc.mcafee.com/corporate/index?page=content&id=SB10356
https://linux.oracle.com/cve/CVE-2021-3449.html
https://linux.oracle.com/errata/ELSA-2021-9151.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210326-0006/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
https://ubuntu.com/security/notices/USN-4891-1
https://ubuntu.com/security/notices/USN-5038-1
https://www.debian.org/security/2021/dsa-4875
https://www.openssl.org/news/secadv/20210325.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-05
https://www.tenable.com/security/tns-2021-06
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| libcrypto1.1 | CVE-2021-23839 | LOW | 1.1.1i-r0 | 1.1.1j-r0 |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://security.netapp.com/advisory/ntap-20210219-0009/
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1i-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libssl1.1 | CVE-2021-23840 | HIGH | 1.1.1i-r0 | 1.1.1j-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-23840.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| libssl1.1 | CVE-2021-3450 | HIGH | 1.1.1i-r0 | 1.1.1k-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1
http://www.openwall.com/lists/oss-security/2021/03/27/2
http://www.openwall.com/lists/oss-security/2021/03/28/3
http://www.openwall.com/lists/oss-security/2021/03/28/4
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
https://kc.mcafee.com/corporate/index?page=content&id=SB10356
https://linux.oracle.com/cve/CVE-2021-3450.html
https://linux.oracle.com/errata/ELSA-2021-9151.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210326-0006/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
https://www.openssl.org/news/secadv/20210325.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-05
https://www.tenable.com/security/tns-2021-08
https://www.tenable.com/security/tns-2021-09
| +| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1i-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| +| libssl1.1 | CVE-2021-23841 | MEDIUM | 1.1.1i-r0 | 1.1.1j-r0 |
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
| +| libssl1.1 | CVE-2021-3449 | MEDIUM | 1.1.1i-r0 | 1.1.1k-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1
http://www.openwall.com/lists/oss-security/2021/03/27/2
http://www.openwall.com/lists/oss-security/2021/03/28/3
http://www.openwall.com/lists/oss-security/2021/03/28/4
https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
https://kc.mcafee.com/corporate/index?page=content&id=SB10356
https://linux.oracle.com/cve/CVE-2021-3449.html
https://linux.oracle.com/errata/ELSA-2021-9151.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210326-0006/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
https://ubuntu.com/security/notices/USN-4891-1
https://ubuntu.com/security/notices/USN-5038-1
https://www.debian.org/security/2021/dsa-4875
https://www.openssl.org/news/secadv/20210325.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-05
https://www.tenable.com/security/tns-2021-06
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| +| libssl1.1 | CVE-2021-23839 | LOW | 1.1.1i-r0 | 1.1.1j-r0 |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://security.netapp.com/advisory/ntap-20210219-0009/
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| ssl_client | CVE-2021-28831 | HIGH | 1.31.1-r9 | 1.31.1-r10 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28831
https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd
https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/
https://security.gentoo.org/glsa/202105-09
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42378 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.31.1-r9 | 1.31.1-r11 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| + +**node-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 5.0.1, 6.0.1 |
Expand...https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2021-5171.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
