From 97cf834e7d9459fa3c8bb6a65a6e11a0b3abbf01 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Wed, 19 Jan 2022 23:40:59 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- stable/shlink-web-client/1.0.0/CHANGELOG.md | 85 + stable/shlink-web-client/1.0.0/CONFIG.md | 8 + stable/shlink-web-client/1.0.0/Chart.lock | 6 + stable/shlink-web-client/1.0.0/Chart.yaml | 28 + stable/shlink-web-client/1.0.0/README.md | 37 + stable/shlink-web-client/1.0.0/app-readme.md | 3 + .../1.0.0/charts/common-8.13.1.tgz | Bin 0 -> 40150 bytes stable/shlink-web-client/1.0.0/helm-values.md | 26 + stable/shlink-web-client/1.0.0/ix_values.yaml | 22 + stable/shlink-web-client/1.0.0/questions.yaml | 2166 +++++++++++++++++ stable/shlink-web-client/1.0.0/security.md | 83 + .../1.0.0/templates/common.yaml | 1 + stable/shlink-web-client/1.0.0/values.yaml | 0 stable/shlink-web-client/item.yaml | 4 + stable/shlink/1.0.0/CHANGELOG.md | 95 + stable/shlink/1.0.0/CONFIG.md | 8 + stable/shlink/1.0.0/Chart.lock | 12 + stable/shlink/1.0.0/Chart.yaml | 36 + stable/shlink/1.0.0/README.md | 39 + stable/shlink/1.0.0/app-readme.md | 3 + stable/shlink/1.0.0/charts/common-8.13.1.tgz | Bin 0 -> 40150 bytes .../shlink/1.0.0/charts/postgresql-6.0.51.tgz | Bin 0 -> 75272 bytes stable/shlink/1.0.0/charts/redis-1.0.56.tgz | Bin 0 -> 67751 bytes stable/shlink/1.0.0/helm-values.md | 49 + stable/shlink/1.0.0/ix_values.yaml | 63 + stable/shlink/1.0.0/questions.yaml | 2158 ++++++++++++++++ stable/shlink/1.0.0/security.md | 837 +++++++ stable/shlink/1.0.0/templates/common.yaml | 1 + stable/shlink/1.0.0/values.yaml | 0 stable/shlink/item.yaml | 4 + 30 files changed, 5774 insertions(+) create mode 100644 stable/shlink-web-client/1.0.0/CHANGELOG.md create mode 100644 stable/shlink-web-client/1.0.0/CONFIG.md create mode 100644 stable/shlink-web-client/1.0.0/Chart.lock create mode 100644 stable/shlink-web-client/1.0.0/Chart.yaml create mode 100644 stable/shlink-web-client/1.0.0/README.md create mode 100644 stable/shlink-web-client/1.0.0/app-readme.md create mode 100644 stable/shlink-web-client/1.0.0/charts/common-8.13.1.tgz create mode 100644 stable/shlink-web-client/1.0.0/helm-values.md create mode 100644 stable/shlink-web-client/1.0.0/ix_values.yaml create mode 100644 stable/shlink-web-client/1.0.0/questions.yaml create mode 100644 stable/shlink-web-client/1.0.0/security.md create mode 100644 stable/shlink-web-client/1.0.0/templates/common.yaml create mode 100644 stable/shlink-web-client/1.0.0/values.yaml create mode 100644 stable/shlink-web-client/item.yaml create mode 100644 stable/shlink/1.0.0/CHANGELOG.md create mode 100644 stable/shlink/1.0.0/CONFIG.md create mode 100644 stable/shlink/1.0.0/Chart.lock create mode 100644 stable/shlink/1.0.0/Chart.yaml create mode 100644 stable/shlink/1.0.0/README.md create mode 100644 stable/shlink/1.0.0/app-readme.md create mode 100644 stable/shlink/1.0.0/charts/common-8.13.1.tgz create mode 100644 stable/shlink/1.0.0/charts/postgresql-6.0.51.tgz create mode 100644 stable/shlink/1.0.0/charts/redis-1.0.56.tgz create mode 100644 stable/shlink/1.0.0/helm-values.md create mode 100644 stable/shlink/1.0.0/ix_values.yaml create mode 100644 stable/shlink/1.0.0/questions.yaml create mode 100644 stable/shlink/1.0.0/security.md create mode 100644 stable/shlink/1.0.0/templates/common.yaml create mode 100644 stable/shlink/1.0.0/values.yaml create mode 100644 stable/shlink/item.yaml diff --git a/stable/shlink-web-client/1.0.0/CHANGELOG.md b/stable/shlink-web-client/1.0.0/CHANGELOG.md new file mode 100644 index 00000000000..4e80102db8c --- /dev/null +++ b/stable/shlink-web-client/1.0.0/CHANGELOG.md @@ -0,0 +1,85 @@ +# Changelog
+ + + +### [shlink-web-client-1.0.0](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.8...shlink-web-client-1.0.0) (2022-01-19) + +#### Feat + +* move it to stable ([#1743](https://github.com/truecharts/apps/issues/1743)) + + + + +### [shlink-web-client-0.0.8](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.7...shlink-web-client-0.0.8) (2022-01-18) + +#### Chore + +* update helm general non-major helm releases ([#1732](https://github.com/truecharts/apps/issues/1732)) + + + + +### [shlink-web-client-0.0.7](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.6...shlink-web-client-0.0.7) (2022-01-13) + +#### Chore + +* update helm general non-major helm releases ([#1712](https://github.com/truecharts/apps/issues/1712)) + +#### Feat + +* expose capabilities in GUI ([#1709](https://github.com/truecharts/apps/issues/1709)) + + + + +### [shlink-web-client-0.0.6](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.5...shlink-web-client-0.0.6) (2022-01-12) + +#### Chore + +* update helm general non-major helm releases ([#1704](https://github.com/truecharts/apps/issues/1704)) + + + + +### [shlink-web-client-0.0.5](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.4...shlink-web-client-0.0.5) (2022-01-11) + +#### Chore + +* update helm general non-major helm releases ([#1693](https://github.com/truecharts/apps/issues/1693)) + + + + +### [shlink-web-client-0.0.4](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.3...shlink-web-client-0.0.4) (2022-01-10) + +#### Chore + +* update docker general non-major ([#1677](https://github.com/truecharts/apps/issues/1677)) + + + + +### [shlink-web-client-0.0.3](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.2...shlink-web-client-0.0.3) (2022-01-04) + +#### Chore + +* update helm general non-major helm releases + + + + +### [shlink-web-client-0.0.2](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.1...shlink-web-client-0.0.2) (2022-01-03) + +#### Chore + +* update docker general non-major ([#1646](https://github.com/truecharts/apps/issues/1646)) + + + + +### shlink-web-client-0.0.1 (2021-12-30) + +#### Feat + +* Add shlink-web-client ([#1618](https://github.com/truecharts/apps/issues/1618)) diff --git a/stable/shlink-web-client/1.0.0/CONFIG.md b/stable/shlink-web-client/1.0.0/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/shlink-web-client/1.0.0/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/shlink-web-client/1.0.0/Chart.lock b/stable/shlink-web-client/1.0.0/Chart.lock new file mode 100644 index 00000000000..af7ae361339 --- /dev/null +++ b/stable/shlink-web-client/1.0.0/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.13.1 +digest: sha256:5d8b49b1fb2103e55ad00efd7d0bc401dd47a5946249994d7ba63e2ce3aeb0b8 +generated: "2022-01-19T23:36:41.18024158Z" diff --git a/stable/shlink-web-client/1.0.0/Chart.yaml b/stable/shlink-web-client/1.0.0/Chart.yaml new file mode 100644 index 00000000000..ace94a5625c --- /dev/null +++ b/stable/shlink-web-client/1.0.0/Chart.yaml @@ -0,0 +1,28 @@ +apiVersion: v2 +appVersion: "3.5.1" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.13.1 +description: A ReactJS-based progressive web application for Shlink. +home: https://github.com/truecharts/apps/tree/master/charts/stable/shlink-web-client +icon: https://truecharts.org/_static/img/appicons/shlink-web-client-icon.png +keywords: +- url +- shortener +- frontend +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: shlink-web-client +sources: +- https://github.com/shlinkio/shlink-web-client +type: application +version: 1.0.0 +annotations: + truecharts.org/catagories: | + - utilities + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/shlink-web-client/1.0.0/README.md b/stable/shlink-web-client/1.0.0/README.md new file mode 100644 index 00000000000..9d9e05c03fb --- /dev/null +++ b/stable/shlink-web-client/1.0.0/README.md @@ -0,0 +1,37 @@ +# Introduction + +A ReactJS-based progressive web application for Shlink. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org | common | 8.13.1 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/shlink-web-client/1.0.0/app-readme.md b/stable/shlink-web-client/1.0.0/app-readme.md new file mode 100644 index 00000000000..134eafa249f --- /dev/null +++ b/stable/shlink-web-client/1.0.0/app-readme.md @@ -0,0 +1,3 @@ +A ReactJS-based progressive web application for Shlink. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/shlink-web-client/1.0.0/charts/common-8.13.1.tgz b/stable/shlink-web-client/1.0.0/charts/common-8.13.1.tgz new file mode 100644 index 0000000000000000000000000000000000000000..4ef8fa8338cacde4482dd452cd0ecfa212769f58 GIT binary patch literal 40150 zcmV)eK&HPRiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UI68mpQ{cy>Z`-}m)3TgsH*?qRq`Pw_aeQJYefKvz zCxJ*v!k8l21SCh3&Ue2D?*~Cj@~auU{UCwDWr(dR)R=e;)3#bKP@YdcZTVFIqAgtqD#vqig}qXEDF-4B|_Z=Bovih`CgD>3&*S>1p=-h zg(c|-P)mZ!IL|1`D2KZ29*u^*-qGP<>k_T6@-iXgRvVbcT5W}Co4;tafo$e-IYGLs z-~RP^ztbOedhOn~tp&sxg*Zbc2Zk09r(=M#Y5v~^a3?QkEdVme`fCjU0LwBp=zA4J zaftz47ig@|YpoP6PdojCPQP_e^Do!`3Z_d$?uY?2uK#}Tus7=Y>;I_#u>SAmc?8;R z@U}qNhqF^a3KZihjzOGfQ#@OikgfIBBkbbpzyziFRVy!0wkon$3phjL z762U9Ift50OAy*i~`IGwg4zmkrPbway&M-|-g3w_%q^hV1HI~ZdYwUU(CGav~S$uF5qv3RTbU2zk zL#Wq37)+lgPluy}{z0>Gsh?04p(_Keb)vF&}4SCDaRpmFs zs%I95y~E^Sc+f-1QQS|42UC>vpC*%}-#l@ZMx{FnkKp!7v`7qv5l|VH`h$ zPY;6}qT2jUR1DJsXK2@v7Paa}`B*^Ra)1T2O>mrHJ?Qi;)-dcnJ3M$cgp&zG&w5Ab z*>KXIGPa8b2^z)2>7dt#hm&VVz2V`}!C-h0!>4G{A0?BgaWXlIH#WT++sz4`m5BVZ zJLAFQkWcxq=`u~3G9p!&x3aVYg_T1Y#U{E&>f?&f1*iUOuIb@=xWFvSVTxnfEHEE$4D zny(iqqfbBr(IU?Xq988;p^&2KG9`%Z4MOiSg`JU065d0Y0+?kvg#vn>aXd_&t_8BI z+iC&3)@w}Y82tSo0=`rgNxndG;2!}1xZWk+@;_}{ZjQkieEC|_yA)1Px(irQ;ii4M zX0vujPM3=bDj6Xsh~N?>pvV&A}ULQ6=|Y|V@QkeA?vMut3L zeZYz6iJ+}_C@vAC2<%CYwGUvHfOmPC;%xT5NFbGT$zYw!-khT#u(#O@lp>0%APjf` z>;)eR1_t0+mX~blV8XsB{MphfZ4m5*)qOL@UP}x387wonf;eSMkJqw(?*fJ_%b5Vc z|MIF@Q|r|&U`Z820p^$H7VpH2G9V>dVS@7v%rRjc9;A4IDW7%m;V1F_HG4e<2dx%% zwhqBm%?{yi7j7xT`Q7)mELm=Ne6s@QC`B>NO90a}zapFgBS_Yu!0{!{W&nZ&Pp7Cf zierLf`UK!bk(U%^RP$`kPQj1wUy05r$YT)k-%(38teCK*^~C~a$sXC)aMUKtmH{_x zwPYc_lmjqeIU^0V*=MWjagvA{IMXZ!&|E=U@-+q6^iS3bTBr30oRxS1OPsC)9Y&vN z36I@&)M_qxy*1#&m1+~@>G8P$&=Mc~O=pHOBm@t&3rYY&C|SV5-iO2B&amGXm!u!YT$ropNNylI`8d(F{ zyyF#l(kk-gIIyb)_SW12ITaXRAQA~*< zC;3XR7Jr2T4bx(>C(=B?ZDv<_c_{=eEgx`A9*f~h;!1I!piUV;)W*m%hL zz}rI3pxnZr03`pFFWTZa6G(Z*3$ER=wHt(vlw^?N7;~{jyb)s7mQ`famT2~#2+af} zxI{5c*8oxqx@oNWth;YNhLZDUEb%HZR}H2?2Btxy((Ft-rF}24!)%F4)30 zLj4o5|L}d1i=tDeu`>OPDVUEq8D#58o~#7|Fpe2z$)#hRL4zqyQKu!4)yn_b@%j1B zZ{NKbgT=bdNaQLn6WQH2kV{7^T;>_qQnh5>0T*&-Gt$!|aK6qc{H)AJFJ8VmdwqQI^5ci&*Y97BK@{kwsL8~DI@~$ldzMbK&oO$D zUu9RYOu+HkD^{6tXXO%cxtyRfLllt?&bvt-lP-nil5}y#wu5#8DQv@n%a3ewy4I|= z)vUJB=OQPlUF1m{XVbh~h_bAg9~f$UB2-^b-@bVH@$~r3OSQ(P7^TTOG&O6Ezd7Uj z8(RmREKd*{g;q<=s!}e5w)h4XyuPTd{5sf|_5v1dsdu#HdaD!_uXV9DI1%b!QR2MB zbPeJZ5}|?{V*zD5DJSlUFdCD1j*=yl?Nz-KR_&BG0UiOeCKN5&tS{}j#9U8Q%7QRX z$Tjb%pc*R2wWWV*u<+`VO>R4Z*$kEWlC%vXb^i*unU;!@?AWSsiyb4i}WJK+iIrt{N{OHTM&njv!6mN=xuBsWnIaNNNS* zfKBbZ1i><%BU=yTVHE}1VW!HHJketiFm&5UcR5^L_ns>Ws`Df2>(F-&YLoe_|^ zxlFbWWb;~1J`+Zaa~C^qDqd#C!pa}eJ_Abxq8%!3E#`E2ShT3IRPaD@P7+~O(&mxv2>7jxvpV4sArkSKeU zaBnITRCd5mD7B;#5F7gMv|J=>dScn`;;lOrs?^l4CM*rCAg*U+K0%d3>2`Y?{v(7I zRab~28ei*uidQIOiW(zS%>N=3mULOP3)Vd8?l*ZLO_XNPZiCkn6et3Cvoc{Q04N-+ zlbM(1BsO)xwuC6_9>+T8X+o*^#6Epun;zScuP~W&rYL8Boi9s1NecLxhAmj0S$`5X zL6j(GqzU5M7Pw-v0Mj-+E4e|`?Q?W-au&6WvUYKDW*T@k1rYpnad9SFz(lZerNi^( z%D#8mf6n!Ov@g0`Ksr}-LQQugd5XnkNcBtG^4PctAyW}GvGp(iti>6%js*2;DrKJ( z#Z2+~q(+j@#1nz0Xk(tI2~iN`slD2Vg0Sl-2XM^CQXb%tVEO{3aD9&AJWI$J^n3Da zflACb9q&EG3zRRZ{%|PYPa#g1CAyfGh%kiN7jyKNKzuD)*UKzS?E3SaP`ifyK<>Mc zyE|;ROz&afzc+$E7kk3a>&XVEZ}FnSS}b=huWhQxxKr!>QOl_gBG zMPQy^ZQl`dim8mkNu4|0C#Fq(;x>;@KfpAd!1(eaf1S_B+w5go=H;i~Xc&~!jcojd zWRn1AhSJ124ag7@bf?AwfmsP-G+n0Y`kt`oxbs%eD*J`6KU%tvVpBUEei3E7klqj> z{d5E1;{Xa$r-Df$?EMT)>B*#3IHpPxyuc|el|}zsMv~tuFdMNRbKe1+Rra##v7M|D z*wRehH}Fy&fmlvM>L7iO?-4i?n+AEpwj*wNr*Ws#*|(T8KgnP_#6tMr!3^{jm?xH9 zlAo32S-Li#c`aC8qJ-(Y5(NQT{-|K>`1c4y>2f;7p9Ofew~494#2E=OO5#HC<`L7$9(|LZl; zx|SDgeU~JthTf!(PeEmyv|vfgCwChI)~SkQ4Vy#?R?Q5M)nm)e9T)PLx?@vOHcQbt zh4JMRaK>5fizQ6ui+7?k`VEJRiyzdIM?K{V#I41Yz>ojsDp#ZxI?+Alb3Ytm1SIu^@HYdo_4Hn=gWe_unxyRF)icM z6Y=jk`{Ux|Oo~zOUz~lis|$sMeUhq40k1LunSNtDzOn?&5H) zbIM}%ULZW?(7i5cGp*t9-0_Zg)zkgN5u~#n@Lr2k>p23}F$@3FacB3F0sV>1n7j^z z5~T}>XnE1}BX1^Fzg-Ot%ki9J#`J@nG&TMRNk^<^D2D@|cKu84)w zp@%W=%~Bz^)z@<{@!4Wr61XS*{rw*;tJPXzRhHRCS~W#)Cay|2_2Q~>f7)JLRYTyg zQ|)2a$V-(k_YLJ$?LHRfrK*)Xmsj=RHVLfy^f*_yUSOu3jKBgXNqPlKWRK?$_%ll0 zurG*zs^H0KJD-Z$qKx7(w1jAiFYPavPl-71E?|t56E9rSTzlI~$ig?40GL@~qj9gY zVKOEFivltIl)-1eWz(iD?G0sWijT5Ab7w-2t8<{NaW(5=kD!9P{q8&HFdXwG1>BQH zx)>}}>nKawOCop0sXw-oqqNyt#94a+368Cyw$|jIV$>HlS*Ziy->0ggwi0*iP>YT` z6^%hQ!`bJWqBJFK7<2b;wt%8Pxbkz$YLilm<$!W;t8EzFBc;X=+b4$y9eO6T4GW<5 zvx@jc$tigB$lDp`IiY4(w09W(#Vk^R`cFCGcWF3M?wPsTFS*yPCI5&^NPNF-OZUD` zn#V9TGK-H?0qNWz#Q+#-lzlS#hr#R&(s>7LhZ4}1_^$I#SVZ|=kud3%33yh7C-B$j zpx@~a+r0`T;V*s0Z$~>HEu&PWCADce#wfA-X;Yyg1=frQML4`|4Veqb+d;O}7f+nJ zczy1ZO9yrhRbro_TXT_=&g z$Xttn+&xO4fw+5Gj7o~9+}f>~4B)q#PEbjmvn-eVwLf);h<$OhV6;Lg8{q~)_`UT0 zlDBMNX0sL62PB-O*fuAyXK)tzGNWvheSiKvNRaSozmZgJVOy1~MGLip^>#hIE9AV^ zgBWTj+b!gNtL$|Je*xlKknx!82`rl^?Z#BLvSDm+^UetuZOzCa`xdwlKh|0?yWnW>V@U?w@$>X zPLg%_Q8_0aGfFH{boSxoiTv}YvnQZf#ZLfQ6my8erRl{!{nA7&;&G=|?(8A4T=QetIH{O0RZS^4s>ea`z;5OOqva zSBZH4hG8Tc51cmqCucCU_X%ks={Myn$G!Mj+7t)a)wtZ14Q&nbgEi^nQ_xCO2D3l#y%%a0Xkcz z=@XFU4kRv)a`zg3%*ocyJlB?rP;W$=HVmOgwQW+D-ZocIT%s<~lHcn9=rbmqLgN(T z#S=5>(!EB1XA95KPOOt2Rp^Al;Ek{IW!dH+EgarUQ(l~B|5O2Wx$)wY1K?A~x|j|D zSx(x*St%omEVWLMm<6kBCUIiI!MgWnRFU^pAJg;xWH6 z@g}z;N+||OJ<@$+OpLh{>A9RNZu>3r1nDJYjPMibS|+DY%xi+m|099!WE>YTx(36x zz>uiBA8m#O5vFmdyEX>z5KMk9F-32g=xVxuF-HIj=9o`4j;a@I<3Yq6CDe`$!T&;I z@a);MAF&25j0!ndVgyApCM&LSd^iEiBG14l9&BWpvB`yL`bjb_R?xo(f1>pgwfQK@ zV3RS2C6ia^6+#(+sqL2EvPOBALDnP7+e>h{-|Vl*P)NqE$fFfFvH2;?eXidXl>-Ku z1xoOeTQ4IKIU+K<83c4uObOU~cl@S3f$=4qCw)<5U#%DkRD08jDOP~lOtZQ~pZUl= ziGSy-N;K@U8h$8sj{k+k$M1RTAH;}#0#gJjTP8CZuR)H-6V9Pxn5n(f9M$1}iS@VO z;DGFnoB~5*G71uS1p0!~{t%?Gf@PY|$TewW1PSE?Vm zcF@e#S$>sdg$wF$NV&q|vjqVw)6h)`SoHYz$ymXCAm-nUnB^@fL&LR}W?rzpP(kb( z$j-7X{(((>R)6o#;P--?sf0;R%)|!?vOqDn^4!1{p?Hh1If!4Z1I{^$whoW=E1)c0 z!ay+`^sG<93cpylRnU+cx>Cnh+mMzjt4>Qd(U)_|RP~OuOlSrTVT5NCVy21L7avY# zw@g5tKQR5?HTec-Tpq1&o^Bb4XuG)KU840EED0+0;SY67y7Tp4VKEFg)WAI-%qiBZ8 zzjE?W75~Q8>VFYh;%p|qT+LDTJ|mD~GUcJSyzl%-+)Uel2~Pc2FSHNkgFy3C-Z&w* zFlQVlpC1F4kAZH)3pdK-^Wzjlg0$m{l-f{6ODx`Y5skaTpN)-HQ82du>P$I8ib5&^ z-K|6(gGths2()R=X%Nx4&2eZmj>rFOLxFjBzh(79&nqshsGj{!ztK^E zHDmm3hlgxpGa~lgxLA(Cu-EG?q;YYtHQn-WXsB|pFELKD2b7D=y;-YOy(u9^E2uMMzWxN z7pFOorzlr{TU0h^bWd?`kf4lWC_JcSTt#KqVU3+T7wY+{Yr}mFg9)NEpjR^loWj`x2KyZR$Xr+m;tXfYR{c9=8qU~Rjmk7yT>dkuu9QWJX>6F0p0YQ! zxm83&I8SgX(jr){Vree#(9;|grD(*N3Um|t1Ka=SD05M!GA}+bnQFM(sBp1_MWF)Fie;fL zVluWWEJ7;1#c{;3ybCdcJe*TnjwB%J-0<(Xfp&HiC&?yCY(w zPjViAU#&AHG;;S?uG`5rFA>wyFA-sM6f+S{g$uD-7p?g?yi|^^(k>_$BzqI?jfgBP zWP0?u;Avv8GW!-HPpRg?2zAsEYg-6d+U%Qb56W|nsc z7sxC#V(L0gH);d-WLfRdomb9KcfImjd+Al(=G;vt(~0AaKxSmJG@l8x51HdahZjim zOT2@i)+{fn_M4<7jpMeW64+i+(y)VK(lw5mT%iWP-rn zzkAJk{W`zI`~xEn*V*Di-zw*{Gt<|{gajaKxv*s~(p=pR(wD}iki#l;zw599L493z z+)9?v+ihLwl>gScDDx#F0scDEIYM~Cjw?*(T;@2-lUrLG3Wuh(q4B&6H9`Zw&BdXC zUTbma+IMSXc=V_xqvH~D^d^D>^Sd`pC=*RG45r+Kn^6_iB|!zsn8=0^VW4EL0+S(L z7g+C{P(PU9Q{6h!(pNHxOO%jE(R}P?KH)KhU?$QU3ue#hD$6O7S2EwfdwnjGR9ZU% zn}QeLGvZyAsdeD?4keiE-mQ{V+pb5v=>2wT!RR`f?A|R|al4Mm!uQp+zdSsDsz>Z( zU7bFq`_Uv2KFbr6KDa}R^qOt-dcEFgIOPBKdOiQ&!NKV8Fa2Tvs6XrtdcDKH^aj1b zLH{qHcguYZK1)Jj`Ip{}+wwd22YJ4H>3-MZJCzRgz!fKXIy*_1s3@__Nk2EarHfod z<`TpqJ-TEpBv_gp$tKaTD>HRk-*vx!ZGHKoy_zCXpffLE1lnJjkifp;Dd>C(!))eaX_LaYWZMEC&7A&w-x5mK2uDcpc z5QY8LCC-vDs99011)@;6B`HtNFJDY2IC@gA)QI|+iSG=fUqOc1E zcQW5001nngLAtBHJYi$le)&?Z* zsJ;YX=NqpBV9Hnk4kQ3XOB~z7945Nv6y|C;+S0W2P9EqhWkUWms=dq_SuFJ%(ZKNv zm2ifvMmCJ@CX85@P?p#~8++K0eEpi8T$p=MH|XaUcsX5FKiZPhsK0+}ru#d3s{21o z(;Mvdp=ZPX-#Z-i-2J~l>>obt|M&9n{a+?erscZG)m~rSvW1DCn=RWNUTA0JFqasbu8s@4B|k;O$>L z`KjEn0&q*TkOv$}jA?|%l<9LD;vbo{RM)@0rEzOqV8ieZ77>QAG`lxwQD+munZ}|iZa1q!`a7@`O>gn^F-1mmiXN>$@%$}17 zJZ_ZBEV1kl$U6TNPnG}c_!X}ih%r`f%t*8pz*V)>L)HOC4aMIzGH2)vCNb6x~ z-e@}`)Cizfk&e1l6hyNLNjns%g-1P}7M9AmR3Z_2?8a~FaJyPBV*$TRLuF;^}V5p?XlfWcC2nl!g1onR&miM*(IY-9`e?g&#zKKY<8PhK_HXn)2vIqw$!~5>hl< zGksPm<Tr z1S@{IPgm!e&)Fif7SP@|WIr-Z>{rGa==y?6#i`4eFBV!`kYi~h4t%o&9|QDDQ&0Eu z5_HJ2oFULzW^e^@3MVPjL*O(p4u}+1CDZ-_etvJ>i^*@0BV33A8ynU+d$R?Uz;T!v z?FV7>K^Xlv5=N`?pYn3Qy)(d#^4~$l{?j`gJ;;Ce@o?j|ZU28I?@}~c|3RG)CyA%o z^luV%ZfW^f_d6`Rzk20a{T1=n*!<;Z%i^!#gzWu^iYQgJ%WWnM%#b;dd7b}eQtZ(8vadn;I=HMld;jyPrzfET2tT;A+54_ zJOv${?#uot`{f*=jGu!&paijRR_$+A5r}9iI+dW$z#Zob?QA-h3AI^ilDFCfaU({a z+*6rBGln5zXu^E+5fCcrPkEZ4GP2qU4x3L1sH7cnZ_qmX33jPT2n(MNwIr{i%QCBk zob%J=%Gh%o_>@_GhV?v_yyKPTQcS~O19J`b)ZUFhnW?EDA=bF-wy4&4WyNz~B_d2I z8b1e7v<>dnHa+Y))0;!`H?%etBQ=Ekrgv&GyxvKKo_qXiV^7q{sjTlfZfcm9XiWlL z_*LE}o>-R?ep(p>128Txv^51~a4-Z3QTjkI%o68$vmDe<1$Qb-Rk~={354*eDLPiaMUn;oQ0W48&H#MLze*#Qf z+ij9HOUY7{kiJE4B!SJf+JNSUE@Um5+qCyM6EXz9rsjOW#ia7VV2q3J(>%Vc{m_YV zQUXtjD<eGIE>)i(jf z6LfUudd&#-!Jd$k*zoLEI+~ZkY8`9oa}ae!UVbhZL2zrKuMYCb_h+O6M~|c$`etNo zT_a$I)l9D$N`NEw2Nvw=&~HM|9*7E#*2irTwc+iK?KMcp-aWP=8mmH;Tq+-3Lh&JT zQqeEHO;V$8v5IzWAxA$}lU9f8w$xNt{|0o_I6^y7P$Q(+w8{ea8e{w2hOX&P9itLrop+aTs7b21677z7aDv$SV4Kh^=CYHWv^A82g{)Kt~&QByTGp!WR|r-``{xPV17S)1!}oq8fR zK+O&7=4;BU*uC;xy%o&^a~{WWzRajsb{cXc3=NcH`Sfx*fyi^}wWJ3R8M|O*6hx(v zskPdmbB(B>JyY%`%~`psBGBBTQ?#*72TZ+VsgI2CC9Oeq-#=*Qgj1p43fAQW#&vXA zDa=FnY*|)P-`3@|wZE3rTQn;}7aJBBXkIueRG|e{b^Vg%(jrW2v8o;#xd&mD&fm8@ z7?A%~@%_gC=nr~FmG~b=5BLA?<*D5NKQrOzW%g5^PVc(W0QfExb_Og~@kR$gsK5G&=kzU^Oa$#?S-u49{2-p$@#R!dQ!-EDpU#K=1A%vZJj!{IM~Do^S^=2PYW zY{$Rd4Pev#|HHw+=l=)&2mXIA&rb0lVVYX|!v~XW^;Rze3XwD5BE%`v^9-`RfcST~ zq&!R|zu97W0|^%*neO3To}%B;#X*j^du8y;4K57UwXpMjzY4dm!sMAy*=PQTI)bZr zMUnuSe0;O%`yOWr&Snp@xLY%2o+23t6c+f$GG7)ABi~X%LG5+3vrF7kFo!Weaux8- z9oqv(asyD;T5)PmBQOVY;#l+@N)aTebE;lfM31_`Rk)fmfpHzwN-}>u&*AF+FEr!Z zlmIsD|GmTB$lw1*M}vp`|2`hM|08f7$k{J9@%pV=Sy2L;vF6zV@NdJX#ck=g1^i`+ zsvDTJ5-}FVQ((W4=rt|-Kb!gzTK}BU-rxPt!LaAc|A)Qd!}`CMr(*w6>3pwg@6l%6 zrVF4dP1v^gKUHor%L1fcxz-<5vhIGB{A}576rAhCdsKC6qCJ{BqE55h-w{=v+4hd8 z+q*l852+{EZEjmLk*OY(fy3;zC8<>3{8Q)B#39yAMA>xP?_81OrptZ}wCG><+dzz! z%YGV%JG$#8hWqXJ7U6hV-|)>Zg0~aMSNPPwoB>g`#yEV!$T(|EO~QGa3#a z;(y)CW6A%ve!a6E;JOl2ZFg>oj)1s9Z*WWmLH$AP&XujRqDbu5VUpcE*Gj;c;5AaQ z*#vDpTLs>_Wd$U#{*9l)E$ILo*8lKe(D&v4qv6B--+Otk5&!R863A^w0CpT?WRb@! zEvn09Tkher z4}Jx|EOR>ys7c%AfaY0=oh%IfA_mdUf0O8cgka2McAh6O^#ieHodZH8AU+noEYa%(2w1yp|@N7?$i z-+|+zVEjO+AEqZJ%e^$=!zAG%2ux4ZCmrtbi_8)wYXtJb`uKKqX|a1v%Y4DNNaq@g z1=F!_YJ0HN(<*WiZ?tU>QUzeeu-g3&ypp(!LyaQM*MCE6dFU&xu4qxvwbOffLb^@Y zJ(woLuCa!DKKTZI)oC=;18YuYJ+Y;$xfH+L>60aP>VWWTJJ<1)Yi3b`Zk|HhQCVJw zxkPJym?9}R0ue2jC<4(UUuN_S(s=};Hhax8?MCsE(0mbrXl3ChG1zY!vZT5Olr`TP zrpDD(cZv}{P}>NnX26;cuOgo(1OQz3ylTtSs%optEZFXDv!Mb~Y&#ou0VKZ!!`p6z zQ#Y86;btqdAt7|X11}Io<%02aep5~4es<1D{~vy*+8mb(GFrvTj$?&UwVT<-!rS&h zp0S3up-FM)+y20DwBbqJ;^PzWc%Bn##}1az*=tgJ#m3Me^8YzH8u{{n z@907Pzn4d!|2ZN8PEZUzahV7GB&cjW2yBvw*)o?Y@AdZ{kI`1&;xFwd50DuOS^Egk(;Ns-017*VsE6ES9M69iFm)am|x4C4%{=5;Yk!-0JfDEhq0++UpuNyfxLMp`%h)*7CLO1m;nMZK_9hhN)5Gwk`KPBxp3;w)DC788#%T^*V7Vpj5aq z=$3g-yB$L2U7UO@2^4nlZ|o0sF9ASL@Zd4k4Za5!R{07VPAx3$3~ zT5EY#m^X`%2>W2w`=dQ|{9lE-yRq?a3;sVER^p+S(HU83TELw``=j z!)G)9*PXidWsnX0zjt&Pu>U;V|G1Z@&i~7ft9zf$UnazEz3W#caBtZ0OLyT;yuL!) z+#UOTnXzf~_}WPruUr2r3Nx4gWUSM>lK+OoentNuKIH$tmq*KgI>xt{?;UNvI?T5f z%({L7hk}CFnru%v#5b_G{ynX>YS6LS?qso5?P}E5aFLF|ui`|9EAC1HoKsqSOu5(J z$AX_GKI=X0$&a(Lh~1Ck3zv26`yf-CBGJh%T@+pYoi`l5J?4*YnqOii55*})na=pL zEYq=*&Bwp05tpz)a_LuYSk$*SBj&EdKl8~)Jxd+$Y6FE7$1Z%HXOKILc^4egJcj8! zCse=nue|`)Sg0NLeEe8II{)}l>Kg0^R~Txp5d52&Ft+0VcdP#o237rkIC|j!_wrQv z|4sFOdn>5w|C$pA^ndkjgZ}Rp+eZI)Yur%(-$ALj_PIZzQm;wkwv>8%Jnmkp-{5tl zk=fekMr>CdwlhEPA{rYe=|}}p#j!ZcOHD*`%zhbX0>S z@&aWdv+1=HqZ$w(ETHJdu5gKFOIY40533C%&|qsTiDOk{O4bNqB0l|qQyJ;{-__jx z@OV!X|Ch_4`%#eTo$3GmqoFVV4Gtdif8EPd$N$xJATjkoZ30k-u<%ss6cY;aX;8Ip z!7Sl5Vc>QV)Lzij&+6@J~@o%MZk!@xeOujICa`8@13 zzprO2{(rae9}bR2KL79chY$Myy*!ospEo`J4RA?w`YS(%4u9pR4QIbjscnvaoeDP# z_OOHFw|aB_Kj$CcynXTh^~)VjjoIk^F%OIx{oK}Bu^ffFKPIj@WMJ)I;xs+K!Ze<{ zt^M%o-OHbkU%$3ni{73_R*`pa-(S4^*mp|wj|QFosMG88y8S^EPIN5>vxX=>3unAj zkwcz*e08=Ox|oS(zkK21mW*OM2#rh4lH^!wKt{dy|RORyJ0PqE!4K_y@A`_1JF zNXS)QCSqhzw)&yW7s6LT$Z;}BDA=5t)3eDc9&aIE^@p&$9&A4yW6iypb|DXGL>g<0%tGT}w3!r2f&3wZ; z1_@jD3{E$+?`e}=#XZu)#Ig15-+_hC>hsojx^8v;w_N`>vH)$e|BMd&{l7mvc<}$f zmq+jaW^vur0u)?5#s;K6hpa&Q;|4pBS8f|ikXL0FThQU?sb>umZ*FW4GD^w$%d_Km z#}{wkITnNej2=uzRg=*l(q{CxSFc~6|NQFWhhc@Bs_?zB|MT0Swj8^WH+EZ(%4TA| zYxB&l*k%xoErH}}*86v|(%jusk^f}4|J%6tubxf*A4dm=p8wxbum7O`-OJOM{}p=K zUty}8@ZZ4VR&&3qBokiv0LgNv%QRK_K{nf<+y0$~H?UB(4JfNrCC6;Xy~JSTDVY(! z6V7vCU&*(>cdB%m60h+6%l+N}&*ER# z4dUQ6#=+iBW?hB1pH8=qBX7v3tH9l25?wJEl@{1*Qv1kf~5zX>b}&SoNC_{s6>m*B_u zuQs#)D$N;>aPO=Z^X4s{jX%Gv)D~=KS@MMmLL4f(d`dcThC6W%ZR{`td*dqr?6~{Lg!Nc9#EM$;5GYA^qtTW49suNnkrles*5G8_RuulD*%7 z)Mt-MRpzt5ZXxkm2tF=KynyBUT;}>4KL<1G3`C^>tQ@%L1T~_%cg*rw#-%qX z%NzdO{)Y9b4$6K-_SQ@We@4k0oFpl_f~DXHQ5ZLIgZl@+f?Btpl;QyvS>gqtN}CRo zU@baH=sEN%qR$=6;}gIM^1nGvR?7N=SHUj2TuxA#A&N*`CK1?oaWdBZEz!}a+_Yh% zhq*eLH;s$B8T6-R5uB05j+3$2ZXOm*Q?R(f=-0PjJMcR+R~>VY(*~x0pS@i;FElIN zG+tqft-{h{!Dgjt5j8YOLXGWL`s*tT0iUEG8#Hw!BNPgS6rE~JAokw-yEA}P%o`Cc zA)4Y#-Dg8hOp7Y>CFN=TXt^$OoKX^4uCK)UV5gP4LKA)vt4{y6ZN{2s*^E8&l~c-Q zOU@3a8>P%O=Y~IZLx6bI)?|%;Wvvwt_rk19aaGjd#(bP%}U9Ad08}KB?Ca|Uj zL|2xHjtwCJ9ypB_Y_uM`qa9!;HcvG$NeokTf>ioM04n)SJoaY)zbCjxG!-e18N-h7 z=NR!E%Av-Ly8aHWFk7%eu8XIjW6-HZkq?1YP7g+yu?A*T|0tKKIXIFtunG*nm@(5j z&rKbeggK>!nO2^E+76#;9f^wE)Yk0j+kINF4@tZ2YK=k)uK}6X&9ChcMI}#s5R2!U zY3Ns4;?1h~*ce$=`EN&34&dZat{C$|os9A^=MiOtgm2Tj<_q3;R{MgdgZuKu0JT6$ zzi`5{5>4^vNC0P_LtrbI0Wg8_CCZYq^Kvs1K;>xnE7}{B8t6)0z*D+cs{)WM7ZX&9 z>LxjAr5}!D<6(5VxqV^?YhzRXkku{0-K^+;+^63DSFGaO2>!B7{_ma_|F3^II(W$c za4*l!_P;ab1VTmJr;`-o#hq9KiFO5z5gJ6224IFvt2nSxP;bI0FQ@(`W z6eKzSoH?vispjl)%1hmLi73R`j;Fd-7iE2=tjtlm=#Y6=x&E{Z?qC{?!6iaPDA4}R z)sZGC@|w90HfoPMD@ZVo5g~8#1nG=|T%^~%*57S)@EwB5&n2elZ5E@5U!Ac;EXThJ z@JLk1QeFtnOYUB5=~V>(%W2@*vu8iz$X5_610_KT#uR})AZ(}>&xp*jou&B%rV)5- z+bb-R5zcmoD9vvNRjXL&p6IO|5!UbjN-VzX^S|EF@Tgxs|9kNNx|e6?{a+oZ+{KPB zNv?6%x7EX&?D)Q#xzldnvX#-_YRh-pukPaZ*IG!v1VdIa*ETJyI1gfHF->cBMYs^dm>zw`nWImQIRuW7pzW4tUihI`lqw6dWF7xvBNT;gJ^0T7eBxSPS-a5y6@ccocG!+>j1~FaTtjWgytMYV$Myw8r!~D1x*vI99L6BsLVSCS z_`!6|$Mf2+7bj=dvAB9a1{Wu1t&r{7lrWtSAnP9h1tBh)4Uvq zc$@fCvr630lAF|f(${endxq*IM%~)$W&yJ9v|)oJP%Hkv%o1_Je%k_YWoXE9LXf&5 z2sO*px0`Vh+{=~FVDXwAxlI$l5lx49j$tNGd-kDE{Td1%&HkxRg*MuMJ_;4>CRU(L z_x}zm{@+JO2mJ^8&wV`H{__seWtqujJ6z@D3rg60WDI}T?z6Qm$Jg*J^Mzc-XMCNH zp9`z1`5xvD9fv!#o7jWrb*r1zpi&!EfHaiO*lDj8Z)=U-k7;g)2v3MCTm{{F@h$% z0hKsBmqWPA05VZT)prbV8s;Th6A$rU!4#K-*85Id0B^-M{_pTq`MoiqkVIn%Xw-%37aLE&C|jF&%V%GO6*M5d3jbHm|*)o-a(vMStmYn6v| z&fj;K=CkJBr&hz||K}_@fa#?_A)sH}=FY!lqyOF68nSNOg-mGJ;XSYXZ zx}+@|>X*-h<@|xHG9cM&&K)es_F{P6R7W+Ut{POw$6hmgk_A+YiJSa(j~qGCL+BcC z8puo96!=>3SAzB3W17@89XZ%aG@YX<*FqFB1JyPXIK*gZs0cR_YUV6t1$5?0KtlPwINhR2n0-0nUKV&!z2W9+mRxR5nY0ZY`qlxNZQ*;|eRNSxkiv z@#L_?5Mb#JT>;!~w_Cdh2N6I$U#4BoY%4BYWuB(e093*(IZlf?JY6opq3vj+knl{p zjx|?%-ivW|+;m)fl=n?}kBeb+zAekNa@%3t?S8Wwf3p(4c?t#5r~oej?QahCRaJ{B z@_&ja-58a$`;qmL(JJ|$gYf_H@?r%+uZp4Y6pJycuV+$Gu%o&s-&o{QV{ zT6O%C+%3zPzI+!csp%NdI@0;R>uI#x=tdkt(FxO=%Jr-LpkI}Af2rtfj4a^_;#Ax) zXIqTSqHR)ID$M>j`-c2)7J;bUZu6aX=iu{?oeN*>FJD0Qu9$tCveULCd;?tH9GVin z?a-8TV!4Ba2ZEnX$A3d>F%Z83nxE4WXEPID-q~0f#7nepf>`1eq-a}^U+yD1^}}=5 z&xZZ~Hp2gGjQ`y~998l^KjiJ;pj0OF~~DRGj3++OnFNT}}DV3M?3`w*{B@oel19Xf1pW)Cu!O zj7($NIoj^&$D%|8Wz=~8w{4YC{Sf2n^GWAmq~%V7VD8`&twHWgL-W8}d&2K-C_!Xl z$H+|Y{h`gsjOeD35}VfULuGAtzq_%z=Fsf0l=Tt?I0N|eiTO$z$IVcD$U|Shbp6^* zfIhn&u%}&e{o(6a!)A#g`y1Dd-OFj2FLX3{F4i^nY(tM8OO!ZqTpw|xFaX-60cE?VDSzC~iCxKR zx1-uuE7bzz-COhoUtsw#!lEeiqQp#iF?K)hZs$j@-Kkf0SU1xtaXmJYEC*+^4r53n zlC*2zCTOujKNp>Ua9jqJTAScgH4*L)Bf9~b6 zr@)X{U=am(^ zvs$Gtv_=)q0%mZAlJ-O<6;x+I=O!pwmCc^3`$snz*~&1qgZOPonr!m32kPRCP?*KY z?V0Un_P|~LtWOjF7o>CN@n42VN51?&Iv73pf85K%`P9qL1(Z3K`Bjd5D#EugGN@%w zHe<0|1w{O#Q`?KezolZidVKJrCOJMG0Z`Aup1vU*_^i|h@yYS!*sr}eVzd&zJ#fCK zTTu`lw~#>7{JgweW-%BY@IUe5d^w%s&md|?VJW({v4fS;7=gG21AL zf=@`N^)nLCd3nm(V3R|@1jTSk5Fq&iaRp9rbuo=ojM7A0IZE*YQ#f7H2b_pmo2~dNl>5*Z~9(nZuVzYT)m%%mqF{U`ZIB1VE0w#I~7ajFXT>Hd&)z zQ6RmCn1UZOXyDxjlbD3dR2pzAnYirSYu$yh?d>wHB8oLAs%^Itfn13ei8FpEWk*KdoXq8# z5v90vwt+cHIoGolSRJ)Ej{Mt5rX?y;?qB~O5r{rUyYm;-E1#`Pk@Yx^^JPXEOJE$N zxhKS_bLy>L%WUfw?1-RX&g>~#tr!U^E`N=5H0eIpc=UR>p9vPETNF1=`!VjLy*s9fe`F=!?jupAXvc^C%|uW?;Elo)nOFk z%C#Fbo7YItct|0)3F-P(T# zgQLEG{y#b#J;eXGmxoI?H(K7|eQ#BX!D%`PvED7Z!!L*~R5>w=3WjE)5(msJ55SgnL3LB@TkmS+gaJt_CUJw*{ za%`LlUSmQ`&M9-&N-Wh7y=6=n%3M0BRq~cX&G{x(!2GWu(Qv<(lEG@uW4`T`^ z)lsZ8>w|9?L#r}~)Dez5j47N1N72*_5^3W_rKIl%iYj^5dN<7uX?2Bq&BB$QIqI|w^6kKIW>3H~Ij-uTIgTlR1ga zY~x(@`b=%V1U z*8C=Gy5R07ymk`~L7e%R*6tKuV_NvF;;w^E)Dl5OZ1O+d+thEdH3={qC9xpPYs|Hi z1;9tw*{&+HykTpS6C4uHoEEm2T4!RV1D=^q6`9K3tZ+8F)@Ee`|9x*%s)t*!VTMqJ z4XaVpfSOpaEbPppz8d7OJXtu%daK`dS$hiS?bcnjt=nR^HIQ$Q)yf7!Y__KDYp__W zk=@y=S|}cCbza~3)ZQ99t-`w%Rw}^;*l4xE-B_rBygmDT$;XjjI>jlPp#<=tW|*#- zrhq*DGKX00gXe{b(rMqqLtm?AD_&H!K9vqIITDWq8n7Jj)*95J8 ztot@Amep?x>tadSP?v3#QB<<2v3ekz!&$HgHM3LX$+8+CRV+0961m|J^m|9OxW)Nm zf-~XDAQe)3!EKWJbV@sG>mlW8 zKQNaZplzBiDcQjQ;wH4KpQl|&Vj$ZYuwoLJL9^P@;JPF+*n%bon}}j?Q>qx$QGz3- zcxiA1sEU@?L>*Ep;blCtI}amY*_-QsXc~e`nlB*5F-+4nZ{_6p?BnUni;v&GI(_l+ z{N=k3uTEZ8_v#Z^94AR&w~d#C=8M|TocGm!P1YG);JEg?YWhW)7fo%~d{>Rvd^W9z z3p9ve&P_F#BsD#LehmPAP}Hp;B&-899p4fO7epNvddTa#@6f~Zt?TX3p4V5G2pU@q zc2Td-60cN@a1jv2<8?j<^;w}zr(neesb<0wfm(IWOq0@TAMAlkoF%Wg5x|6Ram(1C z_9_=epM!pHFl5|P^T;3+JNB#Y^>ZQb*KiT3UAX8Mjfl&y*T=cIHntnNq1iDs#5$%V znL^~V$ZBBTW`WXPYjvWe;e(DGDPKFB#lzBpp}3h3gui!rgUsJKB9t;MRy%_K6L+iLu&%SRfMmRv3P{+4an@|DQhh?tWx)Wnl=avxbXZ z-2pfF{~jFp`QHcqqr->zANTS!=6|PipbxUIxgQVi=2!`jU=Ru%Dh*XqtH+rGRf zifffu{&X2|<8`e)@y1boC6vmgCrf+ux+E1?fqVV6hOb{+Z5iI!8{!rKcmZef{lOedB0PPw&Tq>ND++o2)ix1qnKhS@EzA

tgBl1PY}-+dBVQW z{^QF127dh&h(3ujQ;1bEyH%0ND6voYt(By<;>W zq#Dtav2D}3^C^}DD3<)H$OK%uNHpeScXsPcXD*+tohYYGKgFukYG~A3PC6$3nJg#n zNBP14sFVm`e><|$pYho!|H(VRsJ#9?kY@R>-y2rszuv)M@F4%)$MZ$pNxEQi9mE;X z)2*%?B>-ps%~tDTQoS6)LW;8(!{+=UeEAx=#IL}=nCLiejk9H%T6y-hiv$-` z3jNV+?2cd{H}}9!FFBJkixDog>82UyW34%y$4O1sn3jK&!l#nlD>Tt(TEgRUM)>xi zcLni+*J6JMMIT}tP+p?7I$E*y zZj`O8ETXnRDWi@1gGGx}fq5JlmL1#XfBjJAi|sIAC5`s^#g4fy6KVYot>2-ksm52o zesAhp35ZOO92mkf;P+8JD#K4*U50wFs(ltDE5<4-pNF{peiPz$*TX8ddnc#$ zSHj}y zL=Y!Zpcqfryuq#j!IWN%@l(Hi3Kp;+ss?~o#4L5v8E`kT)Jkg# z#e_Vr7PpXJ@T|F_n{5w$KP!aHJRP}9#2KmQ3db-+wUk3(8ME?0TcUwpH)^?zHmx@C z*2Wx-Gp?RPf!?Z z?djJ2t_4K=2XWkUQ7+Nx@i{m@Iez^Ts4yi7;2yi#G#8y@C97t1#sgZwaeOcz)xk@| zLlJVD7%!c#dQLhsJ z>8L+=i2r&okFfu>F6KNuhA`)0rfWCY|2nO$41h(R*zsQ+xlvo`L<&~E6#aLNW{aw; zZZ$+$mDXV|H+PXrwGd2`!aZ|eMt-DXOhbATx%L+-rWY2RlXOWaDu2Kwp+93f z|4EeegqE5L)&0SZ>Y8LSu}~)$3D*K&I7Omzh04%Zf?yfX#b%}7293Jaw)kksA2&Aw zhB4-4truhP_kY}CQ+D?OP``F>#QIYls-CN>EtyOcWrT14^A>i?SqWowhDywNMV=+R zl2zizN`V^sXY5xWn`p_UNzAJ_%+#=+9b)8RS_{Qa(dD3OOH+@%PmTw^V=7R$SuSO6 z#Y?m%bq)LqmKpv9{0c~3Ql3R?-!mha(<_xKu?CcD#IsaP1HyH|0aZ5~)0hknS_N8B zWc`784xqR}=YO!Ehjd9v`9%u$l;Z9J*ykEp{RR|QNUVXvyraAt%5YDZl7x#9Fs-4G zV1ar%k&Xw>1b1$K1{+O2O_-aB41V5yIzwPKP3lf+sIP&_w`QL(?QFfrAEy`+!K|&H zH+_;SFgeLHLQ9CHn@sJ;+h{jM zr3r{&{oE1upHSOHGz{lBC)i~+kr|L-3SEBPM}dk^~my*%6kc*d`@X@y_qIdByI zE!2H(BDGR<=!>zbds{eso5IUIp?x3Slo75tP{?b2@B7s`p%(0K(1qzb!zp+97@{v z1otW)HRhvba&;r^zg?EXp`U;x=W-TV7JOJ(dx`7|zapT4b-8ao1wS!CkMq=d%iSZ;FV@%Sr;CfTi2FcP-=Bv*T%7Ro z;s`;$9fOOLv&vD2`N|NlB2>MNSr63NmTxKJ`ey#m4-xJ%|M$V@Xi&-jeejU~@m?Om z|M?sP;Y*4045axC$J=pzdB&vg+Y}{Uz;dnfB1%2nXZ98KM1JVV>N>}*4O3m>j!bj% zrmx+iy#ZPEq&>hbEccD7vXnwX47#G2!EH~RWXZ3>dc0MSA{7?h!()FxxQHL~(Y;s~ zBCi$aIyxZ=Syo`ZafljCca%c_BSZ;dlT(|n}xW)X_tzQ-(S3qDun|h zXSZ%Rey9~MB~}eYzWFz!>li6OC3ujPXk47<@nv%_8i&-Gb4xr4w5G>^ zi!-tV!O9zZvpe)+Gu#jk8_ z`foQttz)kK#{Ok<@%*H!YFNco`$s!dqhyR#Oe+!YoLZp*RZ8Lu zix)NPszNmEdoAIpHho!~*Q%wP>eo%v)G$#GrxUmHY`Op6$N;oq{~sP69r^cvd&A+w z{(m12xBqP3|F^OQ>2qbzeytdyz0=nV09vCmuWL-*HkUMP+uzx3IAVjhfI{Leh=JTc| zH{{&zeh1#tIV!I(K|r9vlfol#_TfaB>b++D9%i9z08jH$SQVQP+E^nbl$v`Fsxtjx#1dh&i`k#r zMO3%w9#Sa#n76h-gcb!|zrdxtzSLVM{E{o_*`O9E!OM!J&>ZGzaFHk(1*GTZ76|?q zdW{#@Kh+C1q6>%G;XhT`vDe*zMRQmk$-Jzt7crXpUQM)LS47;1iJXYZkMqetQA{;U z)A!;u6)b z`TstiK>SB_>5l-&B={s>={rW)*?XJH&6gcQ`YTB!~#8b5hG;U4ggNiFUgM3;cm~B+tfR z)o)$mEExlF38}R}6ej;ad*A-uwv9EoKkKi+D&L&O{Va+U^{~9t?&ms54@e^8xS5{lhr|-Wi+eAC`@+QqWRS~Ad5e&-wOKL& z^({j+ClRF5QvC-h3aO+joFysRV6v8ZQiR;C6VTmwUC@;Xl<1=g400j`psp4v{}IkE zA*E`ET>qF7!iqmja3&)#t7V;$|4lBG_ufWKyXH9LRT52_5!5I_> z#dFqn!t&ng-Ylr#bs8yNWZSL3MyLJ$UpA+I+5FdEHa*qLsqedE5ppjtF!ldCic)zR zTp?XttCqK(K?Y}#BA~~=LghM*VnS&%EdMv9(TarV8&xLp(Xmb_7>Oz(Y zOzi?~CtMrM=HUJr&Vmvo@e}d_}e zLYl~L6Zq>Ib$+X@ny(;b<9V40q^E|6kPtHwwI9rt5)v6GLuwof%vq-q=!#j%K{T3> zE&AXy|1tXEE4QYf0~T$|&MbsIc!vR5B@tq%*w-H@@|&U07iAIkPbIDlyz1P!f6JYy z1N=XIGV~(GtkpKqzVjc0aV7s_F!^%+<54~}{-5^m5)x8<6`ejC46>=Q1xvU=0D=%j zaEn5~`FNn4S2=6k*vrcybd5cuykbKJzh>tsf7;`{=T&CAg`$hPQMm+uu>yX%ovec2 zwUzh$9BbFtm#tsN3`ZbY{DNtUV7LXncc7MTxs9MIo?|6d>^fJO)< zU;y}+715O$d&iemPsk+Prfr;+?`835cD|MQ3C`riX@_~rb^qkKNE_+LRW zv)9a_o!!hiDc$(qj7?ib)s?`BYOiP}BEg`mhaFJL1$l#tUueQ z*8W>F9MS$Ssum{x$nsBn>;I1jmHL0fFZG`u=OfPlZ}93=o&muT;?n$^6=zGZM5ppF zn5bmexk7B6#sC6J<_yFnL}$8kYJP7(r>5q%7+XdYhZ{K$F`bbYj zjlAx6XIEYR?|*kyg(RC5Y3ZRSO6a3GN>da*TcI9^;VVv_y*{5=ZR;uv`c zfSx*_hvER~o!J#+!Seb0Bt^2!wz*@gZ!dES1)%wdB;1rH=_$B~jh`i%rySFV;%GJ@UW#ZKr~pbxHzKFtGRhe-{`0B9T((#M>{d}#tz zzEOZ$Q%A8*0wyHX{O|L>V}_fLM?%7qJPgPxAu)~1df^EdyjT-F6Wg*& zc{sCja98^7&Z@v(#l<7TpZ8o)IkB9bc3vfHYcTDo+%z+}VUjp^>lsR8#1M5b>1QvU z%F~uPgDc(D*5<0e%(OZvWsKBq1*$Yh-QALwj$<8(&_YAk5AKV~)NYVYw@V{--Dt6y~wx8^E$wH~zKK7P5?EVhax1X z8ZNOz7TAs@^aX|gQu~*9f z_Qs>J|Hc1*jL%{IzbPBo5`iS;&X7#r1xl1u7J!;Q;=e9VOU#|#Z#!fb5ONSAM zEs<;ux{HX+U?kM$4gpZ?A=7|)uC}g#;bgrUiQM@M3@%Eo_%9y-BiEute%3NC0&^;q zN2w?qH;DqHZeO!<4*rMy7c349l`~MpbS#DEaP@d>4gg zl_t@|yo2Yr!p+qhRQ_(Y*J7uYmWIb$GlV&u9Ybg|`jjK6rvEb%+@TbR#D8#w7MQYh ztF{k;P|V{cqkfHDttSJJ;L6Vn3nD=1fm@)*zqaE`g$(xs!Ri;C&E6Y2!KN}q7 z>rOY4-w#=Y1*{&BgNR!Pknu58p%j?!Rnr}8s_^!~nPnRH`x#V&&mXP)_vn9RrGIMu z?~eTP{SV{O=u7^`qkJ0Z|G#BU1fUGYA$Pjv6tPZyHG_0>y`Cuu(ay-VHDd(dEtn*r{hrePtJ= z{D*oVkd(KDnUw&|hnYD^)+||@m(65ZQI+;tz~L$S6?A*uVv}OAP!0DR(EUgEAKh+E zgh4>LK0kZ)y!YQPu1nBBso0)|mZx;!_dWGOPw+t$s|3o9E9Q6{m3yxRZ6ml4ywI0z z%Wi9!!Z-b=E*W zp`l#c)*r z_GgqpxoiF3!!*Y6;-ez~d)B|_`or@2_lEA5_5T>32J8PvIUN9;ku_7H>y$*12w}s; zu7#h?B-Q=~E_Q_fuLxng)_5&6(?}Ov#N`O^2auu#djA5)A?WtffBYl-&;R&9mvAr| zpUU#tKb~E^xp?#aDY(k10wH2DO8xY=-+&o0A0a7yA8ikZ{-PaMw)STdH-(|$iB0d;1W z#c+k4fUNr2UAeTsB=ZQkf=@~7};QQwxl)ii(?W5$svqaGfi$sry z?_+=bw;cZ&jKA#vKF;R}xP*+MG#1fSIRn7`62)M)#!<+nQUZfJv4hch0>nu{b@Mj` zbcvz}aNkbm{NQ+T3{n(9hBrtQl{bEeaoBkRVx;cydYYtYj^CqD7Pk7IM-C7-g^^gi z$x#9cN zCrQaaQNTJ54iW6j<|+AS$Jx+;gsA`TAVAgnKYw}l=KJTb-hS__!UykT_xc|X#;#Xh z|NfWzpC0G)1e`Bnyg(6I{B@Ro+v#-v3Po7MLy9Ghv6YbdAKZU)qOBLPgRYOi|x_({&uD0O<%k9k_!*&-HrVuvC-_>Xm(rDJa7gj znq8A-U(@^oLB>gjVF7A^SCyDhA!y_ZsbB~TXUjy_$AruuV5ptW8 zcO<~N(`I1Zsg;KVXHd_>fiq~$L$AQYfiu|2L%C5AZMl21PJl?&?7?)AX)#4~!-?bC zC(gjOSO%>Z%b>Ja2F1lP$cV=8In5yn*4$l?J2fO_FjAN3tY9K`Mn&mP%s>KDibUjs z&oS9XFl6iF?)gG`;lq(rmQ zAY6U)2GcslsTCwQ5g_;PW3u6V5YQQ(Md(=NH0zuw$%#Qj!8Wi8HjZ{JC-{TboG9p0 z4$0(1I|pR!HB?}pRe^B?Z8W!3+EZsRD$zVPX>Pg7-G<}rPJ|zF2<*|c89ztUUHq&! z2>656{2Z3}IWqa#&L9{yG=fHUBZwntqq(I)Fm(ogiRPg}vo~!=^SId@8jW|!ih2Wp zKWI(!phUB8(tJ`f0JzZ9CoaR8ENsPvr!0ab={*dUoL+wiz4g`rf6$s25WW)Y4&t3}8Ww9xDw7Qw2c`J_m*H?5^vO=N8tQL;iH#B)(GhKZubV4X%^ zQL*av6 zu{=G8tq5&q9u6lv%tOyKl?uNbh>a?Ut;hxe7)2nW?U z*Q&;BJ$#rVP~1G;biM{bgkZc*WW`x57Op&3D{o-}33pH-m|@oW8qC(KMA6&%8l;G& zc(FjK`U#{mP1!mG<7Phoa6C3Wo)WNO!-+eb?gG}#t{e{i9l#no@Wa7m7qEty4GNg4 zu`0-KF$+VKP_cv0r`=*1q;j{6+&k7eZ!-_QR_0;0xJxdAXPSsLYv=)I)`M`xWd~>8cC9VDl3_P3qfs23=Hlnmi^K<%9u}tC4A55gCx5YIdYYD} zdw}KHUZPnDv{{_34bGB6&&^G*=Ubyc41{RqcSpnkkYM%{HBf1M8;q)Up#cZMzXRbxL8cp~;G} zYmq<}EVVVE9l!|3cgX7g*@9N>V^&3ceG^}6#G*Ji{gcDEr3b`68SV&C*di3I{f1I} zqLx54AWEQ@&y9fvpM~GQ~gJUCte90Q8d4GxUzLKX_@2k)fq z;7y8ycTyZYud>OQVIQn1BddHLQPx`EYC=&$9W{In1=GYTm?oCto3tIiNpbilyN6GS z964=Qm@;@L^YLUd)@zu6C5*#J4X9Enf(PSfrk_8yntl_@1emm)0OMkI(8MwUGVx^k z9e`OOfXx1h0!9^E8m?@6qQ%%^PmSB!Q{$pNH7?py<*9*VWi=%!nIU=4 zw%`E6D@4|EL;fDYJCp*tr3|g8jgER_Xx!Eq8W)YBalsg}Zx5BU�mH8CkW@*kV16 z+geZKqV+T`SWn*gKmv!&%vpbEHD|{b>uKE9dKwoc^tfO>c?U)-e7{+=!uPGYE@O)n z9=Dak1bU{MOoG-17WE4ObpBwDXf5J9}k4#|pDm~4Wtl*sWLY9rsOjm8#9 zJZ>wAM@1)mT#&>D9}ID;{T02v6~V2|Z5dfy>QP&ldQ^0&M+KMKt0t(3s4rM2K$Nm@ zws0lW?fizWq%T}a+dOaRqWjWC&oE^b6<5#8`u(F(+Z^3dQ3;QnvB}HY9BH{Nf0iVY z?uJJJeEU&=kwuk`+N#n~QI(Dgs??sAS{hil;Vf}?%#y*hnKT?sE3sRd86iugh~SBA zE6?NMm@+6%@Y+~hujNN=wfv~4WiYW?DkF;`AGKBFqoN`o6%@H!wN$R9XS~f07RgF_ z+;u)K*wo6@7Mo|fM37*{Ni(4^IN2c->XrVetF^N2I!)eekHFIE3&GchAu ze0TmO&=m*-FT6>!_2x}>P02>TZJfYt;$goOEM;GDYj84Sl|tc;JQ+3?wPp;1B^-CQT9_ELS81bBN`38eB7ypmc@h1(=c(qh=nBH?n#(z9oUn zZ=1m7J0$~lYO8V5m~Y!C$-GXmYfb57}{)|M(T)%KJMu?JoxI_55D@ANT}a766!l8 zi_tU~?ZJ$AqEeNjL2*!qRy67drFG$;Qr)0IaZv1N)DKGgay?~kxQC$O*(yG? zF8ENY_fX`9Ef?Kd#-}YeT*oVxR4KB)h6Uom=wjT*I$(r!v9Uf=c~*aa%hz zZpo=}4X0)gD)qzTwl=xlqRH(VCiiYk>P=p^oyn`>5?;}AadW$u<8orfrQUFL+ZwKJ z(QtKh!DOAD1M3%R+b*^P!xlzq$*EU!FE z-2J#rILdXiRX%8g&7`FFBqRfsJh?|7WP^7Ih^+l`u!15+#o6} zMPWvrh~H-`4#jX5Ay8;BCn@KLjlw!(Y0}nMniLI`Ny$#Ckf&%OktMg>IJv3FQ0@9O zNO4jhAD>w4ok?4JXHv9xCMA2PX3*qD#U_c%nL9Ro>kOkwTf=BlG>j%C!^l#eRJ>(D zqg4cqzc?(SG1|p8C3|2T6DE!ey~32q87_{W$ggr4b7_>MBtVo;b&)=WDWChHc?MxR zX;j%~I2NbI^<9O#`X}J?Gnb|BKV=B`z zL~j?XBqbY>;UxY-AdKa}@+G3Ki4rNpbQ?4H9;?x7lFhJ1$4iIF}_~DY1^MQ*L@1zpD4I&>YIcc3-QlZB-sK zf?KZr8PN(eD>fvT8Rdon#UTnf5pp~lrH4#Mmh6y;#mAYn^>HReA7@hXajMJ|700X_c3dEwef;Qoqh|g!C2o;;?w8odq+RNrI7ITN@)?$7l2niN!5bj2JSgobJl> z!Ag<2TpE~W4#sGQgJHAvTA6xd#~YSM#x(WvYQ^R>y+V|w>ww9k7h{BSAK2 zRX&wNthHXV^ITKgaV|+g4Nv5QmP{#TO-N9+Y{^s<{yGM1iD}lyJ*473GNEx& zB+e?VAdVS|A@43Alz|yy_Xx$(oRHu}5QbYEN|&*83t+IsXv0xl5EyYBXNa%uXIFoB zxJUq3=+`w)g$$sb&fnHEl*Wi5dJ1m8{l;^=vE%mKTha8HArw2E58x`l9`XYaIcOii z4=CkEF8I*-&@(hGe*YkADG)9Har zd4*-LM8Tb~Z-4rAjf1-$Um^@F);L5omvFgQb4a@AuVB1}QUCvnH?H{`e;K&ni+B32 z*L$0wxW|XTe+1?@rOfH{z%@dG%%6V5ci0B`sM7=IIZDqk4M-a1twZ^Pvsm=m5A^cp z<&QTkbY7Bsv_a`HxJT+xsB8?#v5*YvI!7fGg~$|Zn^Pb{)3a@^m-q_;8Ah^% zSqfv6AO05sK(fGr)C!t2AHd%bm+m*)giCkLJ^lg68#m;a3=W&JzAEH<1s%}&V7OQ3 zd3fQ23MYaO;P$uQZ@~v}ouB~Ew*bc5T91r^B}&B^HSUn{hv^nzhE~)8&tb5vcjM@i ztfTBYFe>61cWCQKHIvsn2w)6mGQjTug*A7K3_Q6gpCPWyKM2XFV%zzPp zzei%~@TTH2Issq0`|A{iK-^m_XM;c}@6-uMD1~rZ?%xdQ6|m5DM1}|FhA8~Zf%OzL ziIi~rg8)$~uLO0#1v>!27bKOTHXP5%ai&8V_=!)okOWF|>T8<~cT%V#vQB$K3M+l2 zJQsy|Pcf|j#6b9{o-2-wE`{I&m=VG`aXW_*MSL1PSAnN>99QYj=LL?{-EpC{i%s1m z6{o+q=9Sf815?cVr0R;fygM;rt>9l_${|PczuTXF<{fZFoCBm{O<)vCQ1>{B_#jDt zj1d)A$|j2n;230T^Fs?4c{8oDT8%el_)gq^6X~n;wD74XV1b!!alB3BGL#aL8^3b0 zLGV3hz_?