| +| ansi-regex | CVE-2021-3807 | HIGH | 4.1.0 | 5.0.1, 6.0.1 |
Expand...https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2021-5171.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
| +| glob-parent | CVE-2020-28469 | HIGH | 3.1.0 | 5.1.2 |
Expand...https://github.com/advisories/GHSA-ww39-953v-wcq6
https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9
https://github.com/gulpjs/glob-parent/pull/36
https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2
https://linux.oracle.com/cve/CVE-2020-28469.html
https://linux.oracle.com/errata/ELSA-2021-5171.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28469
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092
https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905
| +| hosted-git-info | CVE-2021-23362 | MEDIUM | 2.8.8 | 2.8.9, 3.0.8 |
Expand...https://github.com/advisories/GHSA-43f8-2h32-f4cj
https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7
https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01
https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3
https://github.com/npm/hosted-git-info/commits/v2
https://github.com/npm/hosted-git-info/pull/76
https://linux.oracle.com/cve/CVE-2021-23362.html
https://linux.oracle.com/errata/ELSA-2021-3074.html
https://nvd.nist.gov/vuln/detail/CVE-2021-23362
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356
https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355
| +| json-schema | CVE-2021-3918 | CRITICAL | 0.2.3 | 0.4.0 |
Expand...https://github.com/advisories/GHSA-896r-f27r-55mw
https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741
https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a
https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa
https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9
https://linux.oracle.com/cve/CVE-2021-3918.html
https://linux.oracle.com/errata/ELSA-2021-5171.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3918
| +| path-parse | CVE-2021-23343 | HIGH | 1.0.6 | 1.0.7 |
Expand...https://github.com/advisories/GHSA-hj48-42vr-x3v9
https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7
https://github.com/jbgutierrez/path-parse/issues/8
https://github.com/jbgutierrez/path-parse/pull/10
https://linux.oracle.com/cve/CVE-2021-23343.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-23343
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028
https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067
| +| ssri | CVE-2021-27290 | HIGH | 6.0.1 | 8.0.1, 7.1.1, 6.0.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290
https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf
https://github.com/advisories/GHSA-vx3p-948g-6vhq
https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2
https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1
https://github.com/npm/ssri/pull/20#issuecomment-842677644
https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf
https://linux.oracle.com/cve/CVE-2021-27290.html
https://linux.oracle.com/errata/ELSA-2021-3074.html
https://npmjs.com
https://nvd.nist.gov/vuln/detail/CVE-2021-27290
https://www.npmjs.com/package/ssri
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-32803 | HIGH | 2.2.2 | 6.1.2, 5.0.7, 4.4.15, 3.2.3 |
Expand...https://github.com/advisories/GHSA-r628-mhmh-qjhw
https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
https://linux.oracle.com/cve/CVE-2021-32803.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32803
https://www.npmjs.com/advisories/1771
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-32804 | HIGH | 2.2.2 | 6.1.1, 5.0.6, 4.4.14, 3.2.2 |
Expand...https://github.com/advisories/GHSA-3jfq-g458-7qm9
https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9
https://linux.oracle.com/cve/CVE-2021-32804.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32804
https://www.npmjs.com/advisories/1770