(1wiT!4RplqhrLYJVUSGfDQ_kMABhPe8IYssD=eON1XWI)6!SO3GH3_V zMT#grU@gKJsK!Pxv@Dct-Kg`)HQjL2*6by#1=qZjdy?Mac<~IUMJD&Vre@+WRZ9@! zRBeE(HAxZ_qfi}1F*+8W1qB!K&VF$$N6reEB=Tjg>(zQ*k#)=xxYVmuxDtjWklW9% zc`K8e7%{peq_QYmXp9V0t}a+g)_h`%pVdvRS?vzYmSXu{lJG!PQiFFRnVw;|PoNvn z+llk6r?Mv%q}% zI&p`ii9Zi@JgulgGXxC8tT=}XHK-P@V z07jCMY+(PYr|`F2)P*5{;3Y}%zxcZm_jNcJiE&>1z2xvm6~<7&23&IM1F_1+1|5KMqfz~Un!iNBCg7Oa`JrPx^VrO z@szuKp%IYOb=_;hhLFJ;c==nRfk>u|St(Ah(h5Th#(RB33i5ixubQhwI$q9qo|_+T-nKa$;-a3;6oAXhY+nuOc5*hXb-NbJWfTOZeM=i z%BK2;hftMYjL?Rl6p8FyjuN*NK7d<~_wi;eO16?Y2oc5H_e)4ft1oXb#Uy@-DVKk* z@JhtG6(C>4m?ivcag;)~220r-M6!JeCJ`wQ??l>}lfaZ=Dd7#N7vo4X!XOe{nXdxl z)m=T%b-F+{=s7n_z*q1+P;c%6zK-Dr;z-PlHeD3nFLuOjJBAip8{FbV1nXpx!VrP% zHSW7V%lf9r+#<%Ib`iKedZn*wda7jhk%&5E>I^fG3MSp=l#3u@3JgNL+gs2X1l_bj}1L* z7LgUi#Z;0}Vlnq7r6ocotJO$$Pk)jRyQf`I*Rp%u6_c-f+V#4>|9sq~2&Taj(QI7w zz8iS<=9-TRCx;$qCZ*1}l2tNgH(&*~AVri!8w6q+5puUqbYP#v@^F9=)S!s16E%Co znAX^#YOOxgNd}C7?s>GP45cq{N?8}+xrnm7$#xNd(9&WV6`KBt+47}qS@#xKQ4$lW zq?CL83deWUZUXd``j^LRWq~IZWUz;K^SgN(Ih*ROp4u?M@uIK70zH_><0E{id#Yjo zi42@`@02Z({`pAJSQjLE4RKtLw*zh}M$@%81f*rfDL6X-n>Z3N__*sar9V--z(}}KfFmIo1K8-jmSY! z@7K3^&rlk}=ptq)ox=cCy}ox8sU#b$PH#fSM1qJ2`*V{`t$VD2I65(qukCx7qEjHU zYi8R-mW94Mq1hzRc%<;G&gm2mB7cB$!J`dCm@Y(IODrTVKa`$uz-5+zq(z!Uk;^OI z-y$M27&-HG6mg-Dxg$H&B#IeMk;p~o{opt^8x%B5mGG@D7PHwQ9l{t8-9%F$?-0%Q zF%{|pGGEG~wzOsZ%;(C+RySv%n59_$+D9zt^Oh9!zzQY_N9*E}w@wjNukz+KA?big%JvGnr*Td%OQcn z8`@hJ->&stY6bI2JQ9|ZjKO5BpyU9bqzKY2NN{kco#weXqNz7hxf6X1@G2oGgE6zL zOr6@W*Td(ps>W!qlb<(i>*KE=j=$1y91~TCKT-EB>x}wZ4l+{&>dCGOT$O(M)V~gC)dqZw4t2xA5eW>CmN#(C$OUn%mj&7e z(`)13SQ1o7-e-svg49x#ujkwZ+r#!sM=~9LTcZqKbHhZuEiF9RPD^dMvx#GQp(8!! z>xch`Sl~F$kpnJ-Etn#X%t{7BU<^DB;Mg#H1kNOmw)tc67EJF@2%yf{-`1edqUw~$ z_3+KB>rDG*EclMFrOKjwqc8QArX?3Jsv?Fyouq|Nq3fM-3$x8W&EGK4P}G>19h_ue zYP=`AzR=p9R)4cZWeCDLQJIbmr7IlE2};rsrTY`{BRogJHYlgT{C-<8uJV?e#e6oD zwq*3(e-?91KQ`_$sBX!rM$S5|^JRl#cudS_7)xVQI{3nz;!6YEixii4SFf&l(=|m# z`Wz?V*>{o&I>m42eqx?KXx~jN0J82So{5X@E8AwJM8mShUxeLY15v-Yufu95m5oC& ziJ0Cv9J!;=ANno|CxI6Z{W%J~lW-P#-efYHj8QNf&jWul_B?+U4871FhH&7!!O$JR z;mK&U4}k)0F&fLtCEOuH>~oxKu7ICl}tOQ6tAgB76O>q+2;^uMJy$4z7%AH6xPRK(|?aW_LoH+CZzLAmV$w;fg7E_;6Y!+Fu$GGtW^LUWP^sNx*RTsiSf zr&5SId;+@Y_D60h#Palkuv2sxG1bo0{frFNXC34OL^#ql(bZ&+FPz;?du(%M^!U?_4B zYi6Zh?s#qzRms2w97c~D>(*W<{#R)xOsCWDah3oM<-m}6cAbePCPlxl5oH-g#+qRJ zXe(S>Rp+FtzGQ=9siq9}#au*S`9$d59)oZj!xawXp<0SbtghVASz?73vYUKvj|+K1 z*~=)c3Gt{QG$B#4Lh^PW6j3CBiPJ>ItGUcK*RcruqYykbx;_#sNdk@6QN*3J>diu2 zm2zO>5SyqJptlceD6q4CJ+m#ycgj-?Nc>M-a6>rJw*^Ud>!>-%Z3YPFde##m2^>?s z0J5k>m@nz9z7}^*L~$z%hSh!dWE1EO_o@UI%_}?Zr}?#_$Li0Qm&YL41jhia61IJY z(_`gb9_Lv?$9a)3u1DnlMm?S@nCP&ZO+P(XkI7sddew<%tL&iIPN;t#>1h%r8C6w6 ztF3I?TfwAi;~UB^=cD4eJnW#w-hK=|wQv=arl$t^kclB@nPpZO(Ebz?!ldUBN5YW+ zI8t+YP*uk_~6NZonMLmIBOus zFPo?ehflH~YP$Qp*M))b=de5sbUyhiG5RVlmTZDN_>z$pY9m8a6`rWKCyMYK0ktb$X+n%U_ z*I;htr&TbEnVvO6Ps^z2~!c6tB+J> zsl?iy)17e7oWGjYW-Jtaryr#|L|-9JtGYvC>#R_S*R{buz4@+MFao--(Tb$oZa&{2 zV5?+K!PBd=*S#4G?ocShms`rv>d5q>#n`D(i3YiZ4Dh$qCIJa+qA&_iivNZ5DT=zd zBnNPNjsJxtj^7Dfq)|+7!5l$Rwt2yaKpc!!=SjC@Edr8MZ)yS&WD?oj0uWGCDUMe0 zV`ybRn$>#Dg|tGegvg>9if?s&*NvbasLyB^1*)IzAj(^i?Fo3F+1gd;e*TMBBltbl8r6BqFGE%du!R+_49le%Jo;Vei|C=+_h?>$};Q{L&$Y!2fR{v8P& zC1CAxI*hLB^Et}BG)U>lU)|qrU02nb2;R`~99O4voXo=j&W9(1U_Km8(AXV$GZ&rA zyyy4zb5Q)WdLh^T{8 zPPp&(yHdYH@bc#7QoX733iRP-Ar1NSKL6)BJ0EvsWRB~1>UyQ6?U8bQW$}EDk-Wo@ zk2TGsb=6WX1$H?)-Gz$uG8BSaIX0)_*yydgeL+HBk|?AamOdt@1at{%9UbK@o#)PSWT(%!q8JlbZ+c}qfL3Ow?(CqsNecwjKzY=8 zsXKk(S!r_W!RBNUXblk$J|9Ji(cOk+RycKsS!n`lX;c>LtX53QLJv(0O7-Ht4y&D1 zP04{{RA}=i9&%5@APl{59Jtfjd_Emc1Ah{r;e0q5jb~GYT+biOPr{So*!QL<<2i(b zfj=4#U`=9h2_bDqrZZ@rw>nw_)XC;663Ih2#`o`V9O`q)9F`O0&vv`uRj1hOrVgI! z>m$JK!d5-o>BOH^{r>}@e+1YZUW-)aCPOD`H(F4<63=!aN7w2u;+nc-VF08*fIEF!x?P{hd#Jfx}On09c67N5vtDPcB)@e{F=p$-V(eCMQ z-5^XrU6pfdwDgMYM(%6e{k;$?(S7QKT?+cL78bRf z$C9Y3lAI{Dd6w0Z1(^cK-UV4@3B5&JVRKd%gb|RCWF1L)quOWZHpb05n7<B*@sX{TcRKDS`u#9_O>ezk z5yD<%ab{gV+PrO6{?;TgS93y7A4xu_ph8xZWlxkhYxi;G6!hV06H!~OgQ7iI6_**E zWl%VI0arM}H3yryd504)*U!a-%s0Aa>i1h+-{<0TGd$-1j;)<+>&%;L94{ht&0ug> z(d{@<#*ERA(f$}*ihS&6YZ$2?)S>R|mntp~eBQyzSXmhUpm}v|o{PuvoTMu$%_}oY z0&P33mW(C4rj>x+c819k06Rd&Bt(~%Ist_o4&6>>O6j%sioozY7{NF|sgQMVbUQr+ z+ZZzZ^bDYUGZM|$L9Rf;z{Ln<+{#rnoB#jw}}8O20suR*i;#;KHHy z)5w_;%Hk$j+cK2up(5phTwE45`AsQlYSUE`p{HE9&XjOHIxfiCW01i+&SkEF#+i0q zb~@WNeopcI)+L~`Rc{Bas&iVi`M7m+zeIe@jfJcM<|dDJ+G@J6T-0z=NlGljmX4L9 zuk4~o-mI(;R)r^zfxP9Ne^){ag(^P9%xZU8p&|pphHG%AjVr*i5XW__e5MO-Vg_9sr3$v%s<|demMoj=8rYn&=FI7@<%) zI0_^J0wCwrHs1-{WhG>1{fvh_nBYFQ6e0q{Ugr7s6B70|UjIo}7UbyX3PCIGT`!O= zL$_!XinuIf$_W>vtnRhWf%cxagL-Razl%8Jx(|UR zxj&q|d~s?&JFF{He9L`FWk|e$Q8a_W-3@s~7W8fWJWWY@`?!oDkup81ZdYati+e}R zmLGfhh=3?A8p)xmO=?CG5|PFBI^hoZd3Ntf6+L}PitUXyH>GIa36@E|Y4ANN;P>*Y zSoFR+W3~C&jm6N-&EJbcNG5`b6TvrGsi2y|p_U`Xr9#`MW+m)fqgFJIL%hM^8b;ia zy3J9bogYSiK>Uo3F1Wv{x{_N8SIgL#Gda`TySg|6O-DaZC6A4<>^z_y0f2 zr`PLsmN-PG9RPZOk)XqW={(6}(%iG#V07Q<{58Vy9ayGl{!Lda$y^#bBwh4>;i>}% zeU{?Q)(I%>3is`sE<^8GUwltd^i7wtZG`9&A=U-`Z^Z@sFHyAW2|>fZK6&y4Tn8}b z(r6tq+UayUAHW*|USnEN6I=_e<4_k`=aTlcx9{^o^q80T(>-!kEcW%yN441e(c|{z a^X2p9^X2ogpZ^~K0RR8&vX@!_yaNFJzv0vX literal 0 HcmV?d00001 diff --git a/stable/shlink-web-client/1.0.0/helm-values.md b/stable/shlink-web-client/1.0.0/helm-values.md new file mode 100644 index 00000000000..b292a2eef9f --- /dev/null +++ b/stable/shlink-web-client/1.0.0/helm-values.md @@ -0,0 +1,26 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env | object | `{}` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/shlink-web-client"` | | +| image.tag | string | `"v3.5.1@sha256:ac87f7c16d1c4a94c9d97a24cc40a70fce0cdd43ebde9013e3bde15f0d55806b"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `10154` | | +| service.main.ports.main.protocol | string | `"HTTP"` | | +| service.main.ports.main.targetPort | int | `80` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/shlink-web-client/1.0.0/ix_values.yaml b/stable/shlink-web-client/1.0.0/ix_values.yaml new file mode 100644 index 00000000000..09da477c022 --- /dev/null +++ b/stable/shlink-web-client/1.0.0/ix_values.yaml @@ -0,0 +1,22 @@ +image: + repository: tccr.io/truecharts/shlink-web-client + pullPolicy: IfNotPresent + tag: v3.5.1@sha256:ac87f7c16d1c4a94c9d97a24cc40a70fce0cdd43ebde9013e3bde15f0d55806b + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + targetPort: 80 + port: 10154 + protocol: HTTP + +env: {} diff --git a/stable/shlink-web-client/1.0.0/questions.yaml b/stable/shlink-web-client/1.0.0/questions.yaml new file mode 100644 index 00000000000..a9c8cb51264 --- /dev/null +++ b/stable/shlink-web-client/1.0.0/questions.yaml @@ -0,0 +1,2166 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: SHLINK_SERVER_URL + label: "Server URL" + description: "The fully qualified URL for the Shlink server." + schema: + type: string + default: "" + - variable: SHLINK_SERVER_API_KEY + label: "API Key" + description: "The API key. You can create API Key by opening a shell to shlink server and executing 'shlink api-key:generate' " + schema: + type: string + default: "" + - variable: SHLINK_SERVER_NAME + label: "Server Name" + description: "The name to be displayed. Defaults to Shlink if not provided." + schema: + type: string + default: "" + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 80 + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10154 + required: true + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/shlink-web-client/1.0.0/security.md b/stable/shlink-web-client/1.0.0/security.md new file mode 100644 index 00000000000..9c5a608fd69 --- /dev/null +++ b/stable/shlink-web-client/1.0.0/security.md @@ -0,0 +1,83 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: shlink-web-client/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |

Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-shlink-web-client' of Deployment 'RELEASE-NAME-shlink-web-client' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-shlink-web-client' of Deployment 'RELEASE-NAME-shlink-web-client' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-shlink-web-client' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-shlink-web-client' of Deployment 'RELEASE-NAME-shlink-web-client' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-shlink-web-client' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-shlink-web-client' of Deployment 'RELEASE-NAME-shlink-web-client' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-shlink-web-client' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-shlink-web-client' of Deployment 'RELEASE-NAME-shlink-web-client' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-shlink-web-client' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-shlink-web-client' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/shlink-web-client:v3.5.1@sha256:ac87f7c16d1c4a94c9d97a24cc40a70fce0cdd43ebde9013e3bde15f0d55806b + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/shlink-web-client:v3.5.1@sha256:ac87f7c16d1c4a94c9d97a24cc40a70fce0cdd43ebde9013e3bde15f0d55806b (alpine 3.15.0) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/shlink-web-client/1.0.0/templates/common.yaml b/stable/shlink-web-client/1.0.0/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/shlink-web-client/1.0.0/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/shlink-web-client/1.0.0/values.yaml b/stable/shlink-web-client/1.0.0/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/shlink-web-client/item.yaml b/stable/shlink-web-client/item.yaml new file mode 100644 index 00000000000..9bd0103be81 --- /dev/null +++ b/stable/shlink-web-client/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/shlink-web-client-icon.png +categories: +- utilities + diff --git a/stable/shlink/1.0.0/CHANGELOG.md b/stable/shlink/1.0.0/CHANGELOG.md new file mode 100644 index 00000000000..a204483239f --- /dev/null +++ b/stable/shlink/1.0.0/CHANGELOG.md @@ -0,0 +1,95 @@ +# Changelog
+ + + +### [shlink-1.0.0](https://github.com/truecharts/apps/compare/shlink-0.0.9...shlink-1.0.0) (2022-01-19) + +#### Feat + +* move it to stable ([#1743](https://github.com/truecharts/apps/issues/1743)) + + + + +### [shlink-0.0.9](https://github.com/truecharts/apps/compare/shlink-0.0.8...shlink-0.0.9) (2022-01-18) + +#### Chore + +* update helm general non-major helm releases ([#1732](https://github.com/truecharts/apps/issues/1732)) + + + + +### [shlink-0.0.8](https://github.com/truecharts/apps/compare/shlink-0.0.7...shlink-0.0.8) (2022-01-13) + +#### Chore + +* update helm general non-major helm releases ([#1712](https://github.com/truecharts/apps/issues/1712)) + +#### Feat + +* expose capabilities in GUI ([#1709](https://github.com/truecharts/apps/issues/1709)) + + + + +### [shlink-0.0.7](https://github.com/truecharts/apps/compare/shlink-0.0.6...shlink-0.0.7) (2022-01-12) + +#### Chore + +* update helm general non-major helm releases ([#1704](https://github.com/truecharts/apps/issues/1704)) + + + + +### [shlink-0.0.6](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.4...shlink-0.0.6) (2022-01-11) + +#### Chore + +* update helm general non-major helm releases ([#1693](https://github.com/truecharts/apps/issues/1693)) + + + + +### [shlink-0.0.5](https://github.com/truecharts/apps/compare/shlink-0.0.4...shlink-0.0.5) (2022-01-10) + +#### Feat + +* add some gui options ([#1682](https://github.com/truecharts/apps/issues/1682)) +* add probes on health endpoint ([#1672](https://github.com/truecharts/apps/issues/1672)) + + + + +### [shlink-0.0.4](https://github.com/truecharts/apps/compare/shlink-web-client-0.0.2...shlink-0.0.4) (2022-01-04) + +#### Chore + +* update helm general non-major helm releases + + + + +### [shlink-0.0.3](https://github.com/truecharts/apps/compare/shlink-0.0.2...shlink-0.0.3) (2021-12-28) + +#### Chore + +* update helm general non-major helm releases ([#1623](https://github.com/truecharts/apps/issues/1623)) + + + + +### [shlink-0.0.2](https://github.com/truecharts/apps/compare/shlink-0.0.1...shlink-0.0.2) (2021-12-28) + +#### Fix + +* protocol is `HTTP` ([#1619](https://github.com/truecharts/apps/issues/1619)) + + + + +### shlink-0.0.1 (2021-12-27) + +#### Feat + +* Add shlink ([#1616](https://github.com/truecharts/apps/issues/1616)) diff --git a/stable/shlink/1.0.0/CONFIG.md b/stable/shlink/1.0.0/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/shlink/1.0.0/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/shlink/1.0.0/Chart.lock b/stable/shlink/1.0.0/Chart.lock new file mode 100644 index 00000000000..d7e9da91165 --- /dev/null +++ b/stable/shlink/1.0.0/Chart.lock @@ -0,0 +1,12 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.13.1 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.51 +- name: redis + repository: https://truecharts.org/ + version: 1.0.56 +digest: sha256:06c2f6050a52eeb5f706a3a0e27068ad9a66a49c67d35060e7b0649d98fb9726 +generated: "2022-01-19T23:36:41.785836468Z" diff --git a/stable/shlink/1.0.0/Chart.yaml b/stable/shlink/1.0.0/Chart.yaml new file mode 100644 index 00000000000..598cdb9ce0f --- /dev/null +++ b/stable/shlink/1.0.0/Chart.yaml @@ -0,0 +1,36 @@ +apiVersion: v2 +appVersion: "2.10.2" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.13.1 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.51 +- condition: redis.enabled + name: redis + repository: https://truecharts.org/ + version: 1.0.56 +deprecated: false +description: A PHP-based self-hosted URL shortener that can be used to serve shortened URLs under your own custom domain. +home: https://github.com/truecharts/apps/tree/master/charts/stable/shlink +icon: https://truecharts.org/_static/img/appicons/shlink-icon.png +keywords: +- url +- shortener +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: shlink +sources: +- https://github.com/shlinkio/shlink +type: application +version: 1.0.0 +annotations: + truecharts.org/catagories: | + - utilities + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/shlink/1.0.0/README.md b/stable/shlink/1.0.0/README.md new file mode 100644 index 00000000000..204d1df7e29 --- /dev/null +++ b/stable/shlink/1.0.0/README.md @@ -0,0 +1,39 @@ +# Introduction + +A PHP-based self-hosted URL shortener that can be used to serve shortened URLs under your own custom domain. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.51 | +| https://truecharts.org/ | redis | 1.0.56 | +| https://truecharts.org | common | 8.13.1 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/shlink/1.0.0/app-readme.md b/stable/shlink/1.0.0/app-readme.md new file mode 100644 index 00000000000..1fb9215b358 --- /dev/null +++ b/stable/shlink/1.0.0/app-readme.md @@ -0,0 +1,3 @@ +A PHP-based self-hosted URL shortener that can be used to serve shortened URLs under your own custom domain. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/shlink/1.0.0/charts/common-8.13.1.tgz b/stable/shlink/1.0.0/charts/common-8.13.1.tgz new file mode 100644 index 0000000000000000000000000000000000000000..4ef8fa8338cacde4482dd452cd0ecfa212769f58 GIT binary patch literal 40150 zcmV)eK&HPRiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UI68mpQ{cy>Z`-}m)3TgsH*?qRq`Pw_aeQJYefKvz zCxJ*v!k8l21SCh3&Ue2D?*~Cj@~auU{UCwDWr(dR)R=e;)3#bKP@YdcZTVFIqAgtqD#vqig}qXEDF-4B|_Z=Bovih`CgD>3&*S>1p=-h zg(c|-P)mZ!IL|1`D2KZ29*u^*-qGP<>k_T6@-iXgRvVbcT5W}Co4;tafo$e-IYGLs z-~RP^ztbOedhOn~tp&sxg*Zbc2Zk09r(=M#Y5v~^a3?QkEdVme`fCjU0LwBp=zA4J zaftz47ig@|YpoP6PdojCPQP_e^Do!`3Z_d$?uY?2uK#}Tus7=Y>;I_#u>SAmc?8;R z@U}qNhqF^a3KZihjzOGfQ#@OikgfIBBkbbpzyziFRVy!0wkon$3phjL z762U9Ift50OAy*i~`IGwg4zmkrPbway&M-|-g3w_%q^hV1HI~ZdYwUU(CGav~S$uF5qv3RTbU2zk zL#Wq37)+lgPluy}{z0>Gsh?04p(_Keb)vF&}4SCDaRpmFs zs%I95y~E^Sc+f-1QQS|42UC>vpC*%}-#l@ZMx{FnkKp!7v`7qv5l|VH`h$ zPY;6}qT2jUR1DJsXK2@v7Paa}`B*^Ra)1T2O>mrHJ?Qi;)-dcnJ3M$cgp&zG&w5Ab z*>KXIGPa8b2^z)2>7dt#hm&VVz2V`}!C-h0!>4G{A0?BgaWXlIH#WT++sz4`m5BVZ zJLAFQkWcxq=`u~3G9p!&x3aVYg_T1Y#U{E&>f?&f1*iUOuIb@=xWFvSVTxnfEHEE$4D zny(iqqfbBr(IU?Xq988;p^&2KG9`%Z4MOiSg`JU065d0Y0+?kvg#vn>aXd_&t_8BI z+iC&3)@w}Y82tSo0=`rgNxndG;2!}1xZWk+@;_}{ZjQkieEC|_yA)1Px(irQ;ii4M zX0vujPM3=bDj6Xsh~N?>pvV&A}ULQ6=|Y|V@QkeA?vMut3L zeZYz6iJ+}_C@vAC2<%CYwGUvHfOmPC;%xT5NFbGT$zYw!-khT#u(#O@lp>0%APjf` z>;)eR1_t0+mX~blV8XsB{MphfZ4m5*)qOL@UP}x387wonf;eSMkJqw(?*fJ_%b5Vc z|MIF@Q|r|&U`Z820p^$H7VpH2G9V>dVS@7v%rRjc9;A4IDW7%m;V1F_HG4e<2dx%% zwhqBm%?{yi7j7xT`Q7)mELm=Ne6s@QC`B>NO90a}zapFgBS_Yu!0{!{W&nZ&Pp7Cf zierLf`UK!bk(U%^RP$`kPQj1wUy05r$YT)k-%(38teCK*^~C~a$sXC)aMUKtmH{_x zwPYc_lmjqeIU^0V*=MWjagvA{IMXZ!&|E=U@-+q6^iS3bTBr30oRxS1OPsC)9Y&vN z36I@&)M_qxy*1#&m1+~@>G8P$&=Mc~O=pHOBm@t&3rYY&C|SV5-iO2B&amGXm!u!YT$ropNNylI`8d(F{ zyyF#l(kk-gIIyb)_SW12ITaXRAQA~*< zC;3XR7Jr2T4bx(>C(=B?ZDv<_c_{=eEgx`A9*f~h;!1I!piUV;)W*m%hL zz}rI3pxnZr03`pFFWTZa6G(Z*3$ER=wHt(vlw^?N7;~{jyb)s7mQ`famT2~#2+af} zxI{5c*8oxqx@oNWth;YNhLZDUEb%HZR}H2?2Btxy((Ft-rF}24!)%F4)30 zLj4o5|L}d1i=tDeu`>OPDVUEq8D#58o~#7|Fpe2z$)#hRL4zqyQKu!4)yn_b@%j1B zZ{NKbgT=bdNaQLn6WQH2kV{7^T;>_qQnh5>0T*&-Gt$!|aK6qc{H)AJFJ8VmdwqQI^5ci&*Y97BK@{kwsL8~DI@~$ldzMbK&oO$D zUu9RYOu+HkD^{6tXXO%cxtyRfLllt?&bvt-lP-nil5}y#wu5#8DQv@n%a3ewy4I|= z)vUJB=OQPlUF1m{XVbh~h_bAg9~f$UB2-^b-@bVH@$~r3OSQ(P7^TTOG&O6Ezd7Uj z8(RmREKd*{g;q<=s!}e5w)h4XyuPTd{5sf|_5v1dsdu#HdaD!_uXV9DI1%b!QR2MB zbPeJZ5}|?{V*zD5DJSlUFdCD1j*=yl?Nz-KR_&BG0UiOeCKN5&tS{}j#9U8Q%7QRX z$Tjb%pc*R2wWWV*u<+`VO>R4Z*$kEWlC%vXb^i*unU;!@?AWSsiyb4i}WJK+iIrt{N{OHTM&njv!6mN=xuBsWnIaNNNS* zfKBbZ1i><%BU=yTVHE}1VW!HHJketiFm&5UcR5^L_ns>Ws`Df2>(F-&YLoe_|^ zxlFbWWb;~1J`+Zaa~C^qDqd#C!pa}eJ_Abxq8%!3E#`E2ShT3IRPaD@P7+~O(&mxv2>7jxvpV4sArkSKeU zaBnITRCd5mD7B;#5F7gMv|J=>dScn`;;lOrs?^l4CM*rCAg*U+K0%d3>2`Y?