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37701 | HIGH | 2.2.2 | 6.1.7, 5.0.8, 4.4.16 |
Expand...https://github.com/advisories/GHSA-9r2w-394v-53qc
https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
https://nvd.nist.gov/vuln/detail/CVE-2021-37701
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1779
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37712 | HIGH | 2.2.2 | 6.1.9, 5.0.10, 4.4.18 |
Expand...https://github.com/advisories/GHSA-qq89-hq3f-393p
https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p
https://nvd.nist.gov/vuln/detail/CVE-2021-37712
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1780
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37713 | HIGH | 2.2.2 | 6.1.9, 5.0.10, 4.4.18 |
Expand...https://github.com/advisories/GHSA-5955-9wpr-37jh
https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh
https://nvd.nist.gov/vuln/detail/CVE-2021-37713
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-32803 | HIGH | 4.4.13 | 6.1.2, 5.0.7, 4.4.15, 3.2.3 |
Expand...https://github.com/advisories/GHSA-r628-mhmh-qjhw
https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
https://linux.oracle.com/cve/CVE-2021-32803.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32803
https://www.npmjs.com/advisories/1771
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-32804 | HIGH | 4.4.13 | 6.1.1, 5.0.6, 4.4.14, 3.2.2 |
Expand...https://github.com/advisories/GHSA-3jfq-g458-7qm9
https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9
https://linux.oracle.com/cve/CVE-2021-32804.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32804
https://www.npmjs.com/advisories/1770
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37701 | HIGH | 4.4.13 | 6.1.7, 5.0.8, 4.4.16 |
Expand...https://github.com/advisories/GHSA-9r2w-394v-53qc
https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
https://nvd.nist.gov/vuln/detail/CVE-2021-37701
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1779
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37712 | HIGH | 4.4.13 | 6.1.9, 5.0.10, 4.4.18 |
Expand...https://github.com/advisories/GHSA-qq89-hq3f-393p
https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p
https://nvd.nist.gov/vuln/detail/CVE-2021-37712
https://www.debian.org/security/2021/dsa-5008
https://www.npmjs.com/advisories/1780
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| tar | CVE-2021-37713 | HIGH | 4.4.13 | 6.1.9, 5.0.10, 4.4.18 |
Expand...https://github.com/advisories/GHSA-5955-9wpr-37jh
https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh
https://nvd.nist.gov/vuln/detail/CVE-2021-37713
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| y18n | CVE-2020-7774 | HIGH | 4.0.0 | 5.0.5, 4.0.1, 3.2.2 |
Expand...https://github.com/advisories/GHSA-c4w7-xm78-47vh
https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25
https://github.com/yargs/y18n/issues/96
https://github.com/yargs/y18n/pull/108
https://linux.oracle.com/cve/CVE-2020-7774.html
https://linux.oracle.com/errata/ELSA-2021-0551.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7774
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306
https://snyk.io/vuln/SNYK-JS-Y18N-1021887
https://www.oracle.com/security-alerts/cpuApr2021.html
| + diff --git a/incubator/n8n/0.0.1/templates/_configmap.tpl b/incubator/n8n/0.0.1/templates/_configmap.tpl new file mode 100644 index 00000000000..6f942ee57e8 --- /dev/null +++ b/incubator/n8n/0.0.1/templates/_configmap.tpl @@ -0,0 +1,166 @@ +{{/* Define the configmap */}} +{{- define "n8n.configmap" -}} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: n8n-config +data: + {{/* Workflows */}} + {{- if .Values.workflows.WORKFLOWS_DEFAULT_NAME }} + WORKFLOWS_DEFAULT_NAME: {{ .Values.workflows.WORKFLOWS_DEFAULT_NAME | quote }} + {{- end }} + {{/* Security */}} + {{- if .Values.security.N8N_AUTH_EXCLUDE_ENDPOINTS }} + N8N_AUTH_EXCLUDE_ENDPOINTS: {{ .Values.security.N8N_AUTH_EXCLUDE_ENDPOINTS | quote }} + {{- end }} + {{- if .Values.security.N8N_BASIC_AUTH_ACTIVE }} + N8N_BASIC_AUTH_ACTIVE: {{ .Values.security.N8N_BASIC_AUTH_ACTIVE }} + {{- end }} + {{- if .Values.security.N8N_BASIC_AUTH_USER }} + N8N_BASIC_AUTH_USER: {{ .Values.security.N8N_BASIC_AUTH_USER | quote }} + {{- end }} + {{- if .Values.security.N8N_BASIC_AUTH_PASSWORD }} + N8N_BASIC_AUTH_PASSWORD: {{ .Values.security.N8N_BASIC_AUTH_PASSWORD | quote }} + {{- end }} + {{- if .Values.security.N8N_BASIC_AUTH_HASH }} + N8N_BASIC_AUTH_HASH: {{ .Values.security.N8N_BASIC_AUTH_HASH }} + {{- end }} + {{- if .Values.security.N8N_JWT_AUTH_ACTIVE }} + N8N_JWT_AUTH_ACTIVE: {{ .Values.security.N8N_JWT_AUTH_ACTIVE }} + {{- end }} + {{- if .Values.security.N8N_JWT_AUTH_HEADER }} + N8N_JWT_AUTH_HEADER: {{ .Values.security.N8N_JWT_AUTH_HEADER | quote }} + {{- end }} + {{- if .Values.security.N8N_JWT_AUTH_HEADER_VALUE_PREFIX }} + N8N_JWT_AUTH_HEADER_VALUE_PREFIX: {{ .Values.security.N8N_JWT_AUTH_HEADER_VALUE_PREFIX | quote }} + {{- end }} + {{- if .Values.security.N8N_JWKS_URI }} + N8N_JWKS_URI: {{ .Values.security.N8N_JWKS_URI | quote }} + {{- end }} + {{- if .Values.security.N8N_JWT_ISSUER }} + N8N_JWT_ISSUER: {{ .Values.security.N8N_JWT_ISSUER | quote }} + {{- end }} + {{- if .Values.security.N8N_JWT_NAMESPACE }} + N8N_JWT_NAMESPACE: {{ .Values.security.N8N_JWT_NAMESPACE | quote }} + {{- end }} + {{- if .Values.security.N8N_JWT_ALLOWED_TENANT }} + N8N_JWT_ALLOWED_TENANT: {{ .Values.security.N8N_JWT_ALLOWED_TENANT | quote }} + {{- end }} + {{- if .Values.security.N8N_JWT_ALLOWED_TENANT_KEY }} + N8N_JWT_ALLOWED_TENANT_KEY: {{ .Values.security.N8N_JWT_ALLOWED_TENANT_KEY | quote }} + {{- end }} + {{/* Logs */}} + {{- if .Values.logs.N8N_LOG_LEVEL }} + N8N_LOG_LEVEL: {{ .Values.logs.N8N_LOG_LEVEL | quote }} + {{- end }} + {{- if .Values.logs.N8N_LOG_OUTPUT }} + N8N_LOG_OUTPUT: {{ .Values.logs.N8N_LOG_OUTPUT | quote }} + {{- end }} + {{- if .Values.logs.N8N_LOG_FILE_COUNT_MAX }} + N8N_LOG_FILE_COUNT_MAX: {{ .Values.logs.N8N_LOG_FILE_COUNT_MAX }} + {{- end }} + {{- if .Values.logs.N8N_LOG_FILE_SIZE_MAX }} + N8N_LOG_FILE_SIZE_MAX: {{ .Values.logs.N8N_LOG_FILE_SIZE_MAX }} + {{- end }} + {{- if .Values.logs.N8N_LOG_FILE_LOCATION }} + N8N_LOG_FILE_LOCATION: {{ .Values.logs.N8N_LOG_FILE_LOCATION | quote }} + {{- end }} + {{/* Executions */}} + {{- if .Values.executions.EXECUTIONS_PROCESS }} + EXECUTIONS_PROCESS: {{ .Values.executions.EXECUTIONS_PROCESS | quote }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_MODE }} + EXECUTIONS_MODE: {{ .Values.executions.EXECUTIONS_MODE | quote }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_TIMEOUT }} + EXECUTIONS_TIMEOUT: {{ .Values.executions.EXECUTIONS_TIMEOUT }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_TIMEOUT_MAX }} + EXECUTIONS_TIMEOUT_MAX: {{ .Values.executions.EXECUTIONS_TIMEOUT_MAX }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_DATA_SAVE_ON_ERROR }} + EXECUTIONS_DATA_SAVE_ON_ERROR: {{ .Values.executions.EXECUTIONS_DATA_SAVE_ON_ERROR | quote }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_DATA_SAVE_ON_SUCCESS }} + EXECUTIONS_DATA_SAVE_ON_SUCCESS: {{ .Values.executions.EXECUTIONS_DATA_SAVE_ON_SUCCESS | quote }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_DATA_SAVE_ON_PROGRESS }} + EXECUTIONS_DATA_SAVE_ON_PROGRESS: {{ .Values.executions.EXECUTIONS_DATA_SAVE_ON_PROGRESS }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_DATA_SAVE_MANUAL_EXECUTIONS }} + EXECUTIONS_DATA_SAVE_MANUAL_EXECUTIONS: {{ .Values.executions.EXECUTIONS_DATA_SAVE_MANUAL_EXECUTIONS }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_DATA_PRUNE }} + EXECUTIONS_DATA_PRUNE: {{ .Values.executions.EXECUTIONS_DATA_PRUNE }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_DATA_MAX_AGE }} + EXECUTIONS_DATA_MAX_AGE: {{ .Values.executions.EXECUTIONS_DATA_MAX_AGE }} + {{- end }} + {{- if .Values.executions.EXECUTIONS_DATA_PRUNE_TIMEOUT }} + EXECUTIONS_DATA_PRUNE_TIMEOUT: {{ .Values.executions.EXECUTIONS_DATA_PRUNE_TIMEOUT }} + {{- end }} + {{/* Endpoints */}} + {{- if .Values.endpoints.WEBHOOK_URL }} + WEBHOOK_URL: {{ .Values.endpoints.WEBHOOK_URL | quote }} + {{- end }} + {{- if .Values.endpoints.N8N_PAYLOAD_SIZE_MAX }} + N8N_PAYLOAD_SIZE_MAX: {{ .Values.endpoints.N8N_PAYLOAD_SIZE_MAX }} + {{- end }} + {{- if .Values.endpoints.N8N_METRICS }} + N8N_METRICS: {{ .Values.endpoints.N8N_METRICS }} + {{- end }} + {{- if .Values.endpoints.N8N_METRICS_PREFIX }} + N8N_METRICS_PREFIX: {{ .Values.endpoints.N8N_METRICS_PREFIX | quote }} + {{- end }} + {{- if .Values.endpoints.N8N_ENDPOINT_REST }} + N8N_ENDPOINT_REST: {{ .Values.endpoints.N8N_ENDPOINT_REST | quote }} + {{- end }} + {{- if .Values.endpoints.N8N_ENDPOINT_WEBHOOK }} + N8N_ENDPOINT_WEBHOOK: {{ .Values.endpoints.N8N_ENDPOINT_WEBHOOK | quote }} + {{- end }} + {{- if .Values.endpoints.N8N_ENDPOINT_WEBHOOK_TEST }} + N8N_ENDPOINT_WEBHOOK_TEST: {{ .Values.endpoints.N8N_ENDPOINT_WEBHOOK_TEST | quote }} + {{- end }} + {{- if .Values.endpoints.N8N_ENDPOINT_WEBHOOK_WAIT }} + N8N_ENDPOINT_WEBHOOK_WAIT: {{ .Values.endpoints.N8N_ENDPOINT_WEBHOOK_WAIT | quote }} + {{- end }} + {{- if .Values.endpoints.N8N_DISABLE_PRODUCTION_MAIN_PROCESS }} + N8N_DISABLE_PRODUCTION_MAIN_PROCESS: {{ .Values.endpoints.N8N_DISABLE_PRODUCTION_MAIN_PROCESS }} + {{- end }} + {{- if .Values.endpoints.N8N_SKIP_WEBHOOK_DEREGISTRATION_SHUTDOWN }} + N8N_SKIP_WEBHOOK_DEREGISTRATION_SHUTDOWN: {{ .Values.endpoints.N8N_SKIP_WEBHOOK_DEREGISTRATION_SHUTDOWN }} + {{- end }} + {{/* Credentials */}} + {{- if .Values.credentials.CREDENTIALS_OVERWRITE_DATA }} + CREDENTIALS_OVERWRITE_DATA: {{ .Values.credentials.CREDENTIALS_OVERWRITE_DATA | quote }} + {{- end }} + {{- if .Values.credentials.CREDENTIALS_OVERWRITE_ENDPOINT }} + CREDENTIALS_OVERWRITE_ENDPOINT: {{ .Values.credentials.CREDENTIALS_OVERWRITE_ENDPOINT | quote }} + {{- end }} + {{- if .Values.credentials.CREDENTIALS_DEFAULT_NAME }} + CREDENTIALS_DEFAULT_NAME: {{ .Values.credentials.CREDENTIALS_DEFAULT_NAME | quote }} + {{- end }} + {{/* Deployment */}} + {{- if .Values.deployment.N8N_HOST }} + N8N_HOST: {{ .Values.deployment.N8N_HOST | quote }} + {{- end }} + {{- if .Values.deployment.N8N_CONFIG_FILES }} + N8N_CONFIG_FILES: {{ .Values.deployment.N8N_CONFIG_FILES | quote }} + {{- end }} + {{- if .Values.deployment.N8N_DISABLE_UI }} + N8N_DISABLE_UI: {{ .Values.deployment.N8N_DISABLE_UI }} + {{- end }} + {{- if .Values.deployment.N8N_ENCRYPTION_KEY }} + N8N_ENCRYPTION_KEY: {{ .Values.deployment.N8N_ENCRYPTION_KEY | quote }} + {{- end }} + {{- if .Values.deployment.N8N_PERSONALIZATION_ENABLED }} + N8N_PERSONALIZATION_ENABLED: {{ .Values.deployment.N8N_PERSONALIZATION_ENABLED }} + {{- end }} + {{- if .Values.deployment.N8N_VERSION_NOTIFICATIONS_ENABLED }} + N8N_VERSION_NOTIFICATIONS_ENABLED: {{ .Values.deployment.N8N_VERSION_NOTIFICATIONS_ENABLED }} + {{- end }} + {{- if .Values.deployment.N8N_DIAGNOSTICS_ENABLED }} + N8N_DIAGNOSTICS_ENABLED: {{ .Values.deployment.N8N_DIAGNOSTICS_ENABLED }} + {{- end }} +{{- end -}} diff --git a/incubator/n8n/0.0.1/templates/common.yaml b/incubator/n8n/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..991ed17320e --- /dev/null +++ b/incubator/n8n/0.0.1/templates/common.yaml @@ -0,0 +1,9 @@ +{{/* Make sure all variables are set properly */}} +{{- include "common.setup" . }} + +{{/* Render configmap for n8n */}} +{{- include "n8n.configmap" . }} + + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/incubator/n8n/0.0.1/values.yaml b/incubator/n8n/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/n8n/item.yaml b/incubator/n8n/item.yaml new file mode 100644 index 00000000000..95d4de18711 --- /dev/null +++ b/incubator/n8n/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/n8n-icon.png +categories: +- media +