{v(7I zRab~28ei*uidQIOiW(zS%>N=3mULOP3)Vd8?l*ZLO_XNPZiCkn6et3Cvoc{Q04N-+ zlbM(1BsO)xwuC6_9>+T8X+o*^#6Epun;zScuP~W&rYL8Boi9s1NecLxhAmj0S$`5X zL6j(GqzU5M7Pw-v0Mj-+E4e|`?Q?W-au&6WvUYKDW*T@k1rYpnad9SFz(lZerNi^( z%D#8mf6n!Ov@g0`Ksr}-LQQugd5XnkNcBtG^4PctAyW}GvGp(iti>6%js*2;DrKJ( z#Z2+~q(+j@#1nz0Xk(tI2~iN`slD2Vg0Sl-2XM^CQXb%tVEO{3aD9&AJWI$J^n3Da zflACb9q&EG3zRRZ{%|PYPa#g1CAyfGh%kiN7jyKNKzuD)*UKzS?E3SaP`ifyK<>Mc zyE|;ROz&afzc+$E7kk3a>&XVEZ}FnSS}b=huWhQxxKr!>QOl_gBG zMPQy^ZQl`dim8mkNu4|0C#Fq(;x>;@KfpAd!1(eaf1S_B+w5go=H;i~Xc&~!jcojd zWRn1AhSJ124ag7@bf?AwfmsP-G+n0Y`kt`oxbs%eD*J`6KU%tvVpBUEei3E7klqj> z{d5E1;{Xa$r-Df$?EMT)>B*#3IHpPxyuc|el|}zsMv~tuFdMNRbKe1+Rra##v7M|D z*wRehH}Fy&fmlvM>L7iO?-4i?n+AEpwj*wNr*Ws#*|(T8KgnP_#6tMr!3^{jm?xH9 zlAo32S-Li#c`aC8qJ-(Y5(NQT{-|K>`1c4y>2f;7p9Ofew~494#2E=OO5#HC<`L7$9(|LZl; zx|SDgeU~JthTf!(PeEmyv|vfgCwChI)~SkQ4Vy#?R?Q5M)nm)e9T)PLx?@vOHcQbt zh4JMRaK>5fizQ6ui+7?k`VEJRiyzdIM?K{V#I41Yz>ojsDp#ZxI?+Alb3Ytm1SIu^@HYdo_4Hn=gWe_unxyRF)icM z6Y=jk`{Ux|Oo~zOUz~lis|$sMeUhq40k1LunSNtDzOn?&5H) zbIM}%ULZW?(7i5cGp*t9-0_Zg)zkgN5u~#n@Lr2k>p23}F$@3FacB3F0sV>1n7j^z z5~T}>XnE1}BX1^Fzg-Ot%ki9J#`J@nG&TMRNk^<^D2D@|cKu84)w zp@%W=%~Bz^)z@<{@!4Wr61XS*{rw*;tJPXzRhHRCS~W#)Cay|2_2Q~>f7)JLRYTyg zQ|)2a$V-(k_YLJ$?LHRfrK*)Xmsj=RHVLfy^f*_yUSOu3jKBgXNqPlKWRK?$_%ll0 zurG*zs^H0KJD-Z$qKx7(w1jAiFYPavPl-71E?|t56E9rSTzlI~$ig?40GL@~qj9gY zVKOEFivltIl)-1eWz(iD?G0sWijT5Ab7w-2t8<{NaW(5=kD!9P{q8&HFdXwG1>BQH zx)>}}>nKawOCop0sXw-oqqNyt#94a+368Cyw$|jIV$>HlS*Ziy->0ggwi0*iP>YT` z6^%hQ!`bJWqBJFK7<2b;wt%8Pxbkz$YLilm<$!W;t8EzFBc;X=+b4$y9eO6T4GW<5 zvx@jc$tigB$lDp`IiY4(w09W(#Vk^R`cFCGcWF3M?wPsTFS*yPCI5&^NPNF-OZUD` zn#V9TGK-H?0qNWz#Q+#-lzlS#hr#R&(s>7LhZ4}1_^$I#SVZ|=kud3%33yh7C-B$j zpx@~a+r0`T;V*s0Z$~>HEu&PWCADce#wfA-X;Yyg1=frQML4`|4Veqb+d;O}7f+nJ zczy1ZO9yrhRbro_TXT_=&g z$Xttn+&xO4fw+5Gj7o~9+}f>~4B)q#PEbjmvn-eVwLf);h<$OhV6;Lg8{q~)_`UT0 zlDBMNX0sL62PB-O*fuAyXK)tzGNWvheSiKvNRaSozmZgJVOy1~MGLip^>#hIE9AV^ zgBWTj+b!gNtL$|Je*xlKknx!82`rl^?Z#BLvSDm+^UetuZOzCa`xdwlKh|0?yWnW>V@U?w@$>X zPLg%_Q8_0aGfFH{boSxoiTv}YvnQZf#ZLfQ6my8erRl{!{nA7&;&G=|?(8A4T=QetIH{O0RZS^4s>ea`z;5OOqva zSBZH4hG8Tc51cmqCucCU_X%ks={Myn$G!Mj+7t)a)wtZ14Q&nbgEi^nQ_xCO2D3l#y%%a0Xkcz z=@XFU4kRv)a`zg3%*ocyJlB?rP;W$=HVmOgwQW+D-ZocIT%s<~lHcn9=rbmqLgN(T z#S=5>(!EB1XA95KPOOt2Rp^Al;Ek{IW!dH+EgarUQ(l~B|5O2Wx$)wY1K?A~x|j|D zSx(x*St%omEVWLMm<6kBCUIiI!MgWnRFU^pAJg;xWH6 z@g}z;N+||OJ<@$+OpLh{>A9RNZu>3r1nDJYjPMibS|+DY%xi+m|099!WE>YTx(36x zz>uiBA8m#O5vFmdyEX>z5KMk9F-32g=xVxuF-HIj=9o`4j;a@I<3Yq6CDe`$!T&;I z@a);MAF&25j0!ndVgyApCM&LSd^iEiBG14l9&BWpvB`yL`bjb_R?xo(f1>pgwfQK@ zV3RS2C6ia^6+#(+sqL2EvPOBALDnP7+e>h{-|Vl*P)NqE$fFfFvH2;?eXidXl>-Ku z1xoOeTQ4IKIU+K<83c4uObOU~cl@S3f$=4qCw)<5U#%DkRD08jDOP~lOtZQ~pZUl= ziGSy-N;K@U8h$8sj{k+k$M1RTAH;}#0#gJjTP8CZuR)H-6V9Pxn5n(f9M$1}iS@VO z;DGFnoB~5*G71uS1p0!~{t%?Gf@PY|$TewW1PSE?Vm zcF@e#S$>sdg$wF$NV&q|vjqVw)6h)`SoHYz$ymXCAm-nUnB^@fL&LR}W?rzpP(kb( z$j-7X{(((>R)6o#;P--?sf0;R%)|!?vOqDn^4!1{p?Hh1If!4Z1I{^$whoW=E1)c0 z!ay+`^sG<93cpylRnU+cx>Cnh+mMzjt4>Qd(U)_|RP~OuOlSrTVT5NCVy21L7avY# zw@g5tKQR5?HTec-Tpq1&o^Bb4XuG)KU840EED0+0;SY67y7Tp4VKEFg)WAI-%qiBZ8 zzjE?W75~Q8>VFYh;%p|qT+LDTJ|mD~GUcJSyzl%-+)Uel2~Pc2FSHNkgFy3C-Z&w* zFlQVlpC1F4kAZH)3pdK-^Wzjlg0$m{l-f{6ODx`Y5skaTpN)-HQ82du>P$I8ib5&^ z-K|6(gGths2()R=X%Nx4&2eZmj>rFOLxFjBzh(79&nqshsGj{!ztK^E zHDmm3hlgxpGa~lgxLA(Cu-EG?q;YYtHQn-WXsB|pFELKD2b7D=y;-YOy(u9^E2uMMzWxN z7pFOorzlr{TU0h^bWd?`kf4lWC_JcSTt#KqVU3+T7wY+{Yr}mFg9)NEpjR^loWj`x2KyZR$Xr+m;tXfYR{c9=8qU~Rjmk7yT>dkuu9QWJX>6F0p0YQ! zxm83&I8SgX(jr){Vree#(9;|grD(*N3Um|t1Ka=SD05M!GA}+bnQFM(sBp1_MWF)Fie;fL zVluWWEJ7;1#c{;3ybCdcJe*TnjwB%J-0<(Xfp&HiC&?yCY(w zPjViAU#&AHG;;S?uG`5rFA>wyFA-sM6f+S{g$uD-7p?g?yi|^^(k>_$BzqI?jfgBP zWP0?u;Avv8GW!-HPpRg?2zAsEYg-6d+U%Qb56W|nsc z7sxC#V(L0gH);d-WLfRdomb9KcfImjd+Al(=G;vt(~0AaKxSmJG@l8x51HdahZjim zOT2@i)+{fn_M4<7jpMeW64+i+(y)VK(lw5mT%iWP-rn zzkAJk{W`zI`~xEn*V*Di-zw*{Gt<|{gajaKxv*s~(p=pR(wD}iki#l;zw599L493z z+)9?v+ihLwl>gScDDx#F0scDEIYM~Cjw?*(T;@2-lUrLG3Wuh(q4B&6H9`Zw&BdXC zUTbma+IMSXc=V_xqvH~D^d^D>^Sd`pC=*RG45r+Kn^6_iB|!zsn8=0^VW4EL0+S(L z7g+C{P(PU9Q{6h!(pNHxOO%jE(R}P?KH)KhU?$QU3ue#hD$6O7S2EwfdwnjGR9ZU% zn}QeLGvZyAsdeD?4keiE-mQ{V+pb5v=>2wT!RR`f?A|R|al4Mm!uQp+zdSsDsz>Z( zU7bFq`_Uv2KFbr6KDa}R^qOt-dcEFgIOPBKdOiQ&!NKV8Fa2Tvs6XrtdcDKH^aj1b zLH{qHcguYZK1)Jj`Ip{}+wwd22YJ4H>3-MZJCzRgz!fKXIy*_1s3@__Nk2EarHfod z<`TpqJ-TEpBv_gp$tKaTD>HRk-*vx!ZGHKoy_zCXpffLE1lnJjkifp;Dd>C(!))eaX_LaYWZMEC&7A&w-x5mK2uDcpc z5QY8LCC-vDs99011)@;6B`HtNFJDY2IC@gA)QI|+iSG=fUqOc1E zcQW5001nngLAtBHJYi$le)&?Z* zsJ;YX=NqpBV9Hnk4kQ3XOB~z7945Nv6y|C;+S0W2P9EqhWkUWms=dq_SuFJ%(ZKNv zm2ifvMmCJ@CX85@P?p#~8++K0eEpi8T$p=MH|XaUcsX5FKiZPhsK0+}ru#d3s{21o z(;Mvdp=ZPX-#Z-i-2J~l>>obt|M&9n{a+?erscZG)m~rSvW1DCn=RWNUTA0JFqasbu8s@4B|k;O$>L z`KjEn0&q*TkOv$}jA?|%l<9LD;vbo{RM)@0rEzOqV8ieZ77>QAG`lxwQD+munZ}|iZa1q!`a7@`O>gn^F-1mmiXN>$@%$}17 zJZ_ZBEV1kl$U6TNPnG}c_!X}ih%r`f%t*8pz*V)>L)HOC4aMIzGH2)vCNb6x~ z-e@}`)Cizfk&e1l6hyNLNjns%g-1P}7M9AmR3Z_2?8a~FaJyPBV*$TRLuF;^}V5p?XlfWcC2nl!g1onR&miM*(IY-9`e?g&#zKKY<8PhK_HXn)2vIqw$!~5>hl< zGksPm<Tr z1S@{IPgm!e&)Fif7SP@|WIr-Z>{rGa==y?6#i`4eFBV!`kYi~h4t%o&9|QDDQ&0Eu z5_HJ2oFULzW^e^@3MVPjL*O(p4u}+1CDZ-_etvJ>i^*@0BV33A8ynU+d$R?Uz;T!v z?FV7>K^Xlv5=N`?pYn3Qy)(d#^4~$l{?j`gJ;;Ce@o?j|ZU28I?@}~c|3RG)CyA%o z^luV%ZfW^f_d6`Rzk20a{T1=n*!<;Z%i^!#gzWu^iYQgJ%WWnM%#b;dd7b}eQtZ(8vadn;I=HMld;jyPrzfET2tT;A+54_ zJOv${?#uot`{f*=jGu!&paijRR_$+A5r}9iI+dW$z#Zob?QA-h3AI^ilDFCfaU({a z+*6rBGln5zXu^E+5fCcrPkEZ4GP2qU4x3L1sH7cnZ_qmX33jPT2n(MNwIr{i%QCBk zob%J=%Gh%o_>@_GhV?v_yyKPTQcS~O19J`b)ZUFhnW?EDA=bF-wy4&4WyNz~B_d2I z8b1e7v<>dnHa+Y))0;!`H?%etBQ=Ekrgv&GyxvKKo_qXiV^7q{sjTlfZfcm9XiWlL z_*LE}o>-R?ep(p>128Txv^51~a4-Z3QTjkI%o68$vmDe<1$Qb-Rk~={354*eDLPiaMUn;oQ0W48&H#MLze*#Qf z+ij9HOUY7{kiJE4B!SJf+JNSUE@Um5+qCyM6EXz9rsjOW#ia7VV2q3J(>%Vc{m_YV zQUXtjD<eGIE>)i(jf z6LfUudd&#-!Jd$k*zoLEI+~ZkY8`9oa}ae!UVbhZL2zrKuMYCb_h+O6M~|c$`etNo zT_a$I)l9D$N`NEw2Nvw=&~HM|9*7E#*2irTwc+iK?KMcp-aWP=8mmH;Tq+-3Lh&JT zQqeEHO;V$8v5IzWAxA$}lU9f8w$xNt{|0o_I6^y7P$Q(+w8{ea8e{w2hOX&P9itLrop+aTs7b21677z7aDv$SV4Kh^=CYHWv^A82g{)Kt~&QByTGp!WR|r-``{xPV17S)1!}oq8fR zK+O&7=4;BU*uC;xy%o&^a~{WWzRajsb{cXc3=NcH`Sfx*fyi^}wWJ3R8M|O*6hx(v zskPdmbB(B>JyY%`%~`psBGBBTQ?#*72TZ+VsgI2CC9Oeq-#=*Qgj1p43fAQW#&vXA zDa=FnY*|)P-`3@|wZE3rTQn;}7aJBBXkIueRG|e{b^Vg%(jrW2v8o;#xd&mD&fm8@ z7?A%~@%_gC=nr~FmG~b=5BLA?<*D5NKQrOzW%g5^PVc(W0QfExb_Og~@kR$gsK5G&=kzU^Oa$#?S-u49{2-p$@#R!dQ!-EDpU#K=1A%vZJj!{IM~Do^S^=2PYW zY{$Rd4Pev#|HHw+=l=)&2mXIA&rb0lVVYX|!v~XW^;Rze3XwD5BE%`v^9-`RfcST~ zq&!R|zu97W0|^%*neO3To}%B;#X*j^du8y;4K57UwXpMjzY4dm!sMAy*=PQTI)bZr zMUnuSe0;O%`yOWr&Snp@xLY%2o+23t6c+f$GG7)ABi~X%LG5+3vrF7kFo!Weaux8- z9oqv(asyD;T5)PmBQOVY;#l+@N)aTebE;lfM31_`Rk)fmfpHzwN-}>u&*AF+FEr!Z zlmIsD|GmTB$lw1*M}vp`|2`hM|08f7$k{J9@%pV=Sy2L;vF6zV@NdJX#ck=g1^i`+ zsvDTJ5-}FVQ((W4=rt|-Kb!gzTK}BU-rxPt!LaAc|A)Qd!}`CMr(*w6>3pwg@6l%6 zrVF4dP1v^gKUHor%L1fcxz-<5vhIGB{A}576rAhCdsKC6qCJ{BqE55h-w{=v+4hd8 z+q*l852+{EZEjmLk*OY(fy3;zC8<>3{8Q)B#39yAMA>xP?_81OrptZ}wCG><+dzz! z%YGV%JG$#8hWqXJ7U6hV-|)>Zg0~aMSNPPwoB>g`#yEV!$T(|EO~QGa3#a z;(y)CW6A%ve!a6E;JOl2ZFg>oj)1s9Z*WWmLH$AP&XujRqDbu5VUpcE*Gj;c;5AaQ z*#vDpTLs>_Wd$U#{*9l)E$ILo*8lKe(D&v4qv6B--+Otk5&!R863A^w0CpT?WRb@! zEvn09Tkher z4}Jx|EOR>ys7c%AfaY0=oh%IfA_mdUf0O8cgka2McAh6O^#ieHodZH8AU+noEYa%(2w1yp|@N7?$i z-+|+zVEjO+AEqZJ%e^$=!zAG%2ux4ZCmrtbi_8)wYXtJb`uKKqX|a1v%Y4DNNaq@g z1=F!_YJ0HN(<*WiZ?tU>QUzeeu-g3&ypp(!LyaQM*MCE6dFU&xu4qxvwbOffLb^@Y zJ(woLuCa!DKKTZI)oC=;18YuYJ+Y;$xfH+L>60aP>VWWTJJ<1)Yi3b`Zk|HhQCVJw zxkPJym?9}R0ue2jC<4(UUuN_S(s=};Hhax8?MCsE(0mbrXl3ChG1zY!vZT5Olr`TP zrpDD(cZv}{P}>NnX26;cuOgo(1OQz3ylTtSs%optEZFXDv!Mb~Y&#ou0VKZ!!`p6z zQ#Y86;btqdAt7|X11}Io<%02aep5~4es<1D{~vy*+8mb(GFrvTj$?&UwVT<-!rS&h zp0S3up-FM)+y20DwBbqJ;^PzWc%Bn##}1az*=tgJ#m3Me^8YzH8u{{n z@907Pzn4d!|2ZN8PEZUzahV7GB&cjW2yBvw*)o?Y@AdZ{kI`1&;xFwd50DuOS^Egk(;Ns-017*VsE6ES9M69iFm)am|x4C4%{=5;Yk!-0JfDEhq0++UpuNyfxLMp`%h)*7CLO1m;nMZK_9hhN)5Gwk`KPBxp3;w)DC788#%T^*V7Vpj5aq z=$3g-yB$L2U7UO@2^4nlZ|o0sF9ASL@Zd4k4Za5!R{07VPAx3$3~ zT5EY#m^X`%2>W2w`=dQ|{9lE-yRq?a3;sVER^p+S(HU83TELw``=j z!)G)9*PXidWsnX0zjt&Pu>U;V|G1Z@&i~7ft9zf$UnazEz3W#caBtZ0OLyT;yuL!) z+#UOTnXzf~_}WPruUr2r3Nx4gWUSM>lK+OoentNuKIH$tmq*KgI>xt{?;UNvI?T5f z%({L7hk}CFnru%v#5b_G{ynX>YS6LS?qso5?P}E5aFLF|ui`|9EAC1HoKsqSOu5(J z$AX_GKI=X0$&a(Lh~1Ck3zv26`yf-CBGJh%T@+pYoi`l5J?4*YnqOii55*})na=pL zEYq=*&Bwp05tpz)a_LuYSk$*SBj&EdKl8~)Jxd+$Y6FE7$1Z%HXOKILc^4egJcj8! zCse=nue|`)Sg0NLeEe8II{)}l>Kg0^R~Txp5d52&Ft+0VcdP#o237rkIC|j!_wrQv z|4sFOdn>5w|C$pA^ndkjgZ}Rp+eZI)Yur%(-$ALj_PIZzQm;wkwv>8%Jnmkp-{5tl zk=fekMr>CdwlhEPA{rYe=|}}p#j!ZcOHD*`%zhbX0>S z@&aWdv+1=HqZ$w(ETHJdu5gKFOIY40533C%&|qsTiDOk{O4bNqB0l|qQyJ;{-__jx z@OV!X|Ch_4`%#eTo$3GmqoFVV4Gtdif8EPd$N$xJATjkoZ30k-u<%ss6cY;aX;8Ip z!7Sl5Vc>QV)Lzij&+6@J~@o%MZk!@xeOujICa`8@13 zzprO2{(rae9}bR2KL79chY$Myy*!ospEo`J4RA?w`YS(%4u9pR4QIbjscnvaoeDP# z_OOHFw|aB_Kj$CcynXTh^~)VjjoIk^F%OIx{oK}Bu^ffFKPIj@WMJ)I;xs+K!Ze<{ zt^M%o-OHbkU%$3ni{73_R*`pa-(S4^*mp|wj|QFosMG88y8S^EPIN5>vxX=>3unAj zkwcz*e08=Ox|oS(zkK21mW*OM2#rh4lH^!wKt{dy|RORyJ0PqE!4K_y@A`_1JF zNXS)QCSqhzw)&yW7s6LT$Z;}BDA=5t)3eDc9&aIE^@p&$9&A4yW6iypb|DXGL>g<0%tGT}w3!r2f&3wZ; z1_@jD3{E$+?`e}=#XZu)#Ig15-+_hC>hsojx^8v;w_N`>vH)$e|BMd&{l7mvc<}$f zmq+jaW^vur0u)?5#s;K6hpa&Q;|4pBS8f|ikXL0FThQU?sb>umZ*FW4GD^w$%d_Km z#}{wkITnNej2=uzRg=*l(q{CxSFc~6|NQFWhhc@Bs_?zB|MT0Swj8^WH+EZ(%4TA| zYxB&l*k%xoErH}}*86v|(%jusk^f}4|J%6tubxf*A4dm=p8wxbum7O`-OJOM{}p=K zUty}8@ZZ4VR&&3qBokiv0LgNv%QRK_K{nf<+y0$~H?UB(4JfNrCC6;Xy~JSTDVY(! z6V7vCU&*(>cdB%m60h+6%l+N}&*ER# z4dUQ6#=+iBW?hB1pH8=qBX7v3tH9l25?wJEl@{1*Qv1kf~5zX>b}&SoNC_{s6>m*B_u zuQs#)D$N;>aPO=Z^X4s{jX%Gv)D~=KS@MMmLL4f(d`dcThC6W%ZR{`td*dqr?6~{Lg!Nc9#EM$;5GYA^qtTW49suNnkrles*5G8_RuulD*%7 z)Mt-MRpzt5ZXxkm2tF=KynyBUT;}>4KL<1G3`C^>tQ@%L1T~_%cg*rw#-%qX z%NzdO{)Y9b4$6K-_SQ@We@4k0oFpl_f~DXHQ5ZLIgZl@+f?Btpl;QyvS>gqtN}CRo zU@baH=sEN%qR$=6;}gIM^1nGvR?7N=SHUj2TuxA#A&N*`CK1?oaWdBZEz!}a+_Yh% zhq*eLH;s$B8T6-R5uB05j+3$2ZXOm*Q?R(f=-0PjJMcR+R~>VY(*~x0pS@i;FElIN zG+tqft-{h{!Dgjt5j8YOLXGWL`s*tT0iUEG8#Hw!BNPgS6rE~JAokw-yEA}P%o`Cc zA)4Y#-Dg8hOp7Y>CFN=TXt^$OoKX^4uCK)UV5gP4LKA)vt4{y6ZN{2s*^E8&l~c-Q zOU@3a8>P%O=Y~IZLx6bI)?|%;Wvvwt_rk19aaGjd#(bP%}U9Ad08}KB?Ca|Uj zL|2xHjtwCJ9ypB_Y_uM`qa9!;HcvG$NeokTf>ioM04n)SJoaY)zbCjxG!-e18N-h7 z=NR!E%Av-Ly8aHWFk7%eu8XIjW6-HZkq?1YP7g+yu?A*T|0tKKIXIFtunG*nm@(5j z&rKbeggK>!nO2^E+76#;9f^wE)Yk0j+kINF4@tZ2YK=k)uK}6X&9ChcMI}#s5R2!U zY3Ns4;?1h~*ce$=`EN&34&dZat{C$|os9A^=MiOtgm2Tj<_q3;R{MgdgZuKu0JT6$ zzi`5{5>4^vNC0P_LtrbI0Wg8_CCZYq^Kvs1K;>xnE7}{B8t6)0z*D+cs{)WM7ZX&9 z>LxjAr5}!D<6(5VxqV^?YhzRXkku{0-K^+;+^63DSFGaO2>!B7{_ma_|F3^II(W$c za4*l!_P;ab1VTmJr;`-o#hq9KiFO5z5gJ6224IFvt2nSxP;bI0FQ@(`W z6eKzSoH?vispjl)%1hmLi73R`j;Fd-7iE2=tjtlm=#Y6=x&E{Z?qC{?!6iaPDA4}R z)sZGC@|w90HfoPMD@ZVo5g~8#1nG=|T%^~%*57S)@EwB5&n2elZ5E@5U!Ac;EXThJ z@JLk1QeFtnOYUB5=~V>(%W2@*vu8iz$X5_610_KT#uR})AZ(}>&xp*jou&B%rV)5- z+bb-R5zcmoD9vvNRjXL&p6IO|5!UbjN-VzX^S|EF@Tgxs|9kNNx|e6?{a+oZ+{KPB zNv?6%x7EX&?D)Q#xzldnvX#-_YRh-pukPaZ*IG!v1VdIa*ETJyI1gfHF->cBMYs^dm>zw`nWImQIRuW7pzW4tUihI`lqw6dWF7xvBNT;gJ^0T7eBxSPS-a5y6@ccocG!+>j1~FaTtjWgytMYV$Myw8r!~D1x*vI99L6BsLVSCS z_`!6|$Mf2+7bj=dvAB9a1{Wu1t&r{7lrWtSAnP9h1tBh)4Uvq zc$@fCvr630lAF|f(${endxq*IM%~)$W&yJ9v|)oJP%Hkv%o1_Je%k_YWoXE9LXf&5 z2sO*px0`Vh+{=~FVDXwAxlI$l5lx49j$tNGd-kDE{Td1%&HkxRg*MuMJ_;4>CRU(L z_x}zm{@+JO2mJ^8&wV`H{__seWtqujJ6z@D3rg60WDI}T?z6Qm$Jg*J^Mzc-XMCNH zp9`z1`5xvD9fv!#o7jWrb*r1zpi&!EfHaiO*lDj8Z)=U-k7;g)2v3MCTm{{F@h$% z0hKsBmqWPA05VZT)prbV8s;Th6A$rU!4#K-*85Id0B^-M{_pTq`MoiqkVIn%Xw-%37aLE&C|jF&%V%GO6*M5d3jbHm|*)o-a(vMStmYn6v| z&fj;K=CkJBr&hz||K}_@fa#?_A)sH}=FY!lqyOF68nSNOg-mGJ;XSYXZ zx}+@|>X*-h<@|xHG9cM&&K)es_F{P6R7W+Ut{POw$6hmgk_A+YiJSa(j~qGCL+BcC z8puo96!=>3SAzB3W17@89XZ%aG@YX<*FqFB1JyPXIK*gZs0cR_YUV6t1$5?0KtlPwINhR2n0-0nUKV&!z2W9+mRxR5nY0ZY`qlxNZQ*;|eRNSxkiv z@#L_?5Mb#JT>;!~w_Cdh2N6I$U#4BoY%4BYWuB(e093*(IZlf?JY6opq3vj+knl{p zjx|?%-ivW|+;m)fl=n?}kBeb+zAekNa@%3t?S8Wwf3p(4c?t#5r~oej?QahCRaJ{B z@_&ja-58a$`;qmL(JJ|$gYf_H@?r%+uZp4Y6pJycuV+$Gu%o&s-&o{QV{ zT6O%C+%3zPzI+!csp%NdI@0;R>uI#x=tdkt(FxO=%Jr-LpkI}Af2rtfj4a^_;#Ax) zXIqTSqHR)ID$M>j`-c2)7J;bUZu6aX=iu{?oeN*>FJD0Qu9$tCveULCd;?tH9GVin z?a-8TV!4Ba2ZEnX$A3d>F%Z83nxE4WXEPID-q~0f#7nepf>`1eq-a}^U+yD1^}}=5 z&xZZ~Hp2gGjQ`y~998l^KjiJ;pj0OF~~DRGj3++OnFNT}}DV3M?3`w*{B@oel19Xf1pW)Cu!O zj7($NIoj^&$D%|8Wz=~8w{4YC{Sf2n^GWAmq~%V7VD8`&twHWgL-W8}d&2K-C_!Xl z$H+|Y{h`gsjOeD35}VfULuGAtzq_%z=Fsf0l=Tt?I0N|eiTO$z$IVcD$U|Shbp6^* zfIhn&u%}&e{o(6a!)A#g`y1Dd-OFj2FLX3{F4i^nY(tM8OO!ZqTpw|xFaX-60cE?VDSzC~iCxKR zx1-uuE7bzz-COhoUtsw#!lEeiqQp#iF?K)hZs$j@-Kkf0SU1xtaXmJYEC*+^4r53n zlC*2zCTOujKNp>Ua9jqJTAScgH4*L)Bf9~b6 zr@)X{U=am(^ zvs$Gtv_=)q0%mZAlJ-O<6;x+I=O!pwmCc^3`$snz*~&1qgZOPonr!m32kPRCP?*KY z?V0Un_P|~LtWOjF7o>CN@n42VN51?&Iv73pf85K%`P9qL1(Z3K`Bjd5D#EugGN@%w zHe<0|1w{O#Q`?KezolZidVKJrCOJMG0Z`Aup1vU*_^i|h@yYS!*sr}eVzd&zJ#fCK zTTu`lw~#>7{JgweW-%BY@IUe5d^w%s&md|?VJW({v4fS;7=gG21AL zf=@`N^)nLCd3nm(V3R|@1jTSk5Fq&iaRp9rbuo=ojM7A0IZE*YQ#f7H2b_pmo2~dNl>5*Z~9(nZuVzYT)m%%mqF{U`ZIB1VE0w#I~7ajFXT>Hd&)z zQ6RmCn1UZOXyDxjlbD3dR2pzAnYirSYu$yh?d>wHB8oLAs%^Itfn13ei8FpEWk*KdoXq8# z5v90vwt+cHIoGolSRJ)Ej{Mt5rX?y;?qB~O5r{rUyYm;-E1#`Pk@Yx^^JPXEOJE$N zxhKS_bLy>L%WUfw?1-RX&g>~#tr!U^E`N=5H0eIpc=UR>p9vPETNF1=`!VjLy*s9fe`F=!?jupAXvc^C%|uW?;Elo)nOFk z%C#Fbo7YItct|0)3F-P(T# zgQLEG{y#b#J;eXGmxoI?H(K7|eQ#BX!D%`PvED7Z!!L*~R5>w=3WjE)5(msJ55SgnL3LB@TkmS+gaJt_CUJw*{ za%`LlUSmQ`&M9-&N-Wh7y=6=n%3M0BRq~cX&G{x(!2GWu(Qv<(lEG@uW4`T`^ z)lsZ8>w|9?L#r}~)Dez5j47N1N72*_5^3W_rKIl%iYj^5dN<7uX?2Bq&BB$QIqI|w^6kKIW>3H~Ij-uTIgTlR1ga zY~x(@`b=%V1U z*8C=Gy5R07ymk`~L7e%R*6tKuV_NvF;;w^E)Dl5OZ1O+d+thEdH3={qC9xpPYs|Hi z1;9tw*{&+HykTpS6C4uHoEEm2T4!RV1D=^q6`9K3tZ+8F)@Ee`|9x*%s)t*!VTMqJ z4XaVpfSOpaEbPppz8d7OJXtu%daK`dS$hiS?bcnjt=nR^HIQ$Q)yf7!Y__KDYp__W zk=@y=S|}cCbza~3)ZQ99t-`w%Rw}^;*l4xE-B_rBygmDT$;XjjI>jlPp#<=tW|*#- zrhq*DGKX00gXe{b(rMqqLtm?AD_&H!K9vqIITDWq8n7Jj)*95J8 ztot@Amep?x>tadSP?v3#QB<<2v3ekz!&$HgHM3LX$+8+CRV+0961m|J^m|9OxW)Nm zf-~XDAQe)3!EKWJbV@sG>mlW8 zKQNaZplzBiDcQjQ;wH4KpQl|&Vj$ZYuwoLJL9^P@;JPF+*n%bon}}j?Q>qx$QGz3- zcxiA1sEU@?L>*Ep;blCtI}amY*_-QsXc~e`nlB*5F-+4nZ{_6p?BnUni;v&GI(_l+ z{N=k3uTEZ8_v#Z^94AR&w~d#C=8M|TocGm!P1YG);JEg?YWhW)7fo%~d{>Rvd^W9z z3p9ve&P_F#BsD#LehmPAP}Hp;B&-899p4fO7epNvddTa#@6f~Zt?TX3p4V5G2pU@q zc2Td-60cN@a1jv2<8?j<^;w}zr(neesb<0wfm(IWOq0@TAMAlkoF%Wg5x|6Ram(1C z_9_=epM!pHFl5|P^T;3+JNB#Y^>ZQb*KiT3UAX8Mjfl&y*T=cIHntnNq1iDs#5$%V znL^~V$ZBBTW`WXPYjvWe;e(DGDPKFB#lzBpp}3h3gui!rgUsJKB9t;MRy%_K6L+iLu&%SRfMmRv3P{+4an@|DQhh?tWx)Wnl=avxbXZ z-2pfF{~jFp`QHcqqr->zANTS!=6|PipbxUIxgQVi=2!`jU=Ru%Dh*XqtH+rGRf zifffu{&X2|<8`e)@y1boC6vmgCrf+ux+E1?fqVV6hOb{+Z5iI!8{!rKcmZef{lOedB0PPw&Tq>ND++o2)ix1qnKhS@EzA

tgBl1PY}-+dBVQW z{^QF127dh&h(3ujQ;1bEyH%0ND6voYt(By<;>W zq#Dtav2D}3^C^}DD3<)H$OK%uNHpeScXsPcXD*+tohYYGKgFukYG~A3PC6$3nJg#n zNBP14sFVm`e><|$pYho!|H(VRsJ#9?kY@R>-y2rszuv)M@F4%)$MZ$pNxEQi9mE;X z)2*%?B>-ps%~tDTQoS6)LW;8(!{+=UeEAx=#IL}=nCLiejk9H%T6y-hiv$-` z3jNV+?2cd{H}}9!FFBJkixDog>82UyW34%y$4O1sn3jK&!l#nlD>Tt(TEgRUM)>xi zcLni+*J6JMMIT}tP+p?7I$E*y zZj`O8ETXnRDWi@1gGGx}fq5JlmL1#XfBjJAi|sIAC5`s^#g4fy6KVYot>2-ksm52o zesAhp35ZOO92mkf;P+8JD#K4*U50wFs(ltDE5<4-pNF{peiPz$*TX8ddnc#$ zSHj}y zL=Y!Zpcqfryuq#j!IWN%@l(Hi3Kp;+ss?~o#4L5v8E`kT)Jkg# z#e_Vr7PpXJ@T|F_n{5w$KP!aHJRP}9#2KmQ3db-+wUk3(8ME?0TcUwpH)^?zHmx@C z*2Wx-Gp?RPf!?Z z?djJ2t_4K=2XWkUQ7+Nx@i{m@Iez^Ts4yi7;2yi#G#8y@C97t1#sgZwaeOcz)xk@| zLlJVD7%!c#dQLhsJ z>8L+=i2r&okFfu>F6KNuhA`)0rfWCY|2nO$41h(R*zsQ+xlvo`L<&~E6#aLNW{aw; zZZ$+$mDXV|H+PXrwGd2`!aZ|eMt-DXOhbATx%L+-rWY2RlXOWaDu2Kwp+93f z|4EeegqE5L)&0SZ>Y8LSu}~)$3D*K&I7Omzh04%Zf?yfX#b%}7293Jaw)kksA2&Aw zhB4-4truhP_kY}CQ+D?OP``F>#QIYls-CN>EtyOcWrT14^A>i?SqWowhDywNMV=+R zl2zizN`V^sXY5xWn`p_UNzAJ_%+#=+9b)8RS_{Qa(dD3OOH+@%PmTw^V=7R$SuSO6 z#Y?m%bq)LqmKpv9{0c~3Ql3R?-!mha(<_xKu?CcD#IsaP1HyH|0aZ5~)0hknS_N8B zWc`784xqR}=YO!Ehjd9v`9%u$l;Z9J*ykEp{RR|QNUVXvyraAt%5YDZl7x#9Fs-4G zV1ar%k&Xw>1b1$K1{+O2O_-aB41V5yIzwPKP3lf+sIP&_w`QL(?QFfrAEy`+!K|&H zH+_;SFgeLHLQ9CHn@sJ;+h{jM zr3r{&{oE1upHSOHGz{lBC)i~+kr|L-3SEBPM}dk^~my*%6kc*d`@X@y_qIdByI zE!2H(BDGR<=!>zbds{eso5IUIp?x3Slo75tP{?b2@B7s`p%(0K(1qzb!zp+97@{v z1otW)HRhvba&;r^zg?EXp`U;x=W-TV7JOJ(dx`7|zapT4b-8ao1wS!CkMq=d%iSZ;FV@%Sr;CfTi2FcP-=Bv*T%7Ro z;s`;$9fOOLv&vD2`N|NlB2>MNSr63NmTxKJ`ey#m4-xJ%|M$V@Xi&-jeejU~@m?Om z|M?sP;Y*4045axC$J=pzdB&vg+Y}{Uz;dnfB1%2nXZ98KM1JVV>N>}*4O3m>j!bj% zrmx+iy#ZPEq&>hbEccD7vXnwX47#G2!EH~RWXZ3>dc0MSA{7?h!()FxxQHL~(Y;s~ zBCi$aIyxZ=Syo`ZafljCca%c_BSZ;dlT(|n}xW)X_tzQ-(S3qDun|h zXSZ%Rey9~MB~}eYzWFz!>li6OC3ujPXk47<@nv%_8i&-Gb4xr4w5G>^ zi!-tV!O9zZvpe)+Gu#jk8_ z`foQttz)kK#{Ok<@%*H!YFNco`$s!dqhyR#Oe+!YoLZp*RZ8Lu zix)NPszNmEdoAIpHho!~*Q%wP>eo%v)G$#GrxUmHY`Op6$N;oq{~sP69r^cvd&A+w z{(m12xBqP3|F^OQ>2qbzeytdyz0=nV09vCmuWL-*HkUMP+uzx3IAVjhfI{Leh=JTc| zH{{&zeh1#tIV!I(K|r9vlfol#_TfaB>b++D9%i9z08jH$SQVQP+E^nbl$v`Fsxtjx#1dh&i`k#r zMO3%w9#Sa#n76h-gcb!|zrdxtzSLVM{E{o_*`O9E!OM!J&>ZGzaFHk(1*GTZ76|?q zdW{#@Kh+C1q6>%G;XhT`vDe*zMRQmk$-Jzt7crXpUQM)LS47;1iJXYZkMqetQA{;U z)A!;u6)b z`TstiK>SB_>5l-&B={s>={rW)*?XJH&6gcQ`YTB!~#8b5hG;U4ggNiFUgM3;cm~B+tfR z)o)$mEExlF38}R}6ej;ad*A-uwv9EoKkKi+D&L&O{Va+U^{~9t?&ms54@e^8xS5{lhr|-Wi+eAC`@+QqWRS~Ad5e&-wOKL& z^({j+ClRF5QvC-h3aO+joFysRV6v8ZQiR;C6VTmwUC@;Xl<1=g400j`psp4v{}IkE zA*E`ET>qF7!iqmja3&)#t7V;$|4lBG_ufWKyXH9LRT52_5!5I_> z#dFqn!t&ng-Ylr#bs8yNWZSL3MyLJ$UpA+I+5FdEHa*qLsqedE5ppjtF!ldCic)zR zTp?XttCqK(K?Y}#BA~~=LghM*VnS&%EdMv9(TarV8&xLp(Xmb_7>Oz(Y zOzi?~CtMrM=HUJr&Vmvo@e}d_}e zLYl~L6Zq>Ib$+X@ny(;b<9V40q^E|6kPtHwwI9rt5)v6GLuwof%vq-q=!#j%K{T3> zE&AXy|1tXEE4QYf0~T$|&MbsIc!vR5B@tq%*w-H@@|&U07iAIkPbIDlyz1P!f6JYy z1N=XIGV~(GtkpKqzVjc0aV7s_F!^%+<54~}{-5^m5)x8<6`ejC46>=Q1xvU=0D=%j zaEn5~`FNn4S2=6k*vrcybd5cuykbKJzh>tsf7;`{=T&CAg`$hPQMm+uu>yX%ovec2 zwUzh$9BbFtm#tsN3`ZbY{DNtUV7LXncc7MTxs9MIo?|6d>^fJO)< zU;y}+715O$d&iemPsk+Prfr;+?`835cD|MQ3C`riX@_~rb^qkKNE_+LRW zv)9a_o!!hiDc$(qj7?ib)s?`BYOiP}BEg`mhaFJL1$l#tUueQ z*8W>F9MS$Ssum{x$nsBn>;I1jmHL0fFZG`u=OfPlZ}93=o&muT;?n$^6=zGZM5ppF zn5bmexk7B6#sC6J<_yFnL}$8kYJP7(r>5q%7+XdYhZ{K$F`bbYj zjlAx6XIEYR?|*kyg(RC5Y3ZRSO6a3GN>da*TcI9^;VVv_y*{5=ZR;uv`c zfSx*_hvER~o!J#+!Seb0Bt^2!wz*@gZ!dES1)%wdB;1rH=_$B~jh`i%rySFV;%GJ@UW#ZKr~pbxHzKFtGRhe-{`0B9T((#M>{d}#tz zzEOZ$Q%A8*0wyHX{O|L>V}_fLM?%7qJPgPxAu)~1df^EdyjT-F6Wg*& zc{sCja98^7&Z@v(#l<7TpZ8o)IkB9bc3vfHYcTDo+%z+}VUjp^>lsR8#1M5b>1QvU z%F~uPgDc(D*5<0e%(OZvWsKBq1*$Yh-QALwj$<8(&_YAk5AKV~)NYVYw@V{--Dt6y~wx8^E$wH~zKK7P5?EVhax1X z8ZNOz7TAs@^aX|gQu~*9f z_Qs>J|Hc1*jL%{IzbPBo5`iS;&X7#r1xl1u7J!;Q;=e9VOU#|#Z#!fb5ONSAM zEs<;ux{HX+U?kM$4gpZ?A=7|)uC}g#;bgrUiQM@M3@%Eo_%9y-BiEute%3NC0&^;q zN2w?qH;DqHZeO!<4*rMy7c349l`~MpbS#DEaP@d>4gg zl_t@|yo2Yr!p+qhRQ_(Y*J7uYmWIb$GlV&u9Ybg|`jjK6rvEb%+@TbR#D8#w7MQYh ztF{k;P|V{cqkfHDttSJJ;L6Vn3nD=1fm@)*zqaE`g$(xs!Ri;C&E6Y2!KN}q7 z>rOY4-w#=Y1*{&BgNR!Pknu58p%j?!Rnr}8s_^!~nPnRH`x#V&&mXP)_vn9RrGIMu z?~eTP{SV{O=u7^`qkJ0Z|G#BU1fUGYA$Pjv6tPZyHG_0>y`Cuu(ay-VHDd(dEtn*r{hrePtJ= z{D*oVkd(KDnUw&|hnYD^)+||@m(65ZQI+;tz~L$S6?A*uVv}OAP!0DR(EUgEAKh+E zgh4>LK0kZ)y!YQPu1nBBso0)|mZx;!_dWGOPw+t$s|3o9E9Q6{m3yxRZ6ml4ywI0z z%Wi9!!Z-b=E*W zp`l#c)*r z_GgqpxoiF3!!*Y6;-ez~d)B|_`or@2_lEA5_5T>32J8PvIUN9;ku_7H>y$*12w}s; zu7#h?B-Q=~E_Q_fuLxng)_5&6(?}Ov#N`O^2auu#djA5)A?WtffBYl-&;R&9mvAr| zpUU#tKb~E^xp?#aDY(k10wH2DO8xY=-+&o0A0a7yA8ikZ{-PaMw)STdH-(|$iB0d;1W z#c+k4fUNr2UAeTsB=ZQkf=@~7};QQwxl)ii(?W5$svqaGfi$sry z?_+=bw;cZ&jKA#vKF;R}xP*+MG#1fSIRn7`62)M)#!<+nQUZfJv4hch0>nu{b@Mj` zbcvz}aNkbm{NQ+T3{n(9hBrtQl{bEeaoBkRVx;cydYYtYj^CqD7Pk7IM-C7-g^^gi z$x#9cN zCrQaaQNTJ54iW6j<|+AS$Jx+;gsA`TAVAgnKYw}l=KJTb-hS__!UykT_xc|X#;#Xh z|NfWzpC0G)1e`Bnyg(6I{B@Ro+v#-v3Po7MLy9Ghv6YbdAKZU)qOBLPgRYOi|x_({&uD0O<%k9k_!*&-HrVuvC-_>Xm(rDJa7gj znq8A-U(@^oLB>gjVF7A^SCyDhA!y_ZsbB~TXUjy_$AruuV5ptW8 zcO<~N(`I1Zsg;KVXHd_>fiq~$L$AQYfiu|2L%C5AZMl21PJl?&?7?)AX)#4~!-?bC zC(gjOSO%>Z%b>Ja2F1lP$cV=8In5yn*4$l?J2fO_FjAN3tY9K`Mn&mP%s>KDibUjs z&oS9XFl6iF?)gG`;lq(rmQ zAY6U)2GcslsTCwQ5g_;PW3u6V5YQQ(Md(=NH0zuw$%#Qj!8Wi8HjZ{JC-{TboG9p0 z4$0(1I|pR!HB?}pRe^B?Z8W!3+EZsRD$zVPX>Pg7-G<}rPJ|zF2<*|c89ztUUHq&! z2>656{2Z3}IWqa#&L9{yG=fHUBZwntqq(I)Fm(ogiRPg}vo~!=^SId@8jW|!ih2Wp zKWI(!phUB8(tJ`f0JzZ9CoaR8ENsPvr!0ab={*dUoL+wiz4g`rf6$s25WW)Y4&t3}8Ww9xDw7Qw2c`J_m*H?5^vO=N8tQL;iH#B)(GhKZubV4X%^ zQL*av6 zu{=G8tq5&q9u6lv%tOyKl?uNbh>a?Ut;hxe7)2nW?U z*Q&;BJ$#rVP~1G;biM{bgkZc*WW`x57Op&3D{o-}33pH-m|@oW8qC(KMA6&%8l;G& zc(FjK`U#{mP1!mG<7Phoa6C3Wo)WNO!-+eb?gG}#t{e{i9l#no@Wa7m7qEty4GNg4 zu`0-KF$+VKP_cv0r`=*1q;j{6+&k7eZ!-_QR_0;0xJxdAXPSsLYv=)I)`M`xWd~>8cC9VDl3_P3qfs23=Hlnmi^K<%9u}tC4A55gCx5YIdYYD} zdw}KHUZPnDv{{_34bGB6&&^G*=Ubyc41{RqcSpnkkYM%{HBf1M8;q)Up#cZMzXRbxL8cp~;G} zYmq<}EVVVE9l!|3cgX7g*@9N>V^&3ceG^}6#G*Ji{gcDEr3b`68SV&C*di3I{f1I} zqLx54AWEQ@&y9fvpM~GQ~gJUCte90Q8d4GxUzLKX_@2k)fq z;7y8ycTyZYud>OQVIQn1BddHLQPx`EYC=&$9W{In1=GYTm?oCto3tIiNpbilyN6GS z964=Qm@;@L^YLUd)@zu6C5*#J4X9Enf(PSfrk_8yntl_@1emm)0OMkI(8MwUGVx^k z9e`OOfXx1h0!9^E8m?@6qQ%%^PmSB!Q{$pNH7?py<*9*VWi=%!nIU=4 zw%`E6D@4|EL;fDYJCp*tr3|g8jgER_Xx!Eq8W)YBalsg}Zx5BU�mH8CkW@*kV16 z+geZKqV+T`SWn*gKmv!&%vpbEHD|{b>uKE9dKwoc^tfO>c?U)-e7{+=!uPGYE@O)n z9=Dak1bU{MOoG-17WE4ObpBwDXf5J9}k4#|pDm~4Wtl*sWLY9rsOjm8#9 zJZ>wAM@1)mT#&>D9}ID;{T02v6~V2|Z5dfy>QP&ldQ^0&M+KMKt0t(3s4rM2K$Nm@ zws0lW?fizWq%T}a+dOaRqWjWC&oE^b6<5#8`u(F(+Z^3dQ3;QnvB}HY9BH{Nf0iVY z?uJJJeEU&=kwuk`+N#n~QI(Dgs??sAS{hil;Vf}?%#y*hnKT?sE3sRd86iugh~SBA zE6?NMm@+6%@Y+~hujNN=wfv~4WiYW?DkF;`AGKBFqoN`o6%@H!wN$R9XS~f07RgF_ z+;u)K*wo6@7Mo|fM37*{Ni(4^IN2c->XrVetF^N2I!)eekHFIE3&GchAu ze0TmO&=m*-FT6>!_2x}>P02>TZJfYt;$goOEM;GDYj84Sl|tc;JQ+3?wPp;1B^-CQT9_ELS81bBN`38eB7ypmc@h1(=c(qh=nBH?n#(z9oUn zZ=1m7J0$~lYO8V5m~Y!C$-GXmYfb57}{)|M(T)%KJMu?JoxI_55D@ANT}a766!l8 zi_tU~?ZJ$AqEeNjL2*!qRy67drFG$;Qr)0IaZv1N)DKGgay?~kxQC$O*(yG? zF8ENY_fX`9Ef?Kd#-}YeT*oVxR4KB)h6Uom=wjT*I$(r!v9Uf=c~*aa%hz zZpo=}4X0)gD)qzTwl=xlqRH(VCiiYk>P=p^oyn`>5?;}AadW$u<8orfrQUFL+ZwKJ z(QtKh!DOAD1M3%R+b*^P!xlzq$*EU!FE z-2J#rILdXiRX%8g&7`FFBqRfsJh?|7WP^7Ih^+l`u!15+#o6} zMPWvrh~H-`4#jX5Ay8;BCn@KLjlw!(Y0}nMniLI`Ny$#Ckf&%OktMg>IJv3FQ0@9O zNO4jhAD>w4ok?4JXHv9xCMA2PX3*qD#U_c%nL9Ro>kOkwTf=BlG>j%C!^l#eRJ>(D zqg4cqzc?(SG1|p8C3|2T6DE!ey~32q87_{W$ggr4b7_>MBtVo;b&)=WDWChHc?MxR zX;j%~I2NbI^<9O#`X}J?Gnb|BKV=B`z zL~j?XBqbY>;UxY-AdKa}@+G3Ki4rNpbQ?4H9;?x7lFhJ1$4iIF}_~DY1^MQ*L@1zpD4I&>YIcc3-QlZB-sK zf?KZr8PN(eD>fvT8Rdon#UTnf5pp~lrH4#Mmh6y;#mAYn^>HReA7@hXajMJ|700X_c3dEwef;Qoqh|g!C2o;;?w8odq+RNrI7ITN@)?$7l2niN!5bj2JSgobJl> z!Ag<2TpE~W4#sGQgJHAvTA6xd#~YSM#x(WvYQ^R>y+V|w>ww9k7h{BSAK2 zRX&wNthHXV^ITKgaV|+g4Nv5QmP{#TO-N9+Y{^s<{yGM1iD}lyJ*473GNEx& zB+e?VAdVS|A@43Alz|yy_Xx$(oRHu}5QbYEN|&*83t+IsXv0xl5EyYBXNa%uXIFoB zxJUq3=+`w)g$$sb&fnHEl*Wi5dJ1m8{l;^=vE%mKTha8HArw2E58x`l9`XYaIcOii z4=CkEF8I*-&@(hGe*YkADG)9Har zd4*-LM8Tb~Z-4rAjf1-$Um^@F);L5omvFgQb4a@AuVB1}QUCvnH?H{`e;K&ni+B32 z*L$0wxW|XTe+1?@rOfH{z%@dG%%6V5ci0B`sM7=IIZDqk4M-a1twZ^Pvsm=m5A^cp z<&QTkbY7Bsv_a`HxJT+xsB8?#v5*YvI!7fGg~$|Zn^Pb{)3a@^m-q_;8Ah^% zSqfv6AO05sK(fGr)C!t2AHd%bm+m*)giCkLJ^lg68#m;a3=W&JzAEH<1s%}&V7OQ3 zd3fQ23MYaO;P$uQZ@~v}ouB~Ew*bc5T91r^B}&B^HSUn{hv^nzhE~)8&tb5vcjM@i ztfTBYFe>61cWCQKHIvsn2w)6mGQjTug*A7K3_Q6gpCPWyKM2XFV%zzPp zzei%~@TTH2Issq0`|A{iK-^m_XM;c}@6-uMD1~rZ?%xdQ6|m5DM1}|FhA8~Zf%OzL ziIi~rg8)$~uLO0#1v>!27bKOTHXP5%ai&8V_=!)okOWF|>T8<~cT%V#vQB$K3M+l2 zJQsy|Pcf|j#6b9{o-2-wE`{I&m=VG`aXW_*MSL1PSAnN>99QYj=LL?{-EpC{i%s1m z6{o+q=9Sf815?cVr0R;fygM;rt>9l_${|PczuTXF<{fZFoCBm{O<)vCQ1>{B_#jDt zj1d)A$|j2n;230T^Fs?4c{8oDT8%el_)gq^6X~n;wD74XV1b!!alB3BGL#aL8^3b0 zLGV3hz_?(1wiT!4RplqhrLYJVUSGfDQ_kMABhPe8IYssD=eON1XWI)6!SO3GH3_V zMT#grU@gKJsK!Pxv@Dct-Kg`)HQjL2*6by#1=qZjdy?Mac<~IUMJD&Vre@+WRZ9@! zRBeE(HAxZ_qfi}1F*+8W1qB!K&VF$$N6reEB=Tjg>(zQ*k#)=xxYVmuxDtjWklW9% zc`K8e7%{peq_QYmXp9V0t}a+g)_h`%pVdvRS?vzYmSXu{lJG!PQiFFRnVw;|PoNvn z+llk6r?Mv%q}% zI&p`ii9Zi@JgulgGXxC8tT=}XHK-P@V z07jCMY+(PYr|`F2)P*5{;3Y}%zxcZm_jNcJiE&>1z2xvm6~<7&23&IM1F_1+1|5KMqfz~Un!iNBCg7Oa`JrPx^VrO z@szuKp%IYOb=_;hhLFJ;c==nRfk>u|St(Ah(h5Th#(RB33i5ixubQhwI$q9qo|_+T-nKa$;-a3;6oAXhY+nuOc5*hXb-NbJWfTOZeM=i z%BK2;hftMYjL?Rl6p8FyjuN*NK7d<~_wi;eO16?Y2oc5H_e)4ft1oXb#Uy@-DVKk* z@JhtG6(C>4m?ivcag;)~220r-M6!JeCJ`wQ??l>}lfaZ=Dd7#N7vo4X!XOe{nXdxl z)m=T%b-F+{=s7n_z*q1+P;c%6zK-Dr;z-PlHeD3nFLuOjJBAip8{FbV1nXpx!VrP% zHSW7V%lf9r+#<%Ib`iKedZn*wda7jhk%&5E>I^fG3MSp=l#3u@3JgNL+gs2X1l_bj}1L* z7LgUi#Z;0}Vlnq7r6ocotJO$$Pk)jRyQf`I*Rp%u6_c-f+V#4>|9sq~2&Taj(QI7w zz8iS<=9-TRCx;$qCZ*1}l2tNgH(&*~AVri!8w6q+5puUqbYP#v@^F9=)S!s16E%Co znAX^#YOOxgNd}C7?s>GP45cq{N?8}+xrnm7$#xNd(9&WV6`KBt+47}qS@#xKQ4$lW zq?CL83deWUZUXd``j^LRWq~IZWUz;K^SgN(Ih*ROp4u?M@uIK70zH_><0E{id#Yjo zi42@`@02Z({`pAJSQjLE4RKtLw*zh}M$@%81f*rfDL6X-n>Z3N__*sar9V--z(}}KfFmIo1K8-jmSY! z@7K3^&rlk}=ptq)ox=cCy}ox8sU#b$PH#fSM1qJ2`*V{`t$VD2I65(qukCx7qEjHU zYi8R-mW94Mq1hzRc%<;G&gm2mB7cB$!J`dCm@Y(IODrTVKa`$uz-5+zq(z!Uk;^OI z-y$M27&-HG6mg-Dxg$H&B#IeMk;p~o{opt^8x%B5mGG@D7PHwQ9l{t8-9%F$?-0%Q zF%{|pGGEG~wzOsZ%;(C+RySv%n59_$+D9zt^Oh9!zzQY_N9*E}w@wjNukz+KA?big%JvGnr*Td%OQcn z8`@hJ->&stY6bI2JQ9|ZjKO5BpyU9bqzKY2NN{kco#weXqNz7hxf6X1@G2oGgE6zL zOr6@W*Td(ps>W!qlb<(i>*KE=j=$1y91~TCKT-EB>x}wZ4l+{&>dCGOT$O(M)V~gC)dqZw4t2xA5eW>CmN#(C$OUn%mj&7e z(`)13SQ1o7-e-svg49x#ujkwZ+r#!sM=~9LTcZqKbHhZuEiF9RPD^dMvx#GQp(8!! z>xch`Sl~F$kpnJ-Etn#X%t{7BU<^DB;Mg#H1kNOmw)tc67EJF@2%yf{-`1edqUw~$ z_3+KB>rDG*EclMFrOKjwqc8QArX?3Jsv?Fyouq|Nq3fM-3$x8W&EGK4P}G>19h_ue zYP=`AzR=p9R)4cZWeCDLQJIbmr7IlE2};rsrTY`{BRogJHYlgT{C-<8uJV?e#e6oD zwq*3(e-?91KQ`_$sBX!rM$S5|^JRl#cudS_7)xVQI{3nz;!6YEixii4SFf&l(=|m# z`Wz?V*>{o&I>m42eqx?KXx~jN0J82So{5X@E8AwJM8mShUxeLY15v-Yufu95m5oC& ziJ0Cv9J!;=ANno|CxI6Z{W%J~lW-P#-efYHj8QNf&jWul_B?+U4871FhH&7!!O$JR z;mK&U4}k)0F&fLtCEOuH>~oxKu7ICl}tOQ6tAgB76O>q+2;^uMJy$4z7%AH6xPRK(|?aW_LoH+CZzLAmV$w;fg7E_;6Y!+Fu$GGtW^LUWP^sNx*RTsiSf zr&5SId;+@Y_D60h#Palkuv2sxG1bo0{frFNXC34OL^#ql(bZ&+FPz;?du(%M^!U?_4B zYi6Zh?s#qzRms2w97c~D>(*W<{#R)xOsCWDah3oM<-m}6cAbePCPlxl5oH-g#+qRJ zXe(S>Rp+FtzGQ=9siq9}#au*S`9$d59)oZj!xawXp<0SbtghVASz?73vYUKvj|+K1 z*~=)c3Gt{QG$B#4Lh^PW6j3CBiPJ>ItGUcK*RcruqYykbx;_#sNdk@6QN*3J>diu2 zm2zO>5SyqJptlceD6q4CJ+m#ycgj-?Nc>M-a6>rJw*^Ud>!>-%Z3YPFde##m2^>?s z0J5k>m@nz9z7}^*L~$z%hSh!dWE1EO_o@UI%_}?Zr}?#_$Li0Qm&YL41jhia61IJY z(_`gb9_Lv?$9a)3u1DnlMm?S@nCP&ZO+P(XkI7sddew<%tL&iIPN;t#>1h%r8C6w6 ztF3I?TfwAi;~UB^=cD4eJnW#w-hK=|wQv=arl$t^kclB@nPpZO(Ebz?!ldUBN5YW+ zI8t+YP*uk_~6NZonMLmIBOus zFPo?ehflH~YP$Qp*M))b=de5sbUyhiG5RVlmTZDN_>z$pY9m8a6`rWKCyMYK0ktb$X+n%U_ z*I;htr&TbEnVvO6Ps^z2~!c6tB+J> zsl?iy)17e7oWGjYW-Jtaryr#|L|-9JtGYvC>#R_S*R{buz4@+MFao--(Tb$oZa&{2 zV5?+K!PBd=*S#4G?ocShms`rv>d5q>#n`D(i3YiZ4Dh$qCIJa+qA&_iivNZ5DT=zd zBnNPNjsJxtj^7Dfq)|+7!5l$Rwt2yaKpc!!=SjC@Edr8MZ)yS&WD?oj0uWGCDUMe0 zV`ybRn$>#Dg|tGegvg>9if?s&*NvbasLyB^1*)IzAj(^i?Fo3F+1gd;e*TMBBltbl8r6BqFGE%du!R+_49le%Jo;Vei|C=+_h?>$};Q{L&$Y!2fR{v8P& zC1CAxI*hLB^Et}BG)U>lU)|qrU02nb2;R`~99O4voXo=j&W9(1U_Km8(AXV$GZ&rA zyyy4zb5Q)WdLh^T{8 zPPp&(yHdYH@bc#7QoX733iRP-Ar1NSKL6)BJ0EvsWRB~1>UyQ6?U8bQW$}EDk-Wo@ zk2TGsb=6WX1$H?)-Gz$uG8BSaIX0)_*yydgeL+HBk|?AamOdt@1at{%9UbK@o#)PSWT(%!q8JlbZ+c}qfL3Ow?(CqsNecwjKzY=8 zsXKk(S!r_W!RBNUXblk$J|9Ji(cOk+RycKsS!n`lX;c>LtX53QLJv(0O7-Ht4y&D1 zP04{{RA}=i9&%5@APl{59Jtfjd_Emc1Ah{r;e0q5jb~GYT+biOPr{So*!QL<<2i(b zfj=4#U`=9h2_bDqrZZ@rw>nw_)XC;663Ih2#`o`V9O`q)9F`O0&vv`uRj1hOrVgI! z>m$JK!d5-o>BOH^{r>}@e+1YZUW-)aCPOD`H(F4<63=!aN7w2u;+nc-VF08*fIEF!x?P{hd#Jfx}On09c67N5vtDPcB)@e{F=p$-V(eCMQ z-5^XrU6pfdwDgMYM(%6e{k;$?(S7QKT?+cL78bRf z$C9Y3lAI{Dd6w0Z1(^cK-UV4@3B5&JVRKd%gb|RCWF1L)quOWZHpb05n7<B*@sX{TcRKDS`u#9_O>ezk z5yD<%ab{gV+PrO6{?;TgS93y7A4xu_ph8xZWlxkhYxi;G6!hV06H!~OgQ7iI6_**E zWl%VI0arM}H3yryd504)*U!a-%s0Aa>i1h+-{<0TGd$-1j;)<+>&%;L94{ht&0ug> z(d{@<#*ERA(f$}*ihS&6YZ$2?)S>R|mntp~eBQyzSXmhUpm}v|o{PuvoTMu$%_}oY z0&P33mW(C4rj>x+c819k06Rd&Bt(~%Ist_o4&6>>O6j%sioozY7{NF|sgQMVbUQr+ z+ZZzZ^bDYUGZM|$L9Rf;z{Ln<+{#rnoB#jw}}8O20suR*i;#;KHHy z)5w_;%Hk$j+cK2up(5phTwE45`AsQlYSUE`p{HE9&XjOHIxfiCW01i+&SkEF#+i0q zb~@WNeopcI)+L~`Rc{Bas&iVi`M7m+zeIe@jfJcM<|dDJ+G@J6T-0z=NlGljmX4L9 zuk4~o-mI(;R)r^zfxP9Ne^){ag(^P9%xZU8p&|pphHG%AjVr*i5XW__e5MO-Vg_9sr3$v%s<|demMoj=8rYn&=FI7@<%) zI0_^J0wCwrHs1-{WhG>1{fvh_nBYFQ6e0q{Ugr7s6B70|UjIo}7UbyX3PCIGT`!O= zL$_!XinuIf$_W>vtnRhWf%cxagL-Razl%8Jx(|UR zxj&q|d~s?&JFF{He9L`FWk|e$Q8a_W-3@s~7W8fWJWWY@`?!oDkup81ZdYati+e}R zmLGfhh=3?A8p)xmO=?CG5|PFBI^hoZd3Ntf6+L}PitUXyH>GIa36@E|Y4ANN;P>*Y zSoFR+W3~C&jm6N-&EJbcNG5`b6TvrGsi2y|p_U`Xr9#`MW+m)fqgFJIL%hM^8b;ia zy3J9bogYSiK>Uo3F1Wv{x{_N8SIgL#Gda`TySg|6O-DaZC6A4<>^z_y0f2 zr`PLsmN-PG9RPZOk)XqW={(6}(%iG#V07Q<{58Vy9ayGl{!Lda$y^#bBwh4>;i>}% zeU{?Q)(I%>3is`sE<^8GUwltd^i7wtZG`9&A=U-`Z^Z@sFHyAW2|>fZK6&y4Tn8}b z(r6tq+UayUAHW*|USnEN6I=_e<4_k`=aTlcx9{^o^q80T(>-!kEcW%yN441e(c|{z a^X2p9^X2ogpZ^~K0RR8&vX@!_yaNFJzv0vX literal 0 HcmV?d00001 diff --git a/stable/shlink/1.0.0/charts/postgresql-6.0.51.tgz b/stable/shlink/1.0.0/charts/postgresql-6.0.51.tgz new file mode 100644 index 0000000000000000000000000000000000000000..f7a7fb2e543dea76d7feef9949c60e2b8d110ac1 GIT binary patch literal 75272 zcmYJa18^qa(>5I2wrv|5I~&`!ZQFOujcwc3Mw?_~+s-Dr-~4~yQ}s>FOm+3??m4Gw z>YT2=t|pF!!2tQ+1*8R`H8A`UPvDZfUCB)tQn_+MK2 zI(8-_`4aFKf4k%vd4l{nm70k<5n*xroIEuNym?iEA)9yobi%$IN%Z`agUeBZzS^$U z0560L0`dcd3b9fVylvZOUlni_QVsf4V|xspesLM1EAT6y8;Bk)#t{Y%@Sb7KG99Ua z26H-%y8;`|o7J-f37Qw+ZV+AV-+^3Wc?{WFu1sbdQ=qL6pbB={pMlXm56V zH|*gjlHbDdj<7TdUy>%qyJm=V5f@~}2^TUg#zho8P7Fyp=fXFiwlczH{fiJC9gsYp z#P$#UQ7_PH&A}|ee-$=@gW^_tgvp9OcjR7?v%>& zqO#(~1XK$7lnPi<{G1qAcd@Vu4vBEtY#LMLC5{C(H#+nPL`j;Z!a5|X8Dk;DtWJ0j zmJzKW=^y8mWZgK|F;ggHu+cH{Ed`!FG7Gl=U10lig4Qhv)NaJnPqQ$M)qaMdfKTDE z@$3cI4Snr1K;<4XBe&!0VGAFKf!T&-ojvYL_pX)SeuSkEd?xx>8&Te6$i|4@zj`$g zt1enRHEMA&J}$K-4jK_90EG-`RgIh}TRMgWHYFrorZpKG4SOboSeb1q8y5~v9r}Bn zJ-aZ~6F&*eZb&#uE?a{agbBaNM1i5|23zoSd=H3H0Vu$`%~#k|@fDnfHm6f@Ky>$= z1jc$|ESZo+QHWb2J@8;FPn!V-Z6Xe+cd2jC_kzgw@x ztmb2B4e_c3*~r!=Er6U1)ttN;znkw4LVyBgC)Reo4*yqVYM_A_2* z=s*_b+JH2*fo6!fbz}?$5O17MvX}trrTdNp=ZLPrWGKA8RHZ**;pefCp?3VCnSLTG zdJe*0pcmxuaXOIwbRsks;^f5zKOV{Lmkscn)18%h(0eE{5=d^w?s?qmASFO>(C5!? z^v}_0mg9P`!(&tItfc0kCd};KWIXJj*_?o#x8m7?Uy5gl|1Wq=wLT0s3B>|os{T-Fx~OAWHFk% za_`AEc)eyInpr;^J(_+Pj!m@m#m2t*Iggxz3Po^;*ez^%a4AU1@p)3;A3{y?Xvfl{ z*mC8Q_7!1q1tuS4n)PzR%!s;iB7!yBh$q30|Emo=;(PR}9VpM=Y5dY{WXWnm ziodRyu;w{V+#k@zPVB`Rl=+sC-#hYL9XtG>-|%oz@7nZ-8tmKW<5ZYPfH`#H7&`K` zF557ihRp;X1!MSVBarm7pcy!1*P5WR#}Wu1aS>N5V>|5x08*P;uYV0IiKsXN1;;FD zp(3HU(@n2K{J;8kR2*4MNja^hJx>;Xy|G~~YO}d-<+w$_u%C~{+EZ3!;y|`$qViov%D`o^nP+{S`zU^w&yk=()ULf1Kaq7F6Z>A=4WB5nm!=Dy}l;QBtpihlESNHU~>}KDa4@T*_>(|!P zdTs7(<~WF~vv-j!MR$8E9KKE`5^Bs_kUC(Oj=Z1a}_6a3LtxW zwUB425@&!Bzz8R;YmEl~csx}rve0ohpQ-tI)zFn{n+3>Vd4A-*oFXWR1+AMedG_dak!^?l z19E8a9ikeY%61}^EntL(&0|-9-(_Z^4~~B4;dzHeLvAu)$HP8O;j5rzxAik{`2;91 zb;9o?Ih^#S2qMb8an+l{27Q`ro|DcFO2p}K8U{H$=(+1+14%LqjrfDbybY16tvXcO z&Om$a5PFwAC*ltyI1yrb=T4<5QXe={j*}dmz?~mgn-D8|))(;04aTGqOfOPwi~=>SivR(cNys3qZXRkU*uPI`;OPsJg;5v>fm(xSA4qkG9P!@&fePgQXUvB?3N#CZ zYM-+TrqTXoWVg4*&^@FafbnH|HNkBph9sK>U7051z&BBuC!4~(1lGzyf>gKgfLOzZ--4;tN)AJJWEZ(GSMI(dFQ zA4GlG-)?#C1P9g#eiTr1vXvux9xE5bYZUG|@#qb|VhCuP{Szb{`5apwqxZTMj7m9- z*RllNmdI|wiEZ5AKy}`xTc-h&AuB{ASVgsXET}`y|2W_;F{;J7(?Ahtz!|+N5F%7_ zhSP9{^VmzRz;uE;<}FQiwgE?8ju24#9`i#+$Wew~yQYv{SjOK1L#(kVtx#`Jsd?F+ z(yFX$R$0EUpM#JOETcZrxGLDQ3A|c*JsjK6xelZ z_Jh}=p-Y0G_p!WwE$ceD646XS5hc+PB`FFFKnjrX68&f#tr>$Qw#i0x6_U=ups(8( z6I50igH{`W){8}6aV;!E%YOKw#(n#1stA)`yTv3}g8rCMN6SXfZdXKbuzNSSCm342 zt!iyjgA%f>D)VnuV->oSX|(~q3GW`bL)n#CkH|(cofyE4jYB55P^LwI`0x59n@t7r zZ>Y~7RSZ8CC&4Hnu}G931gvP$jl@1dFt6K}2N|trU+JxLUUkj2QxwxFX&V@#Q%)RB zV`cG8Xph92TdAyb{^+Ec%kXKZmkcyfxa1>WU7}PLGE&($jY_8p%JQujmkbb5sw6;5 z>mCfUB8u)V{LTau%=Z3aX}W5;>qiW}Ri40#xq0{fx7@DJ^qTJmW?6?%!scaG03kVc zrNV+RZn(jw~lKX}EHHS&bzFag;psq3#dik;7!jA83svGD=G~08Ue0 zbe2|m0PjFc91CoQj0$_KM#?hZ-|7@&buQ*JvxgM0oQz)r!+8IM|DqI6EvRYNmjIq( z;A=Ef+6|_MLs#T}Q2|bFa(|su230exW*1(u5n*W6X;mMCt|F(Kit{1r6OWu8WMpju zh8|`*LX6vI`jN}i*((Wj(KfV2$*K`Z4azy)wAll zyuW|jChtOVMpf6yY))p6K>nea(*-mv#~Nb!75$Z8k3NsMMXYNAcc$h?!CnjIafBXn z&&Z2yb*t+}V#&fTIdHH5#+*a_!`58)?*ME?!e0u>SB>j`G^JUnD5`PEboLasKQl=E zQu{Dr6HMKr1aAs`8z@FkKV!7n;61x;W_`#qWkK@p><`S3t2HK2!9cH$=M_0@Hu+e# zG~y*a=CV}0pQd2QmqH8FCnHq)rE5I*I-!56%0mw*e<69SJfZ+k!HY40J(>NT#%<`T z=`l!H3zoI%bT#2Zq`hEccN!ekq{8{fr`n!Xqe;<#_CCAIH-SJ?Sx1$LAt`w@qUFij zVa-|Se7R%K*4pOPPlfM#izUCV?uMOQ-bEI0$xIJ(h6qom>5(QC!tYJdF+e`(omlci z$Ika$Exu>Uw=zpcnaxFQx7SF^_HaWhIFZd+DeWMXk5{N-;7-JQyxa)BIzQW*WU)HJ z;0U`=F#whBHdbkynQpDqhlf&iG?cC%+Wp>FDR?I|)rN>;^%~jH*-lwRvp0%v9Nyif zM=AIq{5}D@X3wj2by+>M?!LpO>(xAz>9*td(19oz?bfg~V+>tabuQKNq_rrdB08Gw zLNDTUxy^5NWs_xE**LhO5ttLGcscSTP6LfJYc=-KhPZ36C742itx^a7;9u=rR_AnL z(C%z*aF+xS55qJI8kI5WCqwH*dY5V6T?QqNKdOQ&}BGSti zx)I`AsZZ)@mrK?+WA+`IQ5pJ|}n@~-4Li<@-q()^w2klkW$pwsHHt&6lZ_ptmj zA7F_M+57vNYV5pDUoj&J9)4*Kr);}qh?+dRm?9~%NJhN7KES4!N4nNOI@K~_dK}$G zm}k~HV>8*WlV@EmBf;!@{0Ys3Y%lQQbALaQ?PWnw1I!jOX!EW+jiMDRjzByy+MK85(y`y9MCS2O zVmr|}?qQZhQ^fu1!{?<+%oxSWpC4O>X>L_z|IK2FBI^OS=zSI$bS^+-x~(#9Wbsvj zS=s5^W7L<+Pk`-hq^wOlx~deuAM=T|_*k{=M2l!?rp{Ob(Kr-qACo+^y!eWlx(fCAU-u+iP_RBEJT`A*Z0H?GPQ1p?vt6c@C392jJ0gJtZHhnR4}vx z&lD~P%uJ_c9HQ#?RkK{v1TIIYRR+p?0$V2rC(4Lh!LiL`S1j4brm+t(8g9BsCzy&W z2{f~izYRH<^jMfwcPl2^P^E#>x0@?RPLMsd@>+IV zH<**5w8?XeMFC8+RK`h#-s|@yI<1pOOq$ zM!h_3k%9T94y0X3W7iOFkZT^pyJnLhbqh0U`lf*>ig0i{p=w(L1lGXG{fIPu^8}A( z$yM(l+dHG)%|#}(NGF(Pzo(K+Q@g4uIOVaTT$i%F$NH)AUGR#ggD$7CiR{|ZtR{2> zv#63(XvDN$mNAvL{C0!(jBuU*6gJ1QUz!Hs8|XE6F}JOIgJ> z8#1=yl}xgorw%JIJJHpjSI zoHAGUvh@hlKc8HA;Mih#{YeN$bhRA4&2foDnh8A~EC6sCV$1=;L423Ffu(1#f-pOC zgjtoOX)@}9*3CdY)I7QB4QG4H!I(7@IxHj?k0fMjvS5r`rB zmYGnTbu#|&HPqP;s(PL?v)BBmrxk3q|EB?jUAk9{@n{yKO4{X5KFWW95VOFh+)Lz) zxf<$!TRWl6hg6z-zZ)2tje#R+h#nR=GwjRSNski`*UzsZ< zUd%O`NB5JQ#XUeBip!5n4^Ndj5o=z9Q$cOV(C~dRk%I<;STWqNzm2vxV9|oL@ykT+ z%zTJVEe>YDEya|W+8isA<=1Mo8Kp){U^p{gHcv6!K{r@t8_hoqjFejp)k$b)|JL7n z5JOb$R7#l|jpq5u&F2~x6qnST8STR7e7uT8@j2Es>Mo{uwAQMS4x41Lh*^obn5LFz zN}4y@e^6aeJ0F} z&q5R~AuH*~l&ax0JKpPW7DFqWN^5ScKNWi49=yiwxx-qx?Kl;xBZwbYp-{oWpYp^` zx;t8_x4rOJYaa8nXs^CRdFsx*W~0oMKX%1Pv@W&gBozDbprq_~8q!C3(}>}1Jt8@2 z$ABcoaVP0PR)Qu!1Zb>MH4QCWOj8>8`V_@+t8X=4lV2Q^hMtCAA*sl1{*oPyfRYAa_fnE>ueuCX{aqF zd^P>FOeGD@(?5NJkzg$eI+zXTMci)Q=up~EEFVm!+t{%8uJO`+kKJ#0Df|VAmzPTgYi`8Zog0~_@ zD5k~#o)o8PKuKKz&G@$A=dYXto8{HaRjTG$(zIwFm}w42yuzZJl;tF8gS8r>GHQWe8TA9eglg3k@Emza{+rd(hR7oX z@u&N6)xR2<(FM}Qqf-=ZHsvuQ7k#e ziv0}DeoRb{BHc)^iN_6A`$HSMNrS;7f%&J#zZNvDrHK4_9JOSPA(`4;5nF3qaDY2e z6ry($LPsG=O&4L(k~-_|A5oNgV&#KZ9mEc83f!U?aWFk+6+}*m_}4CFi1h{5!*A^NcTST!W1ZIby;m8UQUYI|{vIjnaEBW> zZHUi3hjf&++Um%)RTa>6JSP#|xvs+()|@jrq-CgtN?>q%ZjT|9w8+~xc$4m{mBxcJH*EkS`wws5Z-Pqh8BaSUu@V_P-oE&YUSWe9C3DE2)*mP8&hoTA=e>}%TL|7bIb5q@B9KW>EALnm)p>7 zvcuIlX+53h6LWiaN8IQ1GvKpEcQqgS(P0m_Dfvx;&DlcBEH^nSlamW&(zql$-y*v+ z1FdN4`KG-_Kj?WFM!AQvmRR&n%|{-DWTQ^zyHNT~x?TKMM#|BJpzfDIZ#8GOY{E}y z?%P+b{^&k98|`cJYiYAoCRvEnG^c?9xj%$MU$~&us+Cbk%^ace0ZI%Bh(X z+6+EgB|j~3W$2#_8_8t-KUc?J{h*&a*HKHODa-vdd8Mgn0#8{&%R|GMoQ7%T>fDG4 z;s<;2K_gk&F?*c5OJFAQPZ)JvbLQRC0nmXU1}S$V?ih{)Z$>9;F0cL=1jiGwSvN`> zeLJB2;_1%hBaUrFKaDyugw{odrbG5*S;oi{p$i)6H))CfW$;o+l z{L<$lV?D=1MS3i}iBw&}ODDl>_bK2F3g(S1!0>7gp;YI=>r8i$2YsOs&Tr+DWyJl@ z!x;2sCW|0F>jKd!&VGqV6RQ4dyC?~M{Gh`{>H~hcAYn5P;+(|kM2}j63GxE4y+uyh z`M|A{pAW$ZPK4wv_S$>yHZ*zjjm{<8aFNH$H3sBw6KNl`(YMYUx|3Pmw}J#ezy4{J z1i?FS2KlcZddwu^)_ntPxv(RnD?2;`y#FYhKE%6`p<-3;x_1MC&v84MppdWqJ!gZ9 zX}$%6ybqfLaQZ+ZKPYOqu>nh`ye^dj=z{RglZQp%zGLY8FRi$c`K-JrT#D9~LCft= z<$K8{J7OVTs8Bg>Uv+rM2Dh2DpKa`kh>^z3e2PtNl>#m$W|M58PNf zaoBJ$2-B;I*)H)-Eq*n^!%{HFGd2aGR`A~YaZzj52TQKJ zpSic2<~#0?1qAOfJ>#U1+3<$Qgo>^z4?sggOUaK2+St$lkzb86F`r=7VkhdG3Yf~k zmZ!3{Qyp)jEx6`wv-_@MZg*7@5|t*vl#e?R1`rdy@S+K}14c?yO0L#ACpFnQtOf$4 z1F~4pM}!xXkg0dfW##Q?AmgBOdF+ZL(M`#B^!n!`SRpp+v?+-@UCJqEkE z*J~xj(ktp$@*_f#9Y#<;K+4uHe&g;kN&7tg4f&EN`91RiplmXYrGY{=u^%EXcWTT5 z3?3Tj7Ogi`KH~NmH#)m`-;9pQaBb~7#xfkwsA;z=hf$(i+-9*4d)nu`i51+L>Vdu@ zFi=ar^`8csveWEmY;~AAG``P3>`0q{)EqwnCXcQ>)}yEwp#a#(KoFRR6Plj$bw;^lLdOM zb?C()e@2{_ehoUMK^r$=xE##ShBYmW{}}dC*FGkz8|ZBsWu&3H5zbev>*we;0ZUPh z)r3VaP(7f!AF%w@T}KFDDf1ZEuUl$s&&U@P;P375^A7O3yW4$Z>+S!7i>V2X_1ro3G(?7s2f3$u<6Z{dz#~w!S?&`fuqW)EK4z<@P_U zZx2y7%f6Gx?OA=IZs>e72f$-I4ekdfI-idW@NWuP!|vF1`Vaf-smRK?$`1l6rlCvW zB8(^7kMDf>LL&?=&Bj>|$NR{?W=r1G-I--!+3}iaBl+EqSPGp!gunFLs!q49g@3EL8 zV4}*8OZ3}SoT|WFMea;aXr^T-jHb>eJ)g2TZd9OnZV|8yHWlQ;JnG?Y18lpe!ZH~A zyCEH55P;gsV=%aVsdx$YWgx%B-;lAD)k{L+VPw+Gur@OBS71^YuIzeioMiDt^{JSX z$qV}pYr2;yk-5zH=C9l)lCa<(^K}OpqhbaSfO*T`-8O9{C zQ0%zCIi74NGq&{(a#KWlu?li)OcRcJ?^$N+Hl!oNM*hEknJCr&)whG%qXOO52%QKu zSPV6!*EoKI@!gYj8wtZUj}p4bTB%eFf^rMQ*ypsKP88WaNqf1>P%U=^@*&S%Stz#~ z3rt2BpR<%^tU~bfj&>;(MivMhNA@E^RdbEnM^`qdvb5G%cVa>y<>^j)=7r~0m-}Fk z+=&)O&Rsc%V#e@-$^dO4>V1#p9&fx2FppdvzryCUcvs|NEgF?9UM%1WdOKUwl;v%X z58KH&p{{?}a6s29IAD!hNjN}lW*(xEX;#RSqsx`#HLzgSuiGoG`>&XL_`H9}+_qFt z@)W158Zq^irURZ-98wJxad{4O6J8$h5bD6M%hHoeuH|uChpkg+_M{YV!JWoQoX3)BK{|)7EcJJzw(Q_ce^p zeQ-3@qYH=4gB^N6hQp7eFKt4bs+y^%`OOX=cW-YEbPM;%v0qO#)A+8e%M$txMNGEf z^Z$A_9r;K8_RJ^Vp8w+dZ4=n~

)S;3=ChKjntE}@{qqRKd*!uoSLKqqpW&0Eme zI0??4ecCa45-((lLyodR9_wG_$K0yCyQ|bZ+<**U2yqG-9zur@k4NQO?%zhQ2Vx6K zhxFG;OAFraAE79JY!!sBz_e4MmQN{}JfiV>#^jJ7xGvTYn;qn|&tzh#zwt+zZYDQ} zkJbE)&1kz$B<`voos20!flYkvKO>`mm=5N2U2`%nRz@D=X6s#IJ+-B<&WGap>b2UB zpgG(_Sttd^^K?RGh1P!?bc)a%{uN&Lv^=w4JzlB}H(iZC>?H1eK3s$Q^LbGeKWlFI z7j}K*WZZhL37$#JDOry(FV57vY87N+E$eH-+q+KsVjP|ECun=Lmi45A>kW=KzUx$yE%t;IqbD$`;d^D0yRKX82qhlKcO_Olh|bQ% zhA&^<%ZS3C9Q-Ez;O};~)v6vG?+{a|&8;k~KLsTBRHF}8i#N>0dAa>W%S7|<`Ej*{ z_mp%W5nGyZ@ZgH4HCA=eMdveT#lz^ot{tl2m~}#~wFyU~#Bx@9+ekamjGeiDXzzlG zFSio-VM-m)%r6|2XL%>=y8m?&C`&D}Ii^dzmvS;EPoJIEwCi*n{sNtjynXMXTbNtQ zQ%zIP>c27fx67BSr$FK1kuj$;Km?-?#{5s4Q=7${L%fz;I#@I5Zj*GHx63}CXq%X> z4V7f+1N_$m@a<*+5U8|g=sPs8^gDt$ z9QZa303v<$-7lR0i9SEimij-=grP@o*ww#cEz{8f_!xMQ+ID6Je# zB`rP8I;o4AviIJ932x~{us{sMJOU0Ta-$=IMF7n;rOVXjc_%1Fp!eop1>FXvsmFfB z(1j`W^*ySMEg@L%CibfqoS1FFL0Vz3t|=DQB5f~dJi~P%9Ny(YS(<|`EM{B9iMj-Y zBhTEz_XI4$V|@K#1xz22K8vO+l!hJKO*%qQ`D%JxFkcOB7djms* zadJ{@+bnT;Z#*et+Go}-FLR*2hGelW1;Bqe#3CqAssV+H4CrF3yHeNCu`0&9 zkLhpiSl##t0WFLtQ1bp<0d1--h=b!KC57g3qB~u^#CReN!{Hmvd0L9`uRB7`1y>Mz zy|W>-rh7=z%!69F5Odc@oh%jLbJ{5D#tjvlN0GZ~Kx+0OKa(+<>8HJy#96(_lLl93 zKI!mt62Xvcf1z>UcX814?5nsq^ikR6MC9WsWQ%Psdfw>M^>woO8xR|~D45?}b8!F* zNH^8gdaD7F!F0@8gN4e5Dbda8^jUPq&H2 zQgSzE_FZ_-9M&fM+zFlEl>&q>H-+|p;)plnKHUI4UMGtacnOdK3Cx9^r%62H4U3da z%{~U2w3i9{_eMDY&5L`>h+00P8`2lFW%Cm$VFh(T^RtjQmdy$1(}BBxZsHAH4piH&MJH5AN7P`_O`Cp#wO%dE z?X)G_kE4F-elY!sDr-MZ`a)aiz#h)K+Yl|oYMxzCaDpe*{@ql0)Dz1~4lva~EE5_! zGdxKizG2(tmUSuS{Cd0E8(dh~_`8(XzuE(z)?;OmLld28neL>bP49Lk^;sP6b6c#X2evRyB97f9NkV#CzZ8ZWuq3@5nm^J<}%4y{7qgU`UeeuO+yI*on z2BmQGJKh%v7E|n}j43%zWa7P&e#bJOlt#5)px~=D$a|y|e(Al(}v8GSpAMq|swPy$#)9WA5`&w(8 z^#P^5!8Wuh0Z`?J0Rn+9KzJ2)#{6@`EVRjxIhlve1|r`8DI`P_rq=vfR|v)vrU>`% z=X3LOaa&y2vVSC3BHWd09nw2fhJXAsGNr@Mwz8lPXC=R{qM*;v;PiRvIaXem@za+1 z?yl$2ujGPywfcT~_<-1ei0~GBZ8<*oX9bBT_50eBd%ke4SDZFY%Dh@vR#L0>hBKef z430x4Kv<1qcEQp$YL|Ei_;V4{eFkp8IbiYOU5_+}g;@Tz@P)(DTi13M8Do4z=Zdok zvp!iwC6ppBYkh1N6kc2Y&tkD2UwESjH*u@rv~hR4S=0#W-1QcEAr-1ZNta?46lPg8 zAKpP@G%i<`U6d&TYMPrua8U^g16pX6yi`+Vbwnk-q zFF%lkj!O(|x>J4Y+& z2^3f%(1Melqb`#Gdrf(uot)J=as47gb(ij9D)SJf^v7=z5E(kB_Z!;K=zJm>wHxVyj?()G0 z)7mh|q5W<=ZJ1$$PBZeW<<^{Nb5!T}su$^yJ%bZ+SYba1$Kwe?KQ(dJ;vhlu8j}5@ znd|2Y0$*?6j~?1@n3#Xw4vwB}FLY;EPW}6A&RFdP4Wxx5%AwS}3GnfLzyEwFM!xx( zSQqHy@BekYGJhi8Z6Oy9EI&u8v6&0+u#AsoC?QmATo6ds^V?0^qH~omKwC zR-fVBJ9A-fkTs*ar%C;wwkC62+3QAgO39o91M_e^&J(o8~fo>Iw|3nQ`$q zgYD;03*X4FmTWuL+%k(63WC3dqIE}&Wt=V+u>Dj}v#1VK?F?<9ScXNOY9vLWS_-|u zyN=kUS|gEa-V8PNE%mr8sg%NN=E;tWqvC)sUBq4}6$qfwH@23(bCQ(1G2ub9d=4p_ ztEdu}AuHc6Od#LjsvT(9BDq)9!=Az4^GloULcuT1KzU#8Fb>FHKl?dNu7z#bDl#4I zbnR#oj7fjJFgh8@J#@D)x$<*pd%ZL$iJ@>ad2H4mKg*2LbYrdMv4aP(EPPrAJt+p$ z+gx8xj3&xn(_H}Dlq*u?^u4*0D>|A;mkVA}Iz?Q8P_TSZEy|a#xR4bS1#Qmn;!o3h z80>daW{;;+2go@>4(fO;<+%4?XKHgxXTMc3q0-=qe;gUg)lRrb+<)O^+gzW4lgbWr z1E{DLN^>Gu;lZG3uU67sNUv~K&=twF+-7F;~ASE(Cqx}S*jA^S}b@_#uPW@EDs<7?O^MuRE`+I`e)|8G;EyG+HfFQBr zj%r*XCV{4)3V>mwAxbQi-qlK1kH*VJ!ju>UK3O(7Hf`+9xL6^*6-@3`jlOvaI<|38 z&%o+uEU`6$^TlYxPzGbboZPoTV=iXbw%O$gXS#qe;P~*ki^ct{>N!Yt&IF)C`nxlw_p@ zGo;H3`VkQ!ZXyaE&ndwkB{L4gW`-h>;WolSfsdnVh5?t$xLZq39oy9yLK4#ou~722 z1`iBX$$($~Q@jN*51 z5xu5c+ePyp;sc?DD_@UR(N5==!o7Wo6$Gt~5RDr0udON#h!W8f2VZUK&3qnZAwSOj zp8O?t*{<hD$-

(VF*o-L)d%aM!vOnRcyLeGb zHrIGF!CcZadXJ=UbZf>e$RMuWo)E2WxJEsaQo00*g!DW7{9C@{UnNPys~NtQ8Q7~C zQwwiTgB#T^tHOCbf!?>bjrZ{w0$g%)JH*7-)5LYiJNue9_4z;wdTeOsc_yK#e>eH` zuaCET+D*wJbsNwqwzWOA1ZMwgW!Idl(U|Pj+s=`=FY7+c$lFn|@6Cx?OSoboEB7So zP{(q0l3`|db?DU0{pFsW)v8o>>xs^g>qgQcDt2*IJ~m~+)u%Lr}r!E+So;_N4-op?%ws&fy`Y!SUlEi`kf>7 zkbTChPQ9Nu3o6R3E3e~iGpT=-d$jcE$>SuydnID|I4s z{CK_cUi}4rJrpJkb>*mUXj#M>B{MLhNyJY;0(X+*P|76UN(W3~~*x z`o}d_sfp{50s;zmLp{ftxAS5x>yclMKC!3B5Az&Kb{n-_Jbb!-*43rizG-a+GWMOiB<*SWJ{t=j0 zV9c@Mje}7siPvGW{v#Biv@5b2div`qs>I>4m7wCgnv`5wEzgRmpP~RRDot5Lr=~s* zhlyFF8j6c%igNbXOMWax{FiK{v6*isx0~OR%fCm^t}ih8D6nH_!x+TUymqrNAuPnQ zC_avbOdGloDt3wrRZ&DJ#3`IK%sMa9^JtrFws zsCDD0gw>I0T&fGD1$Gd(jCek~=N)PXT=Fcn(xZz$q4T^0<5>lA zlz~+DF3hKeT@`w7+KIvZNH-PpUQ)TU_msC38!j?N3-IQ)5q= z=;9(K=w^X1@OQ0BrL2@J>ZK`qZbB94bxq{Hc}n!U6wO0ER>62;pt86&t@v4x9aG`v z4*F*chlc6)OUf+nH$vwNVcpZ|Z}MU$LN=PjWmk}3cL*Dk*n zpDq;~rZt)>WEZpH#>K)QQzdQrXzwqN7`BR<@AK26wYxydNiUxr{%Vz#V0zKAHfC@+ zlQ|AG>c`0TRfj~DMrHo5Goqzp@8Qp#9gYYEk|4V$s+4*)V*Ypt%KUw%aB;feem`Su ziQx!pm=Z=TU_qCZmU5<_T_XZ*EqyX%fi>3eIBeRqeyOW9k6BjQ!Q_PcYPuUf*BD7+ zk4-xB9tmEXHeFT}L_V{B^8wzD@TvAZT02Uj-`~&d;ElY`Du`B{*F` zt`h9;@(FypFTW^0@D$eX7Z&JMQ55%U0iItzO>Xb4tdkR{ZHS9Z=Zs*0(z!dL#cp`$ z-?+F`DcJOFpClbobR;`A@MqWMs0icISEYBK6{D_s@B!z3F#ZG1(ez^b0eS!&sDX_4 zOl75^J+XruQ{6aiSv@&oe*X7$$A6U@7hP6nNxOggVHR;U3qe(Hyp6y~1-|4f?3c3S zYV8@GHIKx-Up!`sD*&df7)q_>o6i#txtf z<%f}MkZG>1+$^`Wieuf5KXHeLe?mQoPP>P=h;oCpr9>$GhzZjGf7e9`dlK`aMYJyp zq&-bv?9@230^gFwqW*;_?u_(HY(g7j^qBO7SBah-UQ|1Xli5z;uLt_;gRLfhw>s~{ zHJBk9t2ODZX~Q$CY@>0UiXBEV2KNZfr~>O0A{%TVBpYmdhRl(qHhksc-yfSlrX*39 zMg(R+{ruS~`3~e&&Tvd3IF-2z*|5~Zjm5CWO~F-a&ghio^;1aA!cN%$oa(Fc+JL7` zQoAj8M+cmT%pIn)D^MA$$<#)xA2l>7bYiO5$tAJb6tpq2s3K4r9I)SwlF5bD5%LnS zRd~siBO{D#N8k3i6hFWs+(RLpH|qY%iB_a_r-W`sJd2vpUxm}PymX-oH4gEYx!(5h z3i(@PM=*$#osDpCP_S3UO0#BiX>d@{htcq*?oy%mvp+j3p^^uq^rSbhD5G+B4MMec z`uKus_3B&6`+HhQG@C{Gq(b3`2eR(Wg8iF3eRY$3<9FT|bi7)V`OxWtm~`f)%^})4PwhLIi)q0Qb`skE`cE-Q4&$nXisqI6I8dsCKAp@i5G%rqBPny zNu$!h5R1lD!7wS$okYeCd&ai_qXDx38;;><$|NAZW552(TAskR3DzA}BtE`ScFb!A zVVGhhDTzS@{4A#OhjwY|X<0=>qeyFQ!yf3n1OCe|Q)LRJ5$V;V#xhz6+oBrMDl4UB zcl2o`a=0ZNeA}jkLW)V#Rm6}i5kv*n zXp{5o!fCqY64oVo)dFJq>#4-Zvp!08d3g%w8r+CM@ey$af{SGiH?g9!Dx;EYc?&3l z#Bn-xHyI8!P*WE)O z;O9?hMjegq>tf;ocsU`uV!;UhlxS_oKIM-;d+_(dqGuu)gmU z&KLrL5>%9i3z>X|v^x@2T*0~-88_6PJZ>OU6c$ZFY>7pqFh&icu#BG17|pCIY`m+& zI(wTgP6^w4gHZ;ivCX}`^9Ynbg{XnN>PA)N>rRDs5!9iq3CqAv0U3$;g z+x_TDu-hkGe-9b4V&LCl$Nc_ouK>5(hqu9hfP%^4W;1fg#MzV!`m?8tj7aKo$5ih9 zpNnsiy@F?#T3BiRZ!4f2|wh98l$jvd0x~i7HQ|k2hTegmE$1Sar zFsPjB3*y6O6R8NHveGM+yc!(QC@~UY;`&7G>r3_vv)mn>@Q^hV4`B6%PShmDCB3x+ zgSvm=2-=cs8-iZnJ-}?bF#aE7?-(4}_r?9j$;6o0PA0Z(Yhs%n+qRR5Z95%nV%whB zwr>8vr|wht<$cq&>zq1WefH^Iz1L^0?{|~zj}kjNnVTT4YGM$}39q?9*(UrDfWDwd zHjQ522M!oqaC`t8k27rEgoJ*Rd3*rFV!NYmM&~>tdWfQj_GSlMT|hJLeJv(*6K^R@ zTT)F}X3bgcvrR~FRH8N;u$}(Kts48LFG?;R^05V5&+xtNuhyVb#N!MVRZKSzsY+4d zI!T+Nk6QI_JVTVIw8+etEOz1ju*hUXtz-?qu{x=~Y-|>v^frYUg(*M@yi?zRsjyN0 z&ejlE!t1R?L5EAU4<(bxY3ay0Rh!o5=qRa!)@{2=cdCI~Dl1UhS03TD3cHVnw-V!N z03*DnCTh>Zl0Us_knre$w?nZuR#8PE<|<EB<`dpOEFDS{X&R82J;*2#RDMb- zfV{~T+5-_X(r(uW3liC^5#as)5=VF<3|-)vQ6pQTJORWUk&tqxv8u<2BPvOplOrv8 zJJGfH0uo)nSs{l8MFFkl^_3FmTiV3AxiNLf&N9u=*C3MlL{q_P<6Tq~UWE40hE=l# zSRl;b=6|}{*B!VUsVt=hivS*{ZPnt^57HtG{@3OQ;#n1wHw&E@LX)U)?t2emX z?~CDTx3Znj8Ve@>(zMz?!maQsm%1o9%xeez*qS>mQ&jqBU%70L$Ek)Zzi6L9-fB47 z;4Mf^oc*Llgtqg*2u=hfo-7Ntv7?XpWI`Svrv%DYVIdRwb^?BX>ci$h?cvqP_ z2&d%fL`#^RaM##4EQzxz+GpIje}q|EEOM~_aZ>N?>q*ts!N2DBaCm%wdhod#wY;oe z`(K){BK#LBw0df5uOj%5DQ)8)(%2g?nL@FK)(r7wyvKE!YQc;=;tS%xJk4mX^&2D* zQ+?gDWq6^1@Gba%ZIi}PRc86oC_*ovDhNI#hX+@~a_N!e6>_7@uk`eMSG?Ztwx%g- z<8qQP8TOH`e7QZ{Rhtq5hs{P8Uld9uyq=$TPA4nf1iDai38m-m+@`1F_H+GwrT9mX zrW0d+dROygu)>!!WiwG`T_G3=Tcv@L`)k(;n`}^s69)ZpB~V^Rprtec0_4(+$uOP( zCOi|R?WWqhAH!8?7YAE6Ct@k(x!ao;{zYB71yV+&9l|<(yk~ojy!c-ogWen_ z!%0-?{h&Gu`Y8qBFPzBK#~D7?Z__&_Fg2aXat2DLC4&ZRP*$fWTu z0Jax#{gBlAi=5AD8I0yInJjZ=Uwg%5rOmDN2a9Tr=G2*9HV4Mueo<_<>&~Y#os6g5 zo62UG{CjYbedVUmt}$+K06v7sz6w)p%M&NXjOW*y%&9Y<(6I9gk|)K`)H0aPr82*C z(MAJOn9H@WeCU$8Q>66Ai)u~hmYHAr$u#c=Wqrfy+qyGGIqJ<9)mc1fQ|=dKU#%#7 z*pdXK*^(kBfZbVA`cp*==5whm9{Y|I#i%E7y3;28bzgaqa{CQcr`>5%`V&PAW^9ik%nmVW4Cm^v~P)a{< z-wh4(3NG1u94M=wRm31ahe=tU30TIYIDt#DX;{q2_uofS_AjE`{!6Ychxg~5m zmfT-AN?+^CXmy>>`UY#nKL>i!WF;8?X8%;&U+?#ikzIxnAK$Ez+?1nhagD;2SQQ!` z+$kQAefbPMBa0+uK}IGf8QbR4U#+SJqcgD54M&9i9XvNQpL-yP+azXtM)g0mR_9!T z5tEmaQ$Bc>dI%i6S&_E6I(NQ`c}@~W)Yrev*45L||0Qv>3~g7trT^u8`+3mUPgDQ@ zhpeGY3ELLs?X40)B>iHJL83k+(tguJ{oO>-tv=VS?S`A!u(Yn;?#cDizzMKx)QHE? z+s84SC`XT&fv*WtR$YoC;EUB#wW?G#eX~+MDN!4586JNqCQ0J9Qca+-r7ub_mgTd$ zCH?Km`a@h2O)Qw${a<6mbYQO|ex5{9Dc83xKv@vKzE7qLv8T`0*_~eQ)9d?F!L)UN zourAb-F9^c0=D_?bTOTVjii# zUEM4`jD}SPJ)4`@0TtOnfkL|?B*OfrW{ajb72@PFw`H4?ErqQlOQ6APj)K$K%G$%xDw zh5vDytQaH|#4K(qmTx@R3%mF;I3Corf2Kt#;NO2x?wA*spy+N3SYfBV*l8^v)T+C0 z1^VI@<7;6p@k}_}q){E(RBnnpFT8m!N;%1$hJjGQy@)%F$xi2aGaD5r{?GVfEoc~p zuu{DmVAVG1v-Q6FsJ0VhicOKI(=YdLl6#~f=4ttlpm%jcm0OZ0NBMs*anVnQ>N0m{ zBqrey-<1IPt_}7xgopGG22Ykq;c<*srg%UriHHaZ zQ+~iuMgjIfkud}|b9jLaw-HVvLNqlqY>Qosf6G*klM;uermHAxIlCoS8r`=|N{i(o zF^$>803+-XoHAsvs>_9Y2sfDs)kwBkl;Ok`c~|pFwgc`!PmHjDqwODN9M?QS9aKGf#ZoeAJiphXCeO{z8t)W zqQp=#HyXyzs<#Y5fL=ZYkyJM2o$VPqund2QK};IGoXo9KM9shQy4YE)+9qKFc0J#e zoSj;v+O_r+7+9$zdx)WW;z5rP@zSd6lLmYe8)WHR^-*#PM|=_^R<-ri^+qgnWO{qj z3pY$hq)dcY$7IE+5K)Ssitu$*C15t zZWZe5Ukex2q?aHYJD|KsS$}<#UHroo$lV`VggdcNTn|ca7Wqr5tm4F2B{Y$^uwm=e zn2J2Yqx&FOBnpRLV)TQM&JWaDGb)9N=JOVJunGfNH*rODTb`6(^vC@i?b*s%70s1cVSO59Lm?n5)jGrU5y`= zspbqL4>vitwpR~}9Z|-#Qqccq4;~I~NbyisM1`OQG(#re_gj5hE^!WyhA(>bS~{i6 zhcSL6IP@iS(3L;94xPQj&n1R$A=UtJ{!&Fv1NxBl`c%cux;A`^VvzBKc>f|GLDGV> zG@kvDt4mSSg3?>2KsEi7ye4|n&uy3%!GS%wJUQ~MNCkxxC!YME9XKoGBvB#ktX@WO zDoS5w3On9$2{+oi0OBdC&qG?aB}JTVDQM$m)BWPisMT3nD$p8Ml3to{O!Jco3%$bW zv$sJoPcTM^@jJNpvP_Dp@AX`cWnefutgE)|42p*-%A=C?SbtQnG@LtcP~Z9v=Li!q zMgO}!JZRaqRJRsKRk|awK~>=Bo%r!Jlr#E6Mr1}3!m*@FZ~NaAWk}7zwK0NWjDAus ze5c_m+(X%DYNtdvOgo70W|-5ERW$BG*L>fKAKDTsOQLM;jkZmSI*S9@9%Zyul!;;? z7akf&S7Rcq1Aa`yeWJ)6vf6qH^rh&mazF3toBkbX%e4P1v?e6m-#M^0JX}qgQW|uU zNPC+}N~gTeq~lD4I}EWYVex~=hxntqR}GiKUGy^H#6|BBF2Ub{FU4Gt5kOv5UKJlL z9Zn~jk9=vxQoUD}@ge_n4U`&VU6M#t7k%A?3h9prNx@v-M{zfbR_KX*s9TMlCqG;w ztPBZ{`AbBvU+o0Oe#h)*fi;i zC1_S$LR7)7y>2w=D9kF18=5xSIIK-Nlp2a1E)%LEFrmaOC5SQ=d}oE4JGgg|Nq3+7 zvlGnT9QMQc@ogqt>b#rX7u{&2^Pb2D%947-+N!&@RVZ^PQ6 zeh{2QwY9l9q$fM;VMqh=$0ZFpY9v0c`8NjyE$*jBfMt8I-4C^XZ6bE3lRP!Ez^2UR z3skDuLriKlRttYc0%8(%;(dfMWO*GoBNpS+4we+U6yn^d99*+Ggzp~%IUty*sC}{_ zr1?D(7*G|hNW&Nk>JmuIQkY;l$i6)|c%%Q_(fx_qlid^F6OEiWTA=8u>wl_9_RzU- zp1BT=DMl>Mij$3Fn83dY`z@$IwTl~xJXS_O{A<8O&}HBm+RAvl0Xh$q^u}M6+jh~F zT_?Gr>)J+*uucPt{e!$?9x&oSU1kJ?i6-XmXG_xdHZ^CFcdoQ(R7^MF>mUi0{N^O( z*7O&w$-cU zdUrvI(^MFhHe9!DN3>Pp+%G7Y`;(2{`7}udf;(bMQVt!>FI5h5gSR7xRb_t z6ds0?Yk=4P&PvxtXmkj;7FP|2drIE(Ywh(H^>=@!ZrQ-?ZMswoZV<$A?eM3*V6S#< zvnRE^pRJTpn#TxiE07auLJhV+TWgh5X$tR+u|T2Dl_4k6*p#KC=VDg`C0R5GTuA%D zoXE~hY^xH=9`!zDygbhI_Oe>TTEKHvL9C~yoYJ37NMEc4=AUH>~FW&LgJDsv|Rn*orR z^wg}S?lL$rl1I!!i2@hMv)rQzk&(|n{4|^4u>d2`z8ANf?6aS5&Z6Z@soke0R#807 znfik0ZIe5M4^ikhr_KFZ>cJxIHjoNa@k3?xV#2sv>_U6IS+kXuNOn$x*<~V7a}BmV z@n=|LJOYB(eHQK}Cg!k6?(4X2N^^yScU%bEIdhe(&?^#hXnbQO<_sm{;P_ziO3lX1HMj4W zHQAnIIDSbo{JLP_4(BhAzeKnLmZux$mSWuQCR8Xy-{*V*{8UUeICaUac+|+>);hNh zCi*$vPGh6JI!Q84wRl!vhZj;~jvdu|%ex071vdAyirPZ=)J3G3oP;#fct})@mBfvt z0b~&)Ji1xYH5{B+=x2oF8cQRd_O~g8pcuQM8W@J8peXwCs1?L&41{ltU>~jxgr=DA z(7-qTlhTT@O(#_%J#8SUuvmubDp(MyrD~ore_3YAGmS+az?m~JL>iRKbh~wfs4udV zj*)LDx!_JfA!Fl-$ON8?1{iJ1|J3kC(S}VQr;Y^+J5nO0MFXYVWdNu~a3i-OushgE zKq0g$N?xpt^L2AUJ}oUv1Ip$$y2+%da-(p#oKE_)W_k!GNqCxgGkqpfUx6CevyS|+ znijI=3uC6Q061f=(UXL){JpJ)`@i5?+Rs zmwaRyAuA;CsL8Y>7?f$Z$q|^nVbW>5xIll{M6$|Y+Ktu6Yi(}wlzjsrA6bfEYA%XX zi~+f1A0F`-AXOqqs(<6NjbN1>j*e1N=R~ttRqC_p1E`pS$~UN(IJmpHiBBM(B;%Tx z$^u&zA5)@d5Zx)+LPrX`kzMAj1Dh^+^5f9m8}S}8`;-WSg(CYkyWkCZPDe^l2y$m` zW6HqEM}rrQER5O^Y8PNMeC)MB?TN zfvH{`09BO=EJRqB%3hp#?dp{lW{(jmNdxR1@`_xuHj(f&U^=j8htFcg%$T15-0Lhz zQx4Mbygmf?R2^=` zLt2GYdTxeMoP?s+Ur=I5GTGE+rkNJs;1r|)BUB#T-bDmLc)#`g@4aD@_ufP8n)jVP ztfENa@F%!IYzFZi&Xf-Sd52?;b2qe{v1aMfond1eLA2Pv12EE{1I3u zkv!XLe=(di3--n>jKG&mj9E3*wyUxY9hVr`>&x zDep&Yy3eeCNHULhfxgWXeWIGuj5GBU+BuIk6-wSv;Dc;uI;Tqo5MhML@s2a=B(23B zVIzYgt(5G()kF}JQ^EKL2pMR`N_{&(tOJ!)r9F^`=qfSox{tUz@n4zd%u@n{MzYH; zLb>ydPp_Y-!B}{=Tg<-mzE<{>hIP>{+p$Zs8U)SdgL5D{8u>FX7Ya&qB6{i{0Yz0( zOze2B0LGmPH^rtQGgV?}5yjK(VRsMu{pI>K>E(yEU5)KlrvM9o=a&(`P+O1KPu_=k9c_Jn{KBZ9 zc_d6PyC;P$KVAVIkEhpO4D^eLK8y(6Q!mtsFz{JtA-Ul|dboz8sO;Tn13 zGN-_jSes+5(AC$KUE!i?`5HrT;?|8(wpHiqLQZ7E(i)dW62(e*pTQ^^lVc7LE%Rdq z`|U`p&)t zs~0l?-)!w!+0HiHC21X8*&5seJppKYyyZZVCzj^|ub=ZK$U|NFWKL<9iSMkS98T2R zb5s6_{(l^aM(4;#xm3!0rKIAzilnj{Ia9?zMZOLWXkh9VC3CG~3fM|X^F-!D_rW>0C_qdlq}o%N4_N+@uDe5}(1dxUsx3YUEHwXi2 z{VKn{EsV}2)wB?z0z|XNc&>u}wQRTlqSBb^-dCGv+gT~lLU2zHSGmt5{wf?LBF8@4 z>Wf_u$d;G*3@jN+!04@-14y-k?`-6RPO1szU??p#%URQ(R?MD;)73#3Sp!?saT|mw z{7X(aa{%Dm4G6gIKnWXh_*4Uf*OVB!?G|tltedopOn;@3yv=ZiBwCqE?ZI(^(mPjh zLmVvd{Y(lG{@aKEVrSi;HiGN)Bb9MrCkQk@BR1KH@d^k#@kk3hGjiO#M@K-NE<8~K z-nj}g@_0avxr&LFzb31_?v5Z#o)Cf{V4EEw-2Y73#x|7nzc=570*F*OV`gj)^gUbs2;--&@A*mK^pB?1Gf6N&M64`(t#9m4B3C4d7P z?_cQ;=A;K_FAjjFoi2*KFof%$q>ULq={yij>%FA{=G!3~aCM*XgxVRykzi(~plKj$ z0porYrL{4F@WaL1y|uz#)iS|mUbUGzLc;I{)7q>}xZ;Nqfk!&H)l2Xiq!XAzFd^}z zoVc$DP1wsWgTb>M?E$Z&Twl=R<~+s&82u022LgHo@_#ng8BQo1-hgC?PBTI4#xV|Hue)i1#ign?$?O4*N{3??|l!FHSAK zZ#{ky8PhvF_uBfXsmyr*9kq?xB|j2?;e&(lWuVVsBWYLu=P6cu+I>&StqNK?I-=@D zi%W!n$VUOwLIFS>H`43bW`0Xq{d%9+Lc=G*$7wX;N9II(crbw0##dx{RcVhI9MN7p zlIzm+@v_Wf~#}BanrxSGE zdlM1EM~FpbPXtr9E5c!qZ3yBKdcea@1nL^2I--YRj@wYGQ?%%F_vonbwb(g*f7RDj z`DNudokHR!r31JXtSD~uCK-VdU6)0MaGnQFEHVpa2*M3$?5*)XR1zF`o5=Oq()sR~ zh)ZkZDd_$g=j3_obi2Jge0KkOp6^>+k9!{K{B-v8c|TaJd>TrBcvfx0P`+LeX=rJQ zdwi^Oado+Q{5Y75@NhNO*WK*=`=%eeh1cyHC~OKxoo4N*(Bps#>aka3*tS$w+*S8N zxY|d=z^J|O1=i})o~mEp?pOHZX|G*fIitSZ6fQWJBhNBLK>-mdwnia2$aML{Kt1d% z4L)mD8Fb8ZGcTM(V4qdmJ%L)c)T`G5GfpSAOZH7O;2v_P?k&SZ*MfFkchT3CA}aN# zN2$_Jc4HLMKipf8u9&^MMSmDv!d=P=Pp3n}*I?RTX5WUWU2xav!Hhv)Bc3v;Gj$v^ z$I;5r-L;D)dTUDV7m%y}5R~Dr9>NyHl5xi+>< z9@;_(W6+2&!g(3W7VPSlWWRgy|N6jWwI#jHuNHx!Gv3JW2K8W&UH4MndZ1VpJA7uf zn+JyA1=aD$M(ROYJT#!!Sg#$Tn$nnbOiFfG`LE}+F!Z&c8f;NNw4DQpdG%_{(9Y?q zz*FvcN1z;Px)cBLv3I65gLTgWLNvAJV1ilDxqQ@G zaq0({Zuj>sB-^n1J{<=F>BOR9;O|h##VAbS?7zO|SKmo+2;Kn!jpfH21_hb5x#D&nQCD z_t?GRh1<*Ver+Ch%w|6?E4}h^DDrOj%iBaelfXsJ&ff^|%E{&oZ$DV2oBnL&Jv)Wr zT=9S?`AG6A@>QTzV6z5H=Ad>i{y0K)4I!P93$IQ(f@Zt{%I9Fn6HHObL7m)3O4VF) zUp}93FZAJ8;r7gza|g4#=^#wjnzUnBc?FrQ!72Eb7KPsnC7MJI2h-0ykmJ<9A(g(I z;WPJ|97Hent)J;!(gSB4&7CqqaMukXBwDr&Anuue5FGfk4b>!I^037i(~FMN$tiZs z#j1ff(XZ{E8UfX4*JeR7N`E7wXU?_dY22%?gaCO8l&1iz(snKZ`6A|AU8>F5tCN2- zJ3;(uHs8tDYnSo0>N~j9&*F5+C?YbQX45=-P`R5x@H28*>Vq4l$M`HDb(4p57s;r_@}O1|Qz5F3O;eO`e{c;NRBD&l(uc zj!xrMlRSbbDEW=8XWk$vVjES4ZfV6?m%V^l_ba5*XYR zXrE9JmYCjp+6g=(rMRYep78=-*|wma!vpyUCxo^}XR_ zQ?TfC5=219qiJHdAq8IkwvGDpN7ob(J^f1qa0q`7SARNfDx%;-5ai_oJwc!TuyCwi z*4g{h-Q)t%uGJo?xOrD}}0L|nMrx8FI@ zMbm-H-8!j9vLX;Kjb+Pl-eWM&BJ7RFsAsk{!*Ky|@M=5NA)K!M z)@>L?><`5D#1O$G$Hs^2{5JroGH4j^`KY^^5QmP)FS5$kNfPITn?gEa%x3;kwZIm= z;8;_fnR;ITx`WITv2f#zk^GS+Cga}5aC4Ek>O3jBsQPA#1A6(~bkKTnAN1qi5LI2X z?@D2jY#0Ox(>_iP(s{4FO=y`Z1Slj#TTT#Qn}rSpYba-scKJqU+mWs|f7o5h(Q8~| ztiiQnfi!W3oozV}WEFU#(fb5%;TdY30lYvCCl&)*lLUjqDNpBPFv;$;t}qj`uyazy zN&fXz`vroGV-(a^sa1|J@~DmGnEeMx@tsgrO968l*~*{%W~!wm;cOPotq2XRUw328 z{4XsXmqRXZH_IQbUDWXxHM&1MH>(-bDn8zWD2-?1PN%7ty+EL`N_Yg^8<4%7nx!D@ zYLzlY{adQ#NDR~~<&;IL@)@y01Ju;8tn#YQOg)yzNg+97FP?Jwy}iBev9rB7IbszQ zsv3jht`HRz_7=l0d>_i8~o?Tinsl<53sBu>=B(XOZ!V8qrV#OKu;Pg$~4(J z#EvsvGat3$83Wnak;XI-Uu@2t5tDzU2-{BaYrVYT*#*(Fr;6}XlCa^9iOLXj9AybS zC-J0xZkR%0zO}?N`Evhzah?62hH39 zri(y~j6J7zw6K=z@&np35a`wz>_noL?rbbxK9OuhM8@$HQZ~un?9eNV7f8Xi0AOTt zBW&*W3b%8oF1DHWXEuWC%pI9)Ul^j6)~c(}wmXV8#K)Nd_?#^LEiA-`E)khn77Tbs zH?;i?2$<~wrp9o23BIY&)^yi-v2^3#TIcnmUR>NBqS45J*DuyxkL6HA$bp-DKBp1$ zpouq|Es4fj)*k)Zsvmn<4>)4}Lu0UXkPY?VueW#0 ziscZ`%)eA$$RDOpnf3j#5b`!poZvxR@FW}ZaRf9m zf)(5^OIlWj9)J#AY--B&6#-q)}nmCD}bN#JaUszsz_zUH5?Ue=@umiL^+T1MOGDLonD=Kd(+Y zm#keLWD=0NZ;M8#ys*>AgFAiX-YNAE(+DwwQZZ9gD-)Vw50_wb0j+z*u**wNS{T`Z ze?Xd-7!24#tzD1Zr0`V;@#`_PPB}v-sjI;@ail9j^iOwSI^c}sX4ZX`?U%Y}B|fjc zaL5g(Iy{Cnmh*G2JSP5PuoJ`BY!^o>jWgB9_<*4_f>~vb)T)jYjr36TsWVU;<@%xH z^s9d_5F?Dm?`j+QZ^K9`V>0OCUjJCNhY&mdxQ{o*(lfxW`Jp>3wlV-EKGFhjxmA&I zhX4A$VxKZUwR~P!Ow0mvS2OK>`hu(x&@a26St6?iQ6d2t2c`?@4m*Omy>gYYIRM!` z;T0bSJL0uK9TLpf;c@xxb@~TE8@*|Ndz`|EEjf2$r#=JVz1Df<`;sdU9F~x+i%bnL zYkU>-5Sl>gx-ni=Zl%`$tytYC8;TxR-}JpZ-yWj+advGqPCv%oH2Zw)MmfBm?EmHU z^8VxU9~@H8z3A^3vC--D?eTj!Io)3jLn0K=Bk+5@y>a}SKk2I+CQJ%D6i{7Oee5x6EJt2ar6G z6TE6D11>Sij25Ol^<@5G7G#MztHCSx4dQ3G5X{NvIOmt&`7%jf@{|)UB-2`OuyC+V zV_`dAz6hX89Q^f;k(_d`dBVOaWHjsa@+c?W{JY|^Sc^qE&KefohLNIKBo(HeL!qdOm4<@=}FNVuy2U!l)YJhPJ9&wiR_q-$!p45JGy~2q)9g2t=IQArEP)@ zzG3sd4C7*$)+8M)A~AFW{f+_n-Z|ZU%S-B@@Ge^-x}rs5NghBv6A(pFeH$aSGlAr> zHJT`TL0K?N->bXhER}=iNpmOGJh>E1?nIw5s z4`-b07AYk8hJT2;*|QSnMrNcb*^a#@J0ZXk7%UNvE}zE6Y+d_jxCJ&fEQ!UrPzSgGAU!dDQe`zFKJzk6_DE#cyHDQcO%o zj4NSRg{xNgrO8H;?ms=VWQfAVy-@!I^0)SXT;2PPuIP^Rllex_!mZcbv%#D=AvZlq2Vl@yNEx8QZg*bqJJkHp?5`(1}ii9=*@arlA>{dSyX~e#SqbUMks*18^bG%-UdtCkzZ$AdI6lezp?i(;DtM*7K|@=7-IH>2`o;)c;hzh1`}D*Iy2J&L z!e}immlJ=nxv=Dk*pNIWKs+Q$L!E<_!bQ_-Ie6iL)wBrE@XlQRQ-gr%efSYCakz$@ z2g0EtI4yd~4S6rSaGH1y>pBSLi7skwiRc2Z4LANc3FT>JX`5G>7fed4_sd1@w)o|gN2?c?{9CFN|-eX=Ink6MH zUl1JTFjYWxUZ2(wk(?e@J2tnoS=qJMI9^c^JzF=sBsjMvh)%Ko3#!7VN6(E$$D?Mg zwsC#+u`rDsZejP-lW5+hWSg25DX*Ec`9k$l)ke6ASUw+89kY~eMkQ*#aM~_bpRn7{ zI4vw!zpJr!N+1i*uaoo5-S^>Oaku#aqBIUuxvs|1Mrfr$*$siqyzd}*STQ$!2^yqs z;)dHn9NGw903eK2CtZo(YHh9+v$tj-tPz7#lWxfdxqNDQgq$`LEEBRT+K=ENYz4GD zgDXdwxC<36>hxx&zm=rb8yx$ykIy&JTIR4G9)*kCPmyDaT_Xh;zJm|iLi}+;LD2KLc-q?& znsT!{Nw5-xS(WpEtj&E_3VAUA*H~Ly@CIYzX`6{{p~YJ^M7| zmO0_u-1n)`n_a>9R8DS|s7JI@5AVdL3{H=HSH8=t)1EAr&%^oVpzCVs$p?tbf2#J- zyDHx12v2{{*(H@^%+XjX85i&;iqtA={=v@syRde=nvRa9W!Ox3*~e{RyDVc3e{H;b@E-) zAmDSK-On*oplvdD<51zV_17x9hhrvhn_SKYg@SDoWy@%iU*!Jii}ohFlVc`V+ho>; z&Y_7?@TaVPE+F7${ZSEm4{@Q-lVh6gDv}60%9pfdlLU!Ww?WI)P54w8{LTMwZ?kTs z52|1<(IC*=Grn!600xEgV=NG1M|TK5cS)}Kxt>Q?gVtZuP2CyP%2a}l=!kLRNhr9a zJ<0}Oi(VXUb})9G>GKl06WYZKT*`SH8s*#U2+G)XT7pkVWqZoCeROOY1v{RHiCGsS zkJQ=WK@u7nr0nU(GT)F9-#3%XdNH1JKp>0i3h3g*PImK%<$AQ4X9KuJve=`Hg!1Yh zIJZ1F|JfO*t>-8;rwrRne5hbMZ>4AQ;Q*NkTXDh?58XxGLADWs@`g&dc&mXdrSENK zq(8`#k#fbY7b20N93BPC!8O+D?Xze3%8VM-0sNhDiF^uZur787X@-i#S1^WU8H>Edn<&*{QvQ#;%s&x7=tba0A zdSG9xn*6c(;`xEJ_yXp9hd@qn&}fUsY%&HGyKReh9M1&;+SIY6TY z)1(zJ!SmJP4~#;9DNUz?BVs4xTj*{1Ljdb}m_?Z^8a?e;VlZE$Z1=EYxkikZ7p-Bpm_HVhhN~xo9XUjykcK;UnWpw)6TjrHMTIqGRcYnHn9L`V9-h?S| z5F$<2T&RHKU-W#7INIIZeLkP{CPRKU#Ug`xy}+QPRhQG^A311Cgl|Bikhmb+^HDEP zPGl0qU$i2GSd!OGI)7&UP5BTgtt)P2(FOmY`X@ir5Za2i0~pNq*Ol8?L>9dI|+IDB4zl)aP#$`pE2+h0SON00gS=# z4~;cf+~L8}9x#{p=k4#O$d>v?5nua3?282v_sT@$T6Yf}5!?Q>3((N#|HOnq>`_S> z^V%~*YX_-|VT9mrlHAKx9t0pdt4M~GLqGhVHkQ$KJsXD*wrKKKZiznZF%50aW{75@9%x#}B8eqwj zOUGTIZ?uU9Af*{31op5$`gQqWjlJ!0bRyL{KZ3X>%%84=f@NX;*uh_$P88CBCyOfD zoSQBC8fqwtOf0WW+JKLltuumqMkt4{(pqwepZ?)Sf9qPPn&^uQa@HDkJ@!io+(Oq4 z1u8VY@bUDr0LKyBR@nr2J4@nZNqE5<7kj~j*qj$oHV6hwCkSdx!2&j1#NUrt&?_Fh z*W`#v7v;T*B-Nj63XUqSJDVwA&{WHA@_`=#m&oT#EL_;aS{qedZ11A$2L9LOg+ITN z6itwq4sG9Za|@l^I!hE|2M~7;yRsO2zx4e@!ON@_Hr`)Pkt+j-KlDT-?hcTfzr&kv z2C0V`h#d_#Pa=Ym?I)*j!XF0`z}`UH zFPf}TGRO-Hh)SQitBXpAsSo=>WP#RsjpfsV54CJ6zN5u|EeoTA0Rjz8Wsv-erGlnK zkvG%mgR6l^ymE(-37OoAiybO)+)+Ir1Q8k#5RiAI8F03S)fRdnY}C4;^6#yFH`j5AUQ;?W%>xAQH47%`Xt8+gz`BA#!`@&{S& z#pq)%tlBkxrjuH_apWa{1cU_>9pVfiVG&V*K)ga3g+|#NDn?_GFEsnuyyeL7jf2); zGcG^zX-QSN4DUI#+i_v>|1CjjO;$D&G;0;#LCN)8AnP_JJ${}r`UxSlgS^gyaEgT? zJW`Ok7dKp(S8aYht&#Xq9=q%Ztl`IgY%}cH_Huc7J;&0ljYE>Rdlc~HcK5S?KKK#4 z%uujX9=3mK_Vs%I4DS1OGFj~4u zx)d!VUUnnFs@bG~qV8qi6*ZWkz`}uY(GAAi`7Q?Tcml)Hf20`~^s?wIKWK5Gq=;=X z|q z)BDj9smt$S_jYl%FEuJCu2erKPpw}VHpf%awr0}pY6~wXr>kWfH+Ldx+RN+krQUSq zZD}1m7?IFV^1G%6Ju39~ms6A2pJ*IMG((+XTl689L$Y=Td<%fh68+GMJ^ngd*>s+r zvb5~6`v8*7@<199xNv`CAp6Y*#^(DOq-#K|jrD8945hpu1GQ!CFUjkaiojr9DOD`t zcXtPWas*iLkxpc57nPz=9qpe&%fXjUky=H)%Xw$xB5?WamULiMF1>av*0v$>gfj^1 zSya+M;I42_*sT?iemaWi__1JMK0twhy9p>^#*wZ%(eST78YO2S62Vfy#LcGn-@Elg zhA8cL$5h?KL!>>8^K^Hq66zuBoEXgXnNz{dzo0UwL@7FGt*J<^8(6byTZxqtxmW8S zYepgA7w|;;Hd&gfQ~|bbplayHXV`i_tS}TNsa*`xM|4Wa0xeqVPaz!r*HbCucd836 z$;n`L7d7VYziv;y#Nv?e;8?Vae=o46(!zPDx(fzgddc89QB zfx6?40U8aO#U=OwSHhrJia0JmzvI*jheOM%2-q@C%suuK2u zcg-&@%ikBCO=(zeHa8&tGPnykcmmz28qSs1-;Xep~8joK7{*)z8(} z@nfP#xcjJgagJq}n$9IraYp%Hr<1;34-3-8e4P34(%@?T%kH7Y*Tq|5;~B@>QSJ7o zPLIz!v8H4n)Eq0ah07Yjq>KvoATt)vA{Byw|h*`t{5f07wXvYyXo8-#HlGg>?6W09iJ_p zmxiZ<`^{OJ_t)l!m;O@9Rx*eGP}?$Q?o{mK%uV0JTMHq77l$5x#$hE=Eq!bigZ|de z^wNKv)OSIWV$@0a4IJahMHbnxGZ>W-+#Z}eJY>!N2y$g&YJH2HOBuxnf$X9gby??R z?&qSfncLITQ+7=BU`F`bK^^frGeKWrqZIc6}tOy(tChP)R^0oC6-&e~S>=@uHF)_v&K7PDi96{RjNh~ zAg`r6Yw%@AW&ki;YGgXIsGeWAK9kYP3P7t=q{tR83bzy>@8(r5l%2WUUIeZm`23@M z+U)TXtAzvX8_g3`suIgMs=k^vtF=jAKW*~8mkTNDnVKvWPT)`r87W?|{G=_^Xf0iAe{IgbcMEK@ zB^|rt(n=R$qeNp=5B>EZq@+jSw?*1RTDRAum`S~aZ| zsyBET{=fO(cqyyIA4-!M`~B9R`$lT9>Z5G&9n-x+`792$X~ubws4OxK7a7E+OwF`n zkh2xyJzs(xhoNS>O0SIuexH=D^zSLV5kaZS`X_#TQybNP(�@{uRbjM+KWW)|iC= zKb%_vcq(w)?QYZmh;IZa&KwO^CfAvx@SW$@h=CSM=5CCqshDo6iF3XWs?2%5lLI_5 z-71NP5zjT^UsP~IZaIKWS2l^q+_Cluh0ZIZ>B{5jZ>{IzfBE1}#0E)FZflr1eW98q zMH!uqNrBYbFL?m?->Yrh@s1-9LTH;BEDy>#tBVJcSm{&epymkGcKETj# zsW(TN(Q+c%`}6+??9Lz_@>DVP%%t)a{VljB0o2BH%)u5=gl62^$aEv=snSMri{^)qy2j>a4BZ=(TJ(4xv*0kD7TF%?pp;Vl8;f?0tNEJvPBByp+ts{*Gj z!sJ)%J|ep?g5e{AOGzS62RS5^Bz68lutSH zC|0uA%~{$gr2hwZ8)rrQe{na4fFee1CxKD*R?<)E(AvT3Aw3`@H>wAB{?w(`WBk)U z2-x;1gj}}FB~v@Zy;D13grA3OFkz;D+l|zJys;u^mx>e?qp>D13BW=%`5bsi?dCpb zM8j=!#y7|JpdR<;l)Kf7zGS_S0r|BP%X#9Dl{FY0)DC-V(s{}FmY+Bxw6nvUj33@u zuFk;e3UyKT{MhJ;k@5b+xmo|8oEz}JIXA)o;M^bo7w2~UADkQ8AbF3So@z;)J+3Wy z>m@gv9D&zxzE0@TjySUu$hL^!!K5is)R5#|SaayG%;nI6q-*<4lRXt_yl}-4HeVbe6N9@xlW5;L-!6qX z(1j81YtM92l*dcpWSeyoG_l;yOID(~MqHUk%MH^h0IK7(r9Fqp6WI-b7&(u4T?haC z6+IzHs*+Z!xMe+ay4NYhQ{8rp8PM+PagsVm(tU>;S!iuPZ$9xw%O0+6ehF9N7JTrs z!gWumP&D{4^so@A6%L4VagyD9Lw$zK5Hg7s6(mqb@t8)i+3JJEpSlM-#DC6xS6T{i zxp_I?m`V6}+|7BoIXvHeIGJ2Hnrm9hn{n+o5*!*;PJk;j?cDet& zchmB+^ZGpbmXuWVClB}o`7zH>23wisw+u8RP2de>2gl7{-;q1Ud-xNNb>S`k3#ZHw z%PA^9HRb?#=-zV3DP6(x8B!)ov0M^uMe1Sbyxsh<$PytwgIj&&#g zsV7P_EB0&oiSOz^x!|&XL?X@dS@)&W_oW8s0HjjgtnB#G><%xh3YP?7J@6A?+9O6+ zCz&9TzD|8a?e*$t zfi_2xk>WQZq}(tlOw*qkXTPnIXT}Q< z>fqClD~{O4B(jVY4sH`l>YOebK28|6-0MHxinL^>zp}&tOBFGb@k!?zJ)1<~bs8T>&Pc*+HH zk2<`Z5>vW~VIWL<)paHJ>IrT!=r-*PBmg3RFj-5*A^dTjkbp3*hCE#2^K60s5P`bD zzSgS@Y%oLXO#Be&TxVZ`PA9Rm5U}jgr63nlt0J7c__90H?y5E9_uA z`5Gr$e*jd)kx~>cwS%rrMm!z?VX`!3!3Uh{xFkc4VcLZz<~^)zt}i5@$Hp15W16c5 zOPro+Iu!B232~7pgQ@qZqIujN(0xV#&Gj8e6a#V)4r1JBI%u%I0fi__h48sm@YHfs z;B{s7B-*y$MXC~e%5tGGKdhpND#xwzqB?{{-h1;)+@cChlM&o{S=;&qH1>ShnoB#5 zPk}7TB3#)|+2;d`!wC|Sb3iK#I3I6$_-xh3tQgeBhEs}{2;)F{2&kp{DPpH3nFY0Z+gHjMCabQk!D1ivwq_Ibo7h&qeQaT8XBP7T)3P@2F$%Gra1oHV?X$n4AjSIkk6PeoF12X z%!dM$>X|_$o%g%Fj{09%shXPQVpW^6B$jq&{imxU_=u6ftTQJ*GWOItoj)-t+6}WZ zu&G+0jjRD%Z;cJCUg7sqs^B_J2GGsT*>-s)R$sYt9EQI`!}a%1_v+92yw4kS*Zc)= zzGqA6As7H|lRUY}7gPDG^To>j5YeJOJf!D>7n|1z!4w!8Eo44%{jKy>;)RQC{*c=r z)fWCc5m^sVq+0$}3*twIqcFsPFuZ&X>xIO|H2^`c*MewXo^h=O}CCBKAbb-{ctx zEI8n`v#kp(+KMdkX20gv@n53d|&!2ngEWTlQk9qhVPj0V!*vsIK!e%C^xr7dU5 z^77;2m>txt0zqs^If8DBlo&iJjBp)s`1#$#U%jD z*)Sr7PZuW87Z?hhqZ9_>;*c~`H25I0KbDea^qiJ&h2fpS^{(s*4R-CvFY%=HE)pK| zFM|`6IEfYE+avnyiiOK(En^oTHxi++42T89c|)N7hNZwHV1i>oLS;?3P#GwyB}iv+ zNG&ufDfrQ3O4_`oF5MBBB{fHJpWW+ue|Lkx{c5D zkIPKTaJlrLJsLb*dHXrm$mp0)Lj+cAxfwNMYRbf?j-!Kh+(Q^}t1kWLYr&4M1*QM| zXF(eyBZ#?SXy}PQboWSvEF^s0N8%Q1xwfpQ+Tj0Mp~xP~!F_C=A&o?k{KI$B57B*q z#2a15xdPWtx|X}_Q;qzoHGGZYBP%8haRjNyX@r~5BPzJkTFb}&$kos*ZV{Gzu&g$? z!KnC3#$p)IkRDu3fIM$U9SzY-;j_8$2ikkdi zakshs9s6JmHc{8nhzys#p%yIu*2YVuxzgzfHi!7ch{4NdBj(tg5Rjy-f=ke$mL{f# zvV@1C<4=UAUR-+14_3y1G`?$McXI9%&hQU*S6|nVrS@@mOyUtOgDYNY0-ydEc>%lYNYGKT^XkaqDQ$hfq^W@2ZNTJfz+lW z%ui3TC~htO64@8$uyWt!3d7Af^|3LSjSm8AHeFqtZ$o+*Z2vgYhbnLyak%Wi5uk^3 zr^*Z@TT@~{mMY(}7&?B6-N6x1vYNN2n&JZiQ-S2W^5;lnm-t-7c)VL_1~TL^gN}(+ zMeaK2a(tmI8_;8R8%wc^!FUBvcpa$vOYWBQ))%s}f4wFdhNgKpEGFHl)Iyr$!tiuEfAO;iL?liiIy;&tnVSuq0^cMh3;p8GtmjzmVV!<7J>K?J{RN>g)EnPWkREJ-I#4m z<8|$(stGy&U>J>gvm{t0>f(t;3Q#SY>v3o@wD`zyuIOL?&5mW#x|Y~Cf62{o;~qFj zw_3=l-6*36XOom-dNf4`qN>YKN4ADU2vqr@vl1EWAS1cnt5UIXtfZh4qc=hXLpr#d`uGz5jQqqn=oQ+h-Ax=-NI)sjGGsfZsUaV=n}_~6zw!tsiJTv zljJFslh=RK`Qz=N=-`j3j^fX}v%qR`aS(pQA2K&P#8Yek*zHVRQOUNluZ^1@R!etl zF~7Ys=QkTpL1psrVIge*X@35WDO)xD#}*%3lhc@>JErOoUp;&z619XhEx4tLYNQ*5 z`(2Sz z|McH;>6{6xYNT`vLMm*s3LB~AZxR(Rt%w5R?B9t`oZ8*uXH6FQ8wred2ZcP=olBDXnWOxmE$DxfT+FZBHjq}40#2mZ978=P9SAEi- zTB@pmSllkIx9qK<;&C@93Zy>)P6H&tHJ&X4`L)t=cJuGpcO=(h&X+JTQ>RPehTyLx`|lgf&RKB?_6!CiS|C+{&K!<`d?bRV9%(~m9lE;50}@;I3Q zDF(hL`^PSo+k+LJL4i(86Pf9g+>`%(#s+JRe6%?lY0y0-kFi>9b7pGR z33~kdd&tmO-oZD$kMEc&aPCw!KO0=jjLlPip@wiITSa*m&R0{3j@1%Wu5fCmMjVFW z6?xp}SI7m7*~-iGsk9^PWt)K)I6(s`q}tMXV%C$QFRU~n!k*&Mr|_2Si1ZtfaPY~- zjnRqJVciG5q@yYy#+qJ3#<6)Rj~3~PeReNimhZxMZyY{c-xkMv1(b}Yf}5=hDum;v zp0aYk>wmM%tQD-f=a~+GbxvS~_D;a$C4joY0}iB@=fAN}CxFftok#ry6Pvtl>-htF zTH#LdMlrrC%#y2+XCv@)Y0`fgAa{|As1YZQ5|MUcm~Tih!7CRfTb%LH%)i4@EUqXIE)IcSHV+Pl zo1%jBY_IdjlQsc|X?b2^#jegczW|Ii^E&KT7McfBT=TiP)@dk?Ke{z9i#BqORyTpG z3u$^6uT}<#y}-&pL3$Tupildn-+h#2u0Q_$cS`ZHz^`^gjiUm{EUk9FCYp+PN~Fc;WJU&?ALmruEU&CY2lY1-2tA5$P^=mw z34$+kC6P)vWL=P<`6P{oBGR-}Lpfa78GX6gT-aI4>e@RS(7RYk2CBu2A*Db4)DmMhN1ylQV?a+?B}x+TlBX)gxH zw3MbIoF?Pa^EovDXFop7V^Y_*B1ac|(4VwYF?C7M*%0{On5a1>N}5vyCbV%waH$Z+XuQoM5;;@_VBxdP8 z=m_d1+wxW%fiP9U>mQU;D^H!`0KN$ug~;qMU)%n!b|G|j_R~rgYr7tB>R$uE#AZU1 zUG6StaVYJM@v+U8#y1^BA;(jFISmLv? z8c-%OSFSLxU5vxKVg=>>!vQ4b1$&D)ts2Cf1}qPR=}QR#d@@7aj0Qawt|W%S{jjA` z3b&Sw29u|&z5!+ty!89NCQuft)KsE{qwy$E?r`D~WhEr=W(YGV`+jM1kqRie ztOO1@hHJ`dUo-e6%i525r@A!%VYITK!Y8`*GdE8j!84e>-k2#7w!ok6yvme5KwVPP z0X7YqV2E1k8AyH7mXrjlSIQ{Z?|EQuHfZ5m1uBcb5C8$GI2E~(mmW_?9(XePW_ZUP zuDXS@vvkf;TyqT;I+EfPY`=M;2c;-1+>+_}@neZ1%IJ!Av)msPY&?y{yHPw0;Qu*2 ze$7`*N>U>eu5)Ba;MVn{vYT?!r=swX*ZH~HH4PQq!g@$Wg3k9k39Nkt=3OAhv{ZfE z8No;gNHzb_)I2gnA=51EY}`3;!n*pq3t~F^I5vM6r5k<2nrN>53ml_OohGa5u`ke|$YTyn2AGo9z7sw~Q%_aT=G*?FkJ2k>GrV`fyw`J%sc_G?L9RQXuYUutI; z0mj_qd_;`NXTYOI2B?Yv=XZKYfw#6}jY@WWCcry~-bC^`gY<*DukMzFhAQ8oHd3ul zywFc?^w!-6&kP0g$Jd7<2d@~P@yn|Ex8r)-^sO=q&|wG6+3Z7Pm{ z`b5ZTQwq@%jpEF*>>wj1O{l!?!e7jU2<=v{t^bW9pleQxMvO>p@@LzYmO~#_)Wf~~n2(!rv{;g^Dq#MrqH0$2O+e@Kv zgyQ~@p7)36JEPD(@F&%BiXMe z4=KtjfmdO;)b|Rprub9641Uxh46hZ_<=Wu%#u6kW#SvR92un&N^?>`HF+uX^h0;EQ z@CzBw&EKmh&c1fA=6Iv1{DUF~TM1f0SeZCTJ;l)}l#cf--roykT*tkQu2Ly!=MP9Q z)Z+G^Xr(RDAa~qCx>wic=R>?rNu}-_%krz;3fLekTm$*4D@w8jGT zLxVVs{RDr6UnPVOCYuTOOb_POjR_m5T}~C<;jCKjHvLXXRI}ZG_<5k7ktx7WvEclx z(eefSNZW}<$WtmXX%!55UzEjl$oG4{d_;c*FP`eH!Oz46dIZ-;nw0WGZv~D-Rh9+? zE{Bv{#SE@e&O-VU3$0?6uTD5H&hEB^L*i1i^p3gx!Zw_S@$Bg}oYi*B78t0AF&Lav zlT#XW`}A(=AQsQ^&R8T&{-RgybgKXheAzzHOiO`TaSqD8q?mA;yoV)B$ z=ZIwd{Y2=Jj2L5KEP&Lj*cL1mIdAFQY06WMO+D<2!5P?CKMakbKRBmHCC>*|piZ@- zT9m0C&b|~;a{ZK2fb6A74D8#l^c$=c4l^3NCrIv!tp;&X}D6__y%>bn<>k~ zLKUua$W)#3ok@9ozuqcP_eWewdvqjg-sG)=wfD28j?aAw3O}iTRSO^wzR$K<%8Pdm zggEB3*9r6@MbSiiOoi7`i58K}y#A#B8{ag8#;#jR8jf~5UZP3G;=t)LIjM%PExsD2 z7I!x=a?Yq-*{Q@xc%j8GgA!TH^xd-%Kmm^ijp0dz5$+mi0f8u#+6=B}mp;IFKy{=Y6oQ3?y z8Ddj=WAoU7zN$gZ+;HjmY-O7ClIB@oPFelp%w93ygV-+Ls0=}HH_1j)H0SW0%X7{P z%`Q?>9rbZ?XAUI1PD_QUd@dSx@SjQUKggOlm&r;RR5yv_il;Vj=uKlW2lx>LR(mX6 zl@Y42;EAR3%ViKf&wtN7mo;;cID^%g$3H{OsZSk=;Aoeck(d4%@XDF3UI8igVeym5 zmrSV@GK^WuJ5hR?&mKn`F{2Xs~s- zs73vt#=5ZjDk}8=Ei$EbY1B&nqM+{2QS9DrmTfAdcb!DcS{K*?FFnkLu7CZAW#rqZ zw=N2(pK9`?rm4&hJOU1X9fSV6o!aGfqy4NMa`oaKg*E{>iU|Ce49&Nai4NOi;ZxMa zb^8alt~v~=WC`&cv+VNZ{SPu_h(09(th&(0;rPa{?391iiPEx#rknp(-b3O*e+S`0 zoz^`DUU5}e->Uu_5|O;2%FFE0t@HiJc&MsXVVTt&zN1vdMx84bvbLx*d#EH;=l2+G z`jK%XyL4ug)A@y)1D?Om&6Y%+ zj;pJ>t^0(j+D7c?m7(|ZWCLs{?tzO5xSfcEw^Qp%@3V+A=K$|}#_r|vM7p@JShn$( zN#D_1Kd~OSj~V5z`k`*O)JSe#K+N{AM7Fc0gE4-?UDgNAL7hF&z~Y3+r=USJQUNV|~-Wvo2~lu=3BsyWi>nF^#-rLK@r&y;b&t zZZ0HOnkTGqzWdGk(Yq;bo{uuz&ZrmW=D|j)g(dR1NQryZrqHD(Ifk-W6cW9@QSscF z3B~6QDxWNu--gjZ-bUskEo^xY51Hkf77sUnygCmnDaDb-#}ZEM^KRL{{=vxvp(csS zgh-X1>V@|uA6>YMv&8uWF2q5%ueWPa353b`P~)Y~C}UTdgEWiIn`!2}PP?&Aw;rD)nW?-VAq{4Zl~5d4xh-|28Zn4$bMS69;HWA2V2eO|OAl&8UG7SN+&_}6JXzDj)^hR}K&GcIrNJ-VjChRN0csWXeK?7(iRHGujV_g))>%dJ?DM|Bed60_8Xeg<*OO)~FT^RUJdqqlHF;yA!wAv8^esN)N6$q&!kY zYo#?FkHS`fcXwD&aG#guW2yuWR(DmjBx$dDPy+wR*uTV2GFJ!e>b$!v4%`$vLNecK zKfXpVN<6`KVcn^bV7|2Luu{$PW&Kca4AGis_CIi$C|gh3_iC?H8!jr8f-Yei*h=?& zk$vEE1F~g#~Xotos z`ykWWi#1iA-TUtG_0$9JK8U3`M5el5CRH$%e0H)qoNBh%aLT+Bef{>sf%mUp_oz=t zNgmeCC8M}|#D88=nNyFVI+$d&`AOk8*qUWv%py`BO7-(G=nvm3aB7_MHom8S8AX=P z(A)S`prsK*&HS3(KARU!NYwLoT~e~Cx-R69Qb|P;n<}xbo1&ifbt0+i!2S>|Tn=b@ z_g;4BcgQwYNb`J4Y<2eW7m*+T6M1XD=M6f~UW259h#Ne#Evin5P$r42L$n(6<$rP0vJQ$T>y%6e4q()@5i}@eoHtnw+gB+ zrZkll)+HrT<)Ji1*sToIYB;1W^wHEzjp7L$cQMkX(!vU;1Y;kL`c{bCic3QexVqZY2ux3s3NSxl@;FxZQF*C|(VWUgYPSmv>tF z{6)w~ADtAR9fZ6(i`)FQ2_nDlggGo!N~ASwKbsLP)$RErd~yao$~6^zH!FOz#7uLG z0m=8oOsWl(PfNwkd<^t);g!D&)nWM31dj*$P$T=RFFo|4>_oZ^HXGmcF17}E%mq_F z#2cldp7pC2{Ej@ZhXfxEyMeoB=}7|n0gPRokNTm5VRMgHvML~x>SjeI7&67e+d;Uk z-fTd&lW(Z|0q%TGbP561>x(`n`qb%Qnu@iFV{XW)W!gb=)$PilMM(wfoAi-7d9jt6 zdj6Ws0qgFYC%`|KCJ{#ahYKKxi8A+HohI`3638EORer=NPoOSn1Ot&@ETT}6Xxi~u zEo)gcx~=_i{`uL>e(T-r?dzh}4*%1!rpiurn;l-m#r1S<@-P4D?+c1Kc>R&YJG`P% z!(L;9Lt>6G2}Fi3eocSFH$yIUIc9>~sPAv+flm#ElWr*tN01?AjB-*=|BZ4t0(;1q zIi5z~Rc!lriripJb$AHeM)`Nm)QaeSfw*)LJ&aqiJ*bPQDaC#s%(=CSz9N~}6<}RpqEBe(igBi=o(Ff3C>r?j- z4_-!6OEJa@IKcmsM^Pkb;dihEN~-G9>@Gf3d*cC_e-j@b>Y#1aG3-oTv`<}k@Ctwb zdu1X0g05$M;KOiREcaE~jhdy1$83Mh10=vvFaTuZ6?^ZU#pXWvs8Z)9OcAyS@1 z!?yNPc%jPLWPImXsP0N;{%Y2}!=zlf&sBQv)9-Qfqsx}yCuUCGgXVVq2@wN-;ik%Y zR};`Rr}@G5^m*0J>uBPfxdfoKn@+Bss8V>b|9SB=@Fwa{ej+^=`#i~k4admH2!?=w zaMl1YTO!rgkop*mh?WOLmx~S~Mr8Bs~PKFtKYVRB3}TGa#ne4bXPH zqhf!mbT9^zICkFn53NspNf+&@*OeykT}r)ZRBOXK$V0MBFy{kNbu7w}1*WY}S}~O= zL%R2;;whPkqd3IQNiseeV?>Fer=N;B&=NHe@?bGtumvLu^b-i#xhW}-xVidq=k_+G zl*Q_4M-15dBL&I93`U_NST;^S+Z%){q%4*d03_+rPCQ3V(<;cO6f2vhbvZd%FF>k#v*1WAGv zMtFa$IUrPg7O^3PxT+L!#9*g_Bq|w76U1m*Q56JB?N5zrU?UuegYf`Sq#2Qta1RB{ z=<&ab(aczINlAv+sfY$f+uA%!m+ls`d+tTD2hnk+(c-&#=CfO`?40HcP2jdg<9NY} zdhX$cYGvF--azO>^kYzyQ796n_%>X!@{C;^X5bd1jfS!5;TOf5i8R%SO`Y+F$;EL4 z^>q4m1JRI{Ng?FMY{a$zM#CXifonZ28NfEGiL?p~SM|S_v_^+LEL2^6-!D(8A2*h0 z*pbK1J3hTGc!bd3l*Zk>`Hmn^YHwrG23Cq;OeFe5>MjzOkC)(Ldw`30==cpDj6!QO zT=ryqC0qT3lN2No4qvk5c|J>p;TKd-(SNSjL7E(;^=;0V6e5=%ibnC z5hM218C?sFcNyR@YbbRTWym1D|& zyG21OfrvIA=*yn?Mz=3!NjxavDH;?(%5la;V>LY(qjNVg>+JwO$tE5;RdZX;`8-;< zN}Z=Up_J9psgt9h!EMf-5ls_|1CbFwT4*XdFZ9AD@8KRm+m1v4YqfBTZrvlRv&*xH zl_KH;h#27d!bT3@DVbF^#EdY}=xtV`XpJ^S*DbT*dCSE>?NRW!z_aE(mBwJvCYL_dPq{O4xkU^3 z?Il(qS|En2H*6GDD(_U%cHbiOK!KI5g8<1MZeM`#{_eKO&+o|kZ;mdA20jY~GmgI< zAEW}mnQReICMQs%L33+`5a2MD%YmulQY3s2=7o^_jTMe~)7jhVDCT1lsCeiySW>sW z3N(!8x0!mgI>aCpABh6!nDn3DbVepYsH9EgF>UJ4Ql`wt`iE{ma9iBgHpz52{Ph=2 z=f2Vitz0-mV|s1Q(JAmC(&fIwuFN8}?lE3Z=>JtIEapWq1*s>9i22R|Ch+{!)xG_h2HwL}iGhU#yo_Dhx z9R0_%zOJ=d{wElZ%ga|Fzx&sKZQ|>`h|MW|Y3uY~WRrj%%=VJGV2ML=)c_sm87&!o zYA4DliGj+Aeb?M4VZY1u4aX|#FieNEiX;C`b4tqmx*a43KWe9#ylPH8z(gYcUUlolJ(rKMJYhG_F8yISanE%=2z1wv$zy!%&HCR2Lw#uV z)p=9!*u<=I#;MtEZiN`Qf}XYe;iu^dSFlBjq{uT&s{U}5W4mvArL_)M7Tw}tnALL} zSN5Uzp-4tvZssRFEc0T+(y~xslmWw0KlUwo7vD_?o*h*HWFfMLJ z!5xr$BA?nT1Cje@-}&3oeU+Y$&5=5jYa2-f$1In(dbsC40(1G^dT=CLo;>H8Oh6>^ z(%)P_Bva;dADD$3~>JO&zaC$kBR8$GY% zXVDf;j%@K>XUxTmttfJjw<}?ot%Q-q^T@uaZ!a>E6!yYb<7`2#emnbR&I4?{liQK{ z4lJyt==eHpX>5bSY}OS`pY2;xa!mCmA1KlT4b&hMn4}fo58;17OCTuyQJs3eZd@&` z@4sHemi=A8?^cX|4pHL%#cTm4ttx5gAO1st%`Jdu?q%N*a=wp5fZHvhUk{%xDT2Uy z@c@T_15e33_W4}jDR~0|ipfu;lwz;d;M=6LjaULCg6<=w?3dI@;Rxwcuh8_%Z_vAA zb!W)bR9;6sREA+uc&@I&FdUG1V8wbwiblc|?Hj8Sl+2@__2r2%U<9g?$0-}mQAYSc zn2JQ7K#E&IWDrTruOM_#p2E{Rh%Q(51I5^?5*n5v_{O=3z=*6{k7EMUnaw$@V;PB;mowznmG$M6?(lsrsxoq?D5EP#NbsSU6A{Y8Q;kAB4Ee{#U;zxIpb;p+#`fg|tg2~_63 zdJgjD6Q~C3?ORL$bKmKLy{170XPbM7QAyI@aNx*2kUYe4XplV8cBOS=BF*rRg@dgl z+xqV52!?D-+lL|2QNj$s47u4Y;~>qWD%@~4f<(R+YX_gwRsln?ssBw<7t5YkBuV)_ zKdA1mmLl^w^%&9JhfQv@W_%+jSR>{neKh==-uD1YFu$tP6VXI)ZUb`!*mak4+fJ6- zT8a@sK8J%TDqXQ`;YZ5T4b4q1qHhRcff(iTNIla`7QPbVl2PEQmyt7b^d|ybk;}gD zucysNWQVeM?!^b;pc9+=G*Iqt-nnQ1adZ;7pxOHN@|ql)x$P$tPsmV(y8A`?+P{i+)x zQ2WLQ9g5|5v1_#H91X+-eA+XTtefx9E2g&0fdTZGAh{0b=&9 zk~9$5pTfccnPsdllc0i!Sn_+>JxzYEe!Cx*KK~q&20BC5)~7=h=YO{$>Ox)DS&?f< ze-=&29sw|4*RWL#Ti&?|CqgmwK-_sqPq$mD0$QLa1;DTyH3~1ve*1l!IsU=BfTA$+ zqp9ZQ3|+FZJFIM0ecQPzkVse zfvy6bo}VG5h4#WVnT8Yf@}9+JVI5$@GS>cBTzuG;mngp3Vc6lqN z^^fyk+B@v~MghP7-IkNvnOG>6{}xM|EtqPumpT&5gaO!$Mwh~DV{&m2`o8|X82Yka z6-=bW1cFYL%zpb5BQ+bOtE#F{@QKSwP%n>sPXsz>@wM+^fb`oc8B-T@olFO#UG$GA zxdz;RQi@6ue#&;D=b5kyr&dyXwHoY;zg;SI-H$Wgx(q$6gaQHM>`T9;rlDXYWX1MR zQu#7XhpcLw?^$7gCUBFea*)-xDhVU+_AN;lLx!m)CUoQDy;K`14LFr*BK_+{3!{K@ z&A9(Nodl=cul%Zoql~Bj+vcY{k;hXxr)4qx!HLRi`43DY@?84&l2(AzJ(b2x6Sm6K zu+6kh+hUGF>+4gxbPA>wM-V-k;Qcz?B$Xr+*$%P=D;;92I&y~gLA*v*X5nX2;K2Fn zVzQ@Twr6*9(~kH3TbFImpNpr~j%>^SK80^LAB%rx6`H?yxx~8M`>pR>IG%%sn;Zck zZo-(y*Pb%>`p+x$R{){=iiRtMBx4HQZP6ftMeDN|!k(S_3&1XM%#5Yorj&O9A^o4e zGd>Q>-@d-mYgwH98>8}Rv+-hL5D1zf}GdRRU*V_!Pee%15y`v*E!6+HH;n1E(=7KG_{%TGxz zx)x^k^1p(q#pp5>zo%h1a1`kSJg4Im5K_xU=rh!64xq8P3nL#T+TS>64l12QT%u%W z#<;LpTnAK$@QmfGL|dv1n)f19Gkd72o2-F3t$WNtK8@8(cp?w8H+v+}4%J|>o@WA2~xaG zeg^?1c|0>eFw5qw36Q|9#D1CdI`3U^fSF>O90})*9C8Z$>PBgqgay=;b8J;1Z`*JC z^TQfCU%T~V-b68R9t@i8_c6jktF29Ejq%YC<6`R_eiC5 zUGO^ph7IJ`gbaQ9QrYQ+Mz9wY0-sS_q0G4@3&9e+y?b`vsH1~e^v|UmwAr=MMe$+h z;Dqx(5OS$IeO{0PC47VHDm6vfFy}9Wc@R$oZA6yYj?Rq)huGEyqyN`Dx-$ z(Opat#9X^-;I_BI6fx{i+$x^d@Kd>2DyhU6;mdk`6=te*9{pPPw69EF z{9>tt65oY$&X+(*0#qL;az|?_TLTLn>d5(w3R-#~#ndeMS+EAp%Ez#j<`>NwVB%$H zpC!gs!a|FL7p735Y}12}gtqzVYj|asSMhVaxBtT7X=Q|jOA(^YuR0<=x%MNHziCq` zqaD^N8Xj+YjdbnfD|N<9r>C)Fz`VaeLP?-M;9jCDc{AA6kMd3yKscS4XGAUiDA+ z)^{AsAVH^lD<u@B_N&DTViUD4E^cBy^|XT8^xXa?Q}e*gh@+DO?ph5Rb?2DB08!6% zfv%DSzVCwcW>2oC(fqN#;pyzJghrh@Ti!6^Dc?3^D@4u$2eszG0##_bNwIFlB~hy( z-u*j|5s)Ct2W$T-QueytSmX9dM?=ywm*5wGEw#0eLxY2#Nj|M%u}&*=Rl_X6*y`_BxAXC!h<0xSr@Z5y zv`#YDJXqIJP*DLf$dQfY>ccO0pX^o`<0C5A%w;ayEU|51w!4999mYt007A6j-=AW? zpTPvUS5qGvx0$S3;42@F>9utrLc%h-U6}o6GEefxbycix97rw5n?j7oh%m3tBJDy8 zByoK$B7?Lv>c2}0snyrm6>SAFELb1ZOE7YR-zko^rM%b@WWnSj7e0SG$U4%b;aeu# z`1$|zJdtaubx6VfS@Lur+WcdQGo5^(b~@CW>jlDh#bSQ`o29&^U}H&B17*+rP7xKp zi~n+q-mUvss&a9DRhSZ&TIm$aABS;f)#C{le^pcKV=(hCm!REshE!w+&tuN1=CkLs zP8p3aw^VdH%pg0g(ZE}L!&UDH`IM@0*C?ZIr8T%=vHH_-2I(U>XfWHWDyvP6l%IOT zL#|md&3mXiaSEHkKT;!Jogc@v&KclI6w3`yQXJzQcS} z3Dq3<(L2t!qb{3)*z?XF{gO_+nL)y%16LqSG&02eE6ZIrRa-9S#qiI?9$Go zE&d&N1`I+;qml01!ZlJAJ@&ZCS|1eR?>Z-6`B=tMLo_ba5#yu_0I&W`wFH z(o0poNqwJ8B)>^IhSklw98h!$&B2kWgSG&4tc%|3L9w81^KY0$2`4(R0X_2erf&BM|bSo=BNr;(@{>9 zzeZm!6~%nHmp|lW3pO#T_gkl6*TD);k?U!gAH(kC$_4JK25H+FP`MgSfGS4EZ}2J5 zfs3egCvJ9qZxmZNkInla(=%V%PhqAUP-svWXgEnA8>H&;C<<+F2yG%9jbn(0E!K8o z6()i@BuTE9kJ{o9v_{l4^g-tuKGaCO0*e$uh%XZb3C+!82`(zwW_f*zTTh#nW}GcT z^+u8eMjSBX9Lf~{QG2|(`0eY&9jF&>$}5nc>sLKVd!63-VZYZF+}1&V<-D@DAdC7x zAiu=0J3nHXo9;1TVvU*dR}%w;Na07@uvNwH8qz0ai%ROgF)qGf&-$l&Vai&;6NY05 z5WlDvzM0$CZj$tT-rQHui3rm|6}?kf!MvP%&~D_*#|4w{@U%r%j4M^dLdv4wVb!Ktqh`L^b`n+`(L0^#$iQ?_@dCz`Zhoa>> zmDu^JLXT{K*JP+cCqkU@gW2jK@yemxbm{DFRRW8?-$zs1gw|)#j3SBDXO_G(sBYAu z0|@${L`eg=N87V?Ah~o4O#H!|Snc*#5bdj>U&BDWk!H5NDqAo?qUT$a!vDF*B<*un zQ%G?gv3|TA#GeF~CYjJ3SHH0JhPg#ejI57*JS>^|dMbSjHQv!EJfeUrIy>syAp7>t zZ?}9dSgOh`YbQ>P@}dlDl6zyGBPlJ*MY5qj0PMt^4bi`?umAIBB&2RYIO*)kJ6U(K zrQkYpT61SlAZXc8{zwr#~Ol2Ovb7x@a?HWlX0u3%pB?d8woBW6C}u( zK05UsL@>5MA6K$}u?vmejKZ{*QR+af5xjBLAhc%7^PAzg16KoK=(zU6tZ}T#50LtR{y4hE#NO(T?99U-egb|PCPX2?UOp-tr^s{A{ z9}avffK%(l!~58>Lgz%xA<8Dpv%zu*NEQUz&IS}CXdG+izna7vc;N+oKfXtN6(i&q zSq#O5dSgJG?*^itL|?I8q?Nj5ZYKPm(X=yRE$!_dL)UfS3Seeko#_555K| zK-@3JuOe-v@4r9f-hBCG9%JnZeMLS9i1>V=UiWG5RfdY`k3 z{FlBdDlWCYDezASkJG)^SzYb#YX@&6TV4MP*FY%0{^{+T2DiqDdVkCdV>Evr>aLhl z;qkADEtd?a{o62#E9CM;;LQKn~_(+WL&PWdV{Qc?qW};$7n!UTj;uei!J2KJ5GUR+n%mguEFca0E zvF|j?eZHBIlr+4A@g{yp-|Vno0dOD%4Ey)5H;%EK3%YtAAB6Zb1Mz1X^@nY!Z=a<} z1`bTW3;$Z<4DDA=8uQ`5;Z9xowZwug|c z9%MTmq0n&irI*3LKFd6rz` zhLjg|O&)qXT6r{sik9-yhc0aRO zcK>{S_Wt;%tM89UM0IUjsl#&XvD;7JdNzTv|7DmtHCz8&Q{6}dxO4r_%KpE5`=6(I zZ2G@n*hoK!29UChYQ7;|gP65@0;hZG_qfWgWFDzuqUid%kD%d``dr(m>p{oA_4;q1 z0otYinT_@Re>$A(?f;+T;rqW>T=&%g8CQ?c0rAf!EfD{>Ll2~ttD_0hsx;9BO=mAP zZ4h~LZ+(zBlw7_!KfXA=dUv5{4F28OtBlGjqd%n1=!es{Z!dp2y*l|`8DVS&XjPv~ zu=+&R8$F6HWl~d@GBN8?%AI`w=Kno;`_t<;ug~6G{qpYOhs*b;=RZ$M)2R$!qy3*> z4^@+PGmUn&sj_=AKel@2L3A^)@Fnr%!(#BSq@{Vhr-uAT696>#`)AKC`;Yl}s^@>6 z4)^E3CwVIKzj|8sS1)2l_&<8-gXVr^NhY-L0hHz5tfPqK2idKI?&&@aKYA&vEkH@7 zN;zg-)rmpKQ#2#KYtC~ayX4E?-Lg-F+VZQ4T>l2cLnS#s1)-*B>9Y5({MzJ^!Dyo- zUcvj9`n>|4#J}1GanKsWU>_#4F2h?-r)%TLJM!r=a1WS7mk^`W0(vdV7HI?y7`U#Y z#I)@p^|p{E{2zWSU>1APXEK)$^K(J-`jsb$hx873^kwY%C7H!tz*@Z+0OZNhfe8D5yc#G#zqm$~c5q3g%~ zjT!0NwYw7?}z5a)TNh$uvXf)i%|9q0CvHW*R6URM<^v6?-J%sE>fi;x; z=!epz_ek#X(Gx^JG9l2xFNObpH{2tH(pD0xaZZHM;L0ji_5 zvTjaLSHyw90!nD!!jHYLQJ-v3x+U40Gnw!s41NrQAc7yfjBo_Uj2rRb{#LKR)~zO` zXn;wUcmk-@rotppi%JrD484r#D@F780^kYxUwBTI%Id@`VdvbguVEI$0_J`eIH0TI zB((cA(c!4vw_$M(Q_p1DFs^JPs1M7^I3lZtgR!bN4y&pmSlxsA_V%rWZ_r$s<{GCp z41X8BT`4a(E8Rse^NcOS;dj1lt5CI@0HypU8hexf zrwOi35s?(fh+#Y7M<3!G%BIG|as2{rLbPCwTsOP{u0Y3%A|`=UjuXSoSPdh}e`M=O zTpZC6*cix9MohGhb5k1zVObQZ7*?ErS`MEoU5S$1)Y9m2?>;Wro21=dxkgHbSA$He z=GRsxMJZ3b5sO!xY4BHE;*HDr$QVgg@oz;^HsGYpTtf4d-Hc+IBes!{H0F*?|~lw zZ#bUp^FKVv(^&s^&Wu0`68GsO^1{`lXam!Yln&0Is*}T?NMU2Db#)d^oem3Fb#gwe{)mwjgX(@U{|sdEHw zAxuqy_V0fjsgfdF<~rDUdTe|^@_ZlW`Hx8ec}77j((_*P@A7f*0(!wOSy;e#u@4>W zIwOf#ihUKpk*J__c*%<-!{)`(xhfC;M`_^j@bJ6P(GQ3vLQznJF*)D>5FM(-GaRvO z7g2KUMGkl->no%wLyYajq!hmuRHb4jKhX!fB5bn%GeP-b@Baq#$z0F>G8*mezn)6X_2uK?eRh2PnAvEz@5qPI-)qZP+Ar_o@>eS)U4qFsK0a+qT5%l2 zPGXwU=+Mg}<(7)pdYIcO@<+E@XaIoO_A-1+V`prvLs^M@z{a~ z3Vq!)ONzu#B6TRb!1?~_>im)`Osn;!jO-*~QJ(uti0HH|iZnNA7%trVpPNk$}9 zHri*-`Rs;sxJ$kr(?gtHw*8wo*k#2lbtTys3DV zDw=inD)Vk`LSOh;2?8mfjFd7|u4+@p@e)gg7hb$z*FmqS2ZmOcz6)&Z|?V0R=sIcCRs4Mu2jqtRp#|U) zY4Y`T4w;Lf$5|%#ZVpr9Ue1IDiPtpbHdXwFG;QKJf|4BPU)^MCU_e_^W!K+PWP5gfFQt z=rTUX>-^{y(W;8?X71oB+@V*+9yF_K9+yRJm@ommCAKB<{{S3BFjir8W#)l{9~>~H z%vnO1AJ&vH1QB_e8tNa;*ZDu3|K)IV1jMiH2CEs&5o04pj=N~4c37jCYBY^%IBc-G zT!+~ykMpTJF+<%QjLS_1eWy77O7rw;#T-m7^Z zvwp93;y?QA;Qy2PT#x@VnojoqKTqCnC!_5MmA4ekfqVnyFdcM?NJ84(1N(9p)8A4)CPBegdx)1mLx-*RVd{uJ(#}mLW2xWtP>HHw z-K|vKE0*|uU%aCYYoPdbJ??{Ysz+~hDf>>gCtYN^6)2ko==D_^$?`Umv~dq#fdgTs zhzdQkT3h1sW*FKx{eY&GR!M3x1Y^jTY##+lUx5R%`;bCiV)bW*S#{8pV+i4`)9e+a z42H=fxLm*N3S+L^H5_Z6(VGLZe3wabiy%fxa=T7}vl%+T;ZFRH+^!>PIHF&Yfj8=y zYT2#LGhR}b4f)Gg#&S9#%M6J28gmB;vb-2xRn=jQFjs>zedINBKv_V!81dwnd!)#T z8bU4LR7@|bQ^0FMUkTE8jcFFD>PW$sqN!X>sTv}a8pzs+;S!^wq14=nshM+=7EqO6 z`B%zC9oyMo32Md>lgF*hJqy)Zrqoz&4R8i{elD&*(`G3iPNuWe$5xsY8rL-dc~)Wt zmc^9v5KjtAGy$gO&?UgVUa!+UI0yl%*)lb`vn`o$Wl0oK1yJV2!Eux>y|eWSOl3nG zhJ>clRkXR>@}AIHG1F1?QQ9|VJx<7|d|PKx$=l(m-~W1Z^!0|=<}nmVqXaww)ZHEG zt9&e~A^%6=b>D|s(SMKrd)XxNH+gp1{|-kb`=9x6AOG`79+UhJvqA~p&8%IxV@qvg z7tT%8a7ZvKzE7e+iF7O3@z@Hh_A#d9Q`8j3=quzXg=~#zR#Ftk#76kDYZmS?>;l?XqU66NA5uJMf zJoeLg|8E}tXJ`EH;dEBY|Gdxt`7{r^|H(qQfdH}7{*6bEylA+?o6z?P2*R8Oty*U= zuwVXYJX$h%t+AIGtbPv=>s+n#;x&ZnNs?|Qt(n->nEfol0>OHhVu@eb;C_HxVspT5 zn0I0%8so;%a!=o<8O&i^2&bXHoGs5RxL@>U@7w@3c?tKA5X;BypnEW#+xkk`AgNV zT?FWp+W`mMBv&V&E0IkSL%KWHjoizdELrhr@>r~^?AeYUJ);qXg->dJrUTmQYJOnW%{pTTUT z$NwIWhx_=iPx9a#ODDunOLp)e5&VJYXNeT-(VF;0nin6E>^4fgz|B)g9k^?$Ts6h> z&Ty_csuiku`!aVoLnVkS%ejD?{AUuzz{~PS{KR(Gra;!yB@&Wv?zJ^psMl(JoL=PIk*tITwV*s>U0ZKMcWA?c2iCjr) z*JbUql_~+!{1!FA7f3dYUYce}nuSPs5qdvtZl_1DZPY6{tefZ*agTK<%L(I!ix?7# zB(3VVbGX{T>?B#GIR4&$4Bg?OW6;L!q^PTga-bMo!@^UVG#)hx!(T%GmJ=f{NPF96 zCjLExQqV}O8URiXta<2^CXWf z|51PCW}+Xv<3Nj##XrHbr6Pqd{!T+$XpUv<%8}fV@GWT2t?Wr= zERv}JiGOq^TT$pJ>QP9>Rvt?ASm)DYhJ4tKWz?mEi3G^F7`Q zgQ%E=7@EfS<=Hy+!EB8G3|E)yo15?>aC(ke3h$iYh&jOH7~HI*XbXN@dr^23qKzU= z@qoCUUm$^w%NM8(G&ni9hQ7DXA;^;z#0NOS)yXj4gfI$-%TW}r!U6^)U3Qp*gX=9G z;@4-FsB9Q7aDvvZ+c~`f8QB2{5Sqg`r?UaS3u!L!YY5gk!ZQaRMxJ6@J!OQEkTh-L zO1mOMdJi%L-_k@74>Z?G;L7u@R79I|tarQT9dTM`)%AMT_7t>ZVv?iJ)`q|o^}b|J z%g3HN$tj|N<_$(MF_$SdpjHxb*|F8S3Zt%f89ySDHAt$}TZw?KL}`j6en@3UG`;aO zr)!3k!qV9e=1ApSO;;dwRN^@FZy}jxFpaQ%{l7WDdG9pmFRWKOTc;xHvF|7AxIioc zaggesG4Q?0`MEO5z+^;Nq{Burb)Y@Ctadjxb;o1iM$^R$BlMY`iE8fZpc8*Ll~m zVPxXU)(skst3&4GzX8X^|KarGg8%hzrzO2r^3~emD2y5KR7S zCjaNKSU1i7yZiocKGEYpkA|cD{oj*3hAE2&S+e}@KLt3cU=Zf_Y7j%H)z-?(LNBI{&zH* z4@>#KN3(tWk0*JsbaSueZQl1br5LP|kVru(Cm9M+B&Z3f>0M>5bq+H_m4jpz7UIN5 zYU%;dSE$#4sJ&X}1*QZ#9ev2c0_s@F%_*R`O`r=L;ab74QCc!d9vuv){~X|gAWec} zVNCEg%nK6MN_|gAFWe>NZ?8kY;2~8+DVpMi`|FjOkpK!aM+0agIFmt^DhZEFhLab^ z38pRXn7L(R3nonXc&gRbik6JNv>R7HTnSdS1;hojg`b^vU0Bc z{jThMFS9t>OH!Y7M!#QGX&AswxSM=Ch$I2oK_61`3#X8nGKTF_N>;;x8N5Bkeko_F zkhwg}*sKP&S#6d?jNcV@Qh!cM%aRjY4L-w2VQ90GNfB7Jc8Ut<^;lG~N^z_;y-7!0eR7j4)e_wUPxuM_1Xd zN~64EYoY^e63>(tY7DJ1u+#ug3@3|BC2v+?ylAyq$-uwtjf(ZK1{+2QmDn(&8V6Lx zf@xu86uE1VzVc{cBkL`HYqItj&h^$^xvhs{w-(3`$7*QW$tYt$k%Ba!4-@P zFZwP^)@crk1mOFoC5gtud@I#$17}sI6^>p3#Nxqp_EN$XPl$zDLVOM2<~!TBMY=A3 zV_2u_0+BlF!MK1K8XBnww7D=g_P{baX%bv&17x6zxnr-|LeXa2ahjqxIJq6_)PfI% z0Z6mSCkmRV&xQ_+24GZN5-R966L5pgV;V;AXP>0 zkYt5{$Jf|XWble6-?XoMp<w&@zi5(AV~ z(^-)>P=Kfj?d;>!WJ-)^J0nz#0uyMKTN<^U5~CV(Vzg^gjP5%tMz)!tNGVzx90ICz z%Bz|kR4Tz`G_^YpBVXE^?LYV&^43MN@`}*+qG*d-IXOOmfA;3;{Wqs)uisz3x%m0? zG7);0Q8`!wIBqj1D1~0L_!5&!-A9C)_r9@ysBNVL3>(X)k#pQ8Zqsb5NZX(sT+^T##}mEE1@d=gbr-t-9a<+=g**ij@E&e2ZE}26a$!6nzDT zgV6+WOU@&WP~_OJyw|UYyl>$m^mL)3pH?DHzqZFYZH?_tZYXvP4$;PxC{u8B7FiC= zTP;w^Yt1G~3O=aFk@U5~Su`va7>t|gK=6B&H|RW2*{Vw~cOD=WjshIC-W&nPvR~1r z)NV9v$qNF9Ln)tGP0P5XUuK-A&@*Df-vF~u4OeLd&woB~jHm*q!1lRLy79~N!wT>F z^Bv%pNnV_L#ZnE)?dGsJhuJE`2^aHA49fyYE$Zy5TjItHgUUt(n%45I)~Pyf8Uyq2V#au=(RAsyPtbzUHd+Jb=yfd?wakcvZu>?q&PqF(w`~= zu5{NrAa9hTFNIQadXi3$T9@bnmf&u8Yxw-R)1%>yH4=9K2v^>M`hU}&dr=z3@D#mw zGngiMSR~mNeExi7DO7kotFSU8H0u63KF)v2VRi%t_=QkN9}%e>zxARh`EbrYy~%x# z%pAFlEFiGtlSm+8e*@41$8XL?{wpg*kkmp}z6+z9cxoFyYaX^~v0jGZ* z#{GQhu-`qO{|WtN0{(ie9MAnE%b;JN5tlis>;CoM@9xTZAG{zypEoH>&h%{ch32mW%E1nB$X-#)0{ zz^6}u^of+Y@j{l&Zj;6|O6&{lb-GQ~Xy9Yi&$DkYHxqDt@;3k9xRZpGBqSDEf$v{{ zXUi08wDbusVT&dogd{3XDXkx4wTZSo?=yL)kO7t`BoJ4nif5iBYqEKg0QP4?~7eN>+pYR(?-*j^fyPVuW1}(J` zg*VXO`b;guf8HN*frQkUoZ(h5&(RX&d#?2HNAc}Q8lC3ArR8Y=FRg5o#sL!yvWum}%gAE?kNg^3TDq11>iT0QMlI7*1l%xn#UMuYOUM`L6-=Ol^1f^sV3mLSh=wGVs| zKHHSef$AlsN+wmWmcifFVFm->n7WsfI92%8FS!9LFU?sE;7Jj)*iEOw+(bH7N<&Bn zW5Pz5vS*^<2!Q7vT+2e;BCQ)u9-vAb-BmmfAH@--&k{jNqcOfrtRa?d-%Wi$>q9{(sh9@Bb&%AGXl{rAg2%0?dy4-`SuX|7kYf z$A5j2hv@%0S4$iogQ)XDbk?rW|GAx73cxf8j-8Hmhz%LoMn<1 zXCyTPDk1%B27`&m?C;9jvY$$v3w03xp=d~yBC1ql>4gO6BwFVM%)Sk?y!a(7mfw?- zn$TjYP~IQZsIEaw6AQTsNw{YCf@dVmHZU`N&7qh1OR`z{}KD;*Ct$YsS@)_1~V4c(;!A(SXiORDY_I?Wohb}_DQk8S5yVeo8^|~R=kDV z+}6M+u#Usuz$cI=S%I@?bu~4DxV>Vj5-p%qC7yJ|6d+U+98fmH5slH{pk<(?gRD-N zSHL44bovJgy6G%QXMP%i19os%0d(;R%)SBnr72c1!?deB%gj)3n1TR{5ng1OA;tps zc|r{jlmT`hegrF3K2?~Dfi!+@KAa{ny9Tw!S{N6-@36`_+b&AP?+6!o3u!{f(=7IxW0(_mnkUjwtoS%euvZyzE*g+{NLl*d{oN+J=y1fe3FOoe>|dq z*iwc`45DNa`t`Uzy<_73Hfa{Fyll(zBGPlX&g@Ia6Z*lW)p?Fv876b$c0_a3(^qa$ z-hiZfR3D%gru#RxSAlGh4z z9iEnfZVtG}8Ql)i--`PZ8CaS9kwT^2RclUejeT|;>9{ZerHWL~j3<*~E=!vve*1a~ zDDo{&p>MJk7%6+KW=ktfZnP<&41BM2?JrQmeiJ=|nFaCRluJ3sKV7|ZN`(!SlUo-Y z-_(kh63YS+Z~oQjDoP4a3SOr5jO~C@8`@TM%D_!N^RVS!cQ*~|F*gpl_XWhToO+Vt#KM)afWul zSb1k}nnO=_!!=DM1{L28deLhbd0Vc=mWB~6W7kj!RFjo~MCeT#X=Ibz(&t`}<&k^Q7A7=k=A^*vSDz&7*9rE93JkayMOs3Pl z|Id>=_=x&5QTViULTAIqFSvcQGBixa*!V>$!ktpfRG>VQ@WR4H#kwj@ z8uZ;daafzWERJhg=S}(Ru3@SesQvB4!#u6`{{{-69sB=eI@j(0#?#4czyCkQgY`eV z_y1bDAbzi`>8}|>ly`c&0KiXF;Mcmp%w#Xv0{-ta&=IV^becOA`FRZZ^5x!r#b z-W5xjeF$?12pTvkJOt-IpAc2O)~w#c*p!W2+g}c_62Vppiz;QkjMTpaEmL-#QL(ny zE&IpB`n^&~Iq(n&X@aP&ZJoe3Nk+7aRS4~@VG>G(-vg^${4B&0qO|kTpWH;0x2RrH zF#VXewtxdyX|a7BX6pK4Zh<8*CBh)0a0L`;5`T>lgL1!rm8FOJV* zsQ|vqgCx9{%!=_j4NY}6jg`g)0Bg(Ctx9_H43v&!m7V4nfaEuspMw2Mkd0bmLK;$w z{C&2ot}1z!=MCLkeoO*hPkMD!j!3WzAfhrq2H+n@(sVS~>CEh+apl6)LQS%tq_vdE z=)!}NA9CsZ&~{S(xw3bx)D;ho2yj~b3PSDf3Asm57z{I-lM54R*kUbDu` z@+A~VYI%cXQBQOC;7YuEJT>Ki*;Kgyo+g|=rTM0JodkBs|I_JEm;a}e!F(_OKgDB+ z|Hz#Fa^N8eK1fzPJ2}=u!8l)M=(JFomYq1_oh~Gr1DaE9?1TM<#P| z6}mvo1Z`(r65I5?-Z;R$fY{UB#mwBHARNH%NhO1I23|f+^m-jH4Sz-*N#Y~08Fp^N zI5+~t38}M!g%@~*hxjDPA|zdHY9b)ZGGy>XAe$C#-_Kx>lU@baX$Ci8vL<#?NpibR zfwLJpz##}|{mWC&7oEg_9L7?f1=r_Zp3@t0_A*P7LVZoT!vs$W195RqA-w_zfSj?U zVlJxBQRuO$;eamq1g>Y30QypFaM6ApV5o2vM7>eGk2J$kfupon6IcmH#?ck`WHqbi^ov@Nn7YH{U1f3E;RaQ z6<9;#J5+ZTbW70m#v6b&;oVv>$Z2LQV(WjkW^iXeS*tD7g95gEWR%`cC*zTFYOEF? zs?Uzbx~-Llb#b?=4}XWg>{KOI^2CQxB-Vjw(Mz91CsSFN+@TQJ4CkQ6u-X zPpk7^27|Ef;jf1O|8OwV&wuFE{`~g@&zE)n!xQU1M?Va}cp>au)`q+TXld_3+y;#m7%pcRvDVCIxg)v?_g;1K22WC z#`8mEi{kM-AztJ96iiE@nh>*@5GmrQu{(Bl7Gi((8X=nWZ*{Br%Z@7>D^fV9l|KEhGBjN)R zMi6oHS1Uvoe+iF>GZ>C!*SUbjI*Wk^^5mufaT35|7CBYq4d@tR?n~1K)yiE2fQM1K zg}Gc575?(g$25Z^%(i@E%d(fbN&sl|Bq;`y-8I#pvB*;P{xK#qI!ytd>U^K}SvO1b+j}aSgXAJA~Ea8mOQ!F}q2GNSESv!FU!)NJA5 zBe)t9oU?7xByr9xIqs6PySq}zOR3nE&hx_oD0wV%Z|7B7Y$c*~^`czl_R`e7U0=g2 zh6T*sFzNG3N5tDw5V+KwF*cVunQ3`Ybc|@W0vejblv~o$aLn`(3g1Nhj8e^@xhO$q z0nmRy>{cZROAym=AA7jfsO)OL&uSFg-qWqd<{NC!yy_lq&6RSs)>?4)Uv7rQ)^e%U zUT9jAHj+MZ(#~Vvz<;pPGUoqeB-MncHyaS4Z{PI(&$pKvG@u3BW6*?2NBFTvEA%iOaIi{1*Zz(_7qK!_X!_rhGg>Y)nej{#ev1w@rIr%4BCMWhTT9QdCvFGsL}Q zxn9g*G*Wf#1#>(fK`Au;!%)-`<=d1Hi3g{UC_rL5;=>%przcw~{c*P9-{onx{}*Yr zp;=}dNC3O!|Jk4v|9ddr%l}XEG}`~s0X8RLG1rhps;1c)#gW|Y{FHkOcw~|W#PlJD zVIdIU*Je=wzp8!ME;peuMASVc`6cO$b`w*i5&OcfT!1mgtXk#3W%oNI7DLxu`wKFl zY_|SCcv&3Ai-sD29qWHM7*BNhe>NHI*Z)&I4c7lJWblD^ovaJ0y3Ud)!YXWUQMK^- zyrJcsx@weCJX8KidfeGe*zg?z>nXCaR8iN_K$xA|Mu)tzVt@Z*%1k! z{mb#i+3DGLN8m#A3IwnqTIz$lJ0Po`X&e|5@TL0#q*$~;ZBy15k~scFmc)x_3o?k% zM@%UIMFPA{5(Z@|<{-q^uUQhTNiI$pZ^A5zS1>Nz&cB86O#+rhk>*GJevtUNdmR?B zw+dZ9S@n6Y+`PX`KJ<#Dzs5Yf@Zz9HTj`-zdQwSQ`Tk`vrTz0{kCp$sOBk&}Z2EEE zHg@ZOHT}TlJN!~mM{j_>o5usS4utq7T;iWz5>`&kY@hQ zLB51h1kl-z*!+a?;swZH zatVSk%RBBOEc*Dr1pSVC{XbbB|Cha3 zF8b&{>}S4-`vTCl=ijbVy!Yju=WhNX?L2p{z1z-nw^*USlPp|xp8tQHufWeN|yp9HY~M_{1V^?&mH@!5B8-oE?JT?O}Sqk8?% zMzg_CU;l%B{->vTz5*vpFJ8bXS^UR!_Me?j=RZ7boA8QCTfLX=aO@79|NM`>_n)1w zzWNIMUHS0e2TU4SgvD}wjpdLcTSGdXyfnpgD)lnhmun7O*Hs{O!NF)S8ubRl-f-US zptcZpXvKD(Q`ce;kQ-y-qa1-aiF+&WpGgJ|{{Gc)K6+UToiNYWFz=)C-EPO$=Yg%y zgO+_Bxg)L51G&#**5_}bSD-F?K>)t{=@e&XiDB^}$!4p<$V4pZ6+hQ5DUMwSRv5eHkGUA;MKcYSdiN8k21#(l9WQ7;eBswcE#W$lk zbZ1zA)XQ>+H5X`(kusPdvthjfVg#8DM->FItfW!vl{737WMC$Uw34o_{`LY~UcEj& z!z4I8|JGZDXksYypy8St46NNA+PXb#-R*%pQ@TAYciV`{z@3><8Mw37s7w`92JTEo zWzdR$&t6WO&AOLUEBOcR)Yj*EjhOm8(fT}nfIiRX&H6l_SM+&e>+_^_pT}CCCvEyn z`b%G8HOB#d)ul9O#(rmWJNq5DV;c>|t!XgQXfT#&FgVoM?@jm-M9Cub(YA`U!l;Y0 zhFzRhbc;+KF{Pnw_N3e zhT}Y#<8w$I*we#i^qd}6(bFstpbxF-Inn4jmFd||Aec53f~IyM2q9?eb4!8X&>fAn zK2M}R4-eb*dDd(WO=nfS!Ylxw53Tz=()v7>`}|T901(q;9+$y232cR!CkcW?`dbeb z(cf`Jf6dYW`p~++L#@9fV}I+8aalehq~PbS>8#!+F6c3=podvfKp$GuW1!JvDAS{z zq%a*f?DM#)&t^#heQ4X~;i1-NSyB*3>}Gu)Hj@aaL#srH5VZ7pSWkmx>hnvr&%;Aw zpXo$qf>EBVAPB-695JTAL65;Yi~gG9RnJmvv8aaD?!2^hryk9;?i4UDdSiF&&b2PR zl)E&v4Wk%0I-q#?8gBK|K?R#0+C;ixYmsiKiF89*q#NjLy2!Tl{@nvP#KB#lkZu=Q zvQF^;N-1xO%nM^{hivlNu(iB4)a13{%-A9O;Gt2Qyll4UCNHZNolS_UDfyZ@sR>a- zS%?}~1#zvD^JZ%6$=s^8Mi|*T*-C2SOHrSmlU5yVCLT`a72@Gg7L}Cu5@OR5Vyk2W zffq%9Taf@BFALuzU!9y>5NsQ&047)k@SMh&HN*EZ2-M5tP3JlABk0BJlti2j@xmp3 zwImA@NYMe+1J_~Ec@D1EtCaS)^BiQb$il?}X7m-vh?%l=2xiUB_>z^2Mzk5r(peXjnrJII|vvDmDSK<}IU*D%wF}C<~ET#b!pwCfc=@>@>mdP)9=@ zoaXH3@mb;nat{m9Z31X3`4d&tL{C}r9Mq6J+jBHa2W=8(Yk^bS(1o};?2WD3pNHVG zmJZs4v(~biCYnv94vzGD4=?)QZSk4MM>}l>afk~q4nPL|45F?lH^7Hk(aUMHgCu4| zA*5(_={y-(FP#r9H(`fuFTxI8P3<+2NueJtQm^orOqyT^z$lDwq4oG@Q(CpxS*iGr zWqhp~3w3UeU)G}*8<6qKNrj5SrlDwkZqW1-#tzZ}p$uL38v_e83yG%)41k|x8T5;2 zOMBl;(jHeSVy!|)+umy$siE9^t8zvk-e%Sgniw>$>n3xH( zyIXR7vq_@$3i^>3uDDAqUWMt#|0`uVVT|kR?gMGYQ)IVBW~5Z8!3%x{*(njlAxa z+i2cQQW?#ylFHPwkx$!h%u znFu(tYf8s9!=`a-!=|xj*ff?6n})qXO?}~L)=VKfnpqX1W1G3txTU!ht~u8_`BLs= z%?qbdL(|NW-86G-vvC@?ws9J3Hcn&N#!2oZGf@-A84w2vNyj`HrSzo?iN;YGoaTojlz^klS1IH)j*@ufuJ74T*qML8_2qhS{K(TCQfG1Nw5 zB#(xE7k!eXTcF1JbW8W3MFRX~7zHF*yG4&Yw%JaNTiQUnma>fGqj=c=(ucA zk^QaIDI~3uQNv3zPKqVIM#;e<+`yPzB@G*1qYUlWC}W!y)wrb<6{>ltk!K*2XReL) z|Gmx&kY>py3?QIk(n#n1Q9D8BVPynz6-zYuwg= zYwT(Q?4eACvc4Lf>^5G8cnX~s)JTZ(%j*9$PG;#%(R4G-Ld+ zWD!MsVMfCyMYa|qH5qblBqm>SOl2VLX6r1XE*{L?bJ)=Fb!c~d9a}V^` zl4DgbId)}H4SVC8(Xfd{t)(JOC>qy8!zK^37Y9@{M)lCJ?&NLJ(D(6rXxKK)miy&M zACy5IG;DE-T8Ampq7;qPL77<5Fb_)Wz(HEvppiN#b~Ma`(mq^|PK`kwG={c_53K_} zXz?CYYS?VitzmrHQe)r_)sQMGIc#_gZ0EW`>vP>eJJ$`QbKT&O82DOHF|U_F>qE^z zJJbxML(L9U%)>KiEpiW3k$WJC+|`(vMczR>k(cTvhN|Q;5OOcV<)sxDv*0>tE4U6+ z!F3=6SA@pQiiTNm9kdl(wfI*9A-GnfVHPJ_2frHVgEFg!hFK139h*r3KO(^03(YhT zau7npcABuoM`{@!iO%3PC^O5LM*|g#0AS7;&RCOMIB4sgBL3!W_;0 zK=wg6oHvT>b2zsI_L*B`#(7(rajwdYb4_NfsT@3PW*%@ztOL}j%wb&VEKP3W2{D`5 zV;mB54BXo3D$SA&ws69KK@h}bV9^qxX`-;naK4QT?_)?uuaULiq0QKDZV|QTZAEQV zQ4<^#xuI;}g1Ou($yijT<@#EX925Gx?@unkD$FuEw9`h;Gl$cc`fVv?t-(5tLLW^X z#)()SEbNM>Npv>y*~F6eQi)1FMJ5^Olk`W_5$u;ms%WH3))^8#rMI;H1-$Wyv)yxg zwN1lgM&1_f{zbwzOdf2AEVCR526-4jA9aF^MPqOWNta*%-f!E=IR+|uAOnp z#KaND(MF0SArG5Xo_ocT$7vz^>rEIzmI5C;i}T$X6Qda?n2wFHF|u`hoS!8z&N5Xb z5)abNT?^(|i7l74foXQYm{uGxY_eV}QE%oBC;G_9qMnFWEKk!5m>1dFFG$b}JlVrI zB&OVwfvg~vn94!OcD-i)T!%JyF46-7O~{9qL{Y6K2q+_2_!gC91?oF@AHIE=_q?LF zOsKg8ArtC&vw$9lwkXFGOLNcLnplvk1EuR@^*l4M#_XhhEMQ&;)1{DD{2n%oJaT9Y zJVFt)_PYImAL^a947eI0V4YG=axcQ_1;w5#fY=Ec$AIztV(mrI7EKZu5Rx<#jIh7o z@0|a|n*ZnG&GG9W-`qd>PmTPK)6q!F|1+Hq=KK6VPw{*OPO0@j;_;o%x9gagw?*M~ z=4D&FL0@HSctQ=sb``h`vG)jw60GMyd%O4wj?uZ?Buz>jy`1LU410wJ--B_#Q?p z@RpK=I6aEIl~>=NUV@YFk1wvk=_NROcLjcYb9{CMuHJ!f-hk7y%d6wJZ{NHIuTL-D zoLs&A8*cHExOsLuJ#bD^So%xo-(vap@4u}>|F(ygNC6h>Fo3z>aDuJ5Nw(;(ym;+J z{r?BoxI{I+9u2<3b^3#0?_CPx9vc3B7u~p8s(^81D1`KFNc4 z7%`tkoTW!n@^(7Xybg1aX5q@q!e~p9LLw%N<)kg1|7XXS)XWwwZ@2S(@&RsO_5yr> z)G3sd^`eOK{~X|qv|bjFR!K`PIE@M0=LxJ3gm8tA8FEf5X7Nj=CkSKA8E863$`mon z#8Vpe0IR02w_;yH6)-YI!VP9~FNVVTA1eTpMd*`Vfl=lY_yHpBezi>zcW2Z?e-Y)d z%O`m)K2dcd_ym5v`}`~T1TItPhc{c`#arWvEC)-NVIMVgAVVLs zEeH#^%3bir^OxphT)s@!5l;t}V|~Ug+`43&5%CUuF9z2{!S4c!H98nccp_GQ4bf)) z33EoKGr=PuGKQj=;YFx^FNt#(6~)QuFnn^{UuQ4?IBzkT4HzNOsOu*IVZxc-zO2$y zuwZfo#{*FV2YyDtdK4N#3LpD@ALcnp3F?B=q6UKBCK*w+h4D@Dg72XP_&b_vLE_V$ zlcjBzj+1yRO4eBq^IU}u_bBE)O0fP{62e_GRa~N73cx3Dog|17zutIJ4$(AvLlsZ! zI4<{J%!@Flx#I$B6C2Yc#opgrIb}82cv*VSvN|qtvh)DP)lg$I)g$0ljj9+iDw>*vfe;eEgm7_^#@zVUK6n;77c4?P&8nt=}51;5~2!b!1|1`Zvcb6C8t03el3d!AQG4?-%(1r-z1E`xkKX7MxMF7p06(Vq9w)?SjcXk1 zHAfSfEqDli4TJYt?)_T9ncOf&QdM4KEqXDag(YRE&XjD;Q2%5@Gf1?RTj8@BKIA6XF@P(Nf3k?y#S|cGD%?!1L}$*HH=RdIXERb`>|UNnH64|lFDqa zr|Wr@tm7i}mTZ;cqlCl>$o2D&sFd8B7#8_5NlJ^d#g4&2iS44uk~Nyx_%+Sc%42tg z#S$;y^CYObl^F1D#M3#3yBN9zy&XH}E$O^mhWtRBoVV4GkMnvpxpNt+ z>ouGvE*?i6Z!|qpuUO_}Oc&Vc4mCsglLgRiXxPONsGlz0B0z6(2~l;E#d`bKB1GG zbL1dc&I>0_@aDnl7vv)cgJ=9XJurGSU}^Y2kk}M3vXPmEZ!?Jy!Oov(3jBP2=GwdC z@~csGuT_voNc^%4{Ux4cY;K{N>_~S_w@UTEW^0QcW~KHpHKgsGOctfQ7X(OZB@^Hp z-k>>AWVmFJkk-k{@`|O4C#TS*YHJX!HX4Ycgsz$CG-nLhEUFn#Kx?BWJD`|85EFZR zT#-O#U?1X;0%HV`BI|22+YHQI=P-+j)?4RdCmE9Hi_nX5dg&gcR%w4xQ3EOkWm8~jSnMyDJ-8uiq&_-V4T+;km9=SdX$+Hv;u<}4}B$?2>_^JCHk zSrG^VNGS*ndM01lNYEEcKSLCfuLy9p>ZWw?g||@QZg5bQ(SPMjZ#119O$LY4@!`a~ zzW)E&`_|sLZKdJw`4xonAu+Hk@BLz&7I2)V36P{l);YoZ7D1O1DK8&uMLnX{&Nj_| zf572I)NL=0o0C(-AKKU=XNKf(I5V6XVmj|l>3kIQqd`OlbU^4N97Tg(ACH6iv^N@0 zhl9~D#4{T7CnT7KB$$S~sR8VgqO3tj`R$fwnLNh8-jXehX=rS&Vpjl=P0mG#V>J@H zu>UeF{Ie8wgdmJw@{Ii{`^M7hLFc-ohErIUJDJ4w+_W=F1=#(V#kEMAIi`x{2(EE} zAAq~0ijzGIRYZ5Su)u}ULW^qXj*|owT6u>0 zlIbf_AB{;_o@QPm00D>u#yyBT_2oWlnwEa>}M7{GZ6O1P>nUM1DHCuzPTLT(` zk6FQAKq`f5jaI5TidFjxOb#Ir?;-5WPjQwrCE*>Zm$2AOgfmF=&h3hvuDdXZO?FM& zpck`Q0lvncknXt)_$I-(n8m;u_d!wWUq&Q#yPRHc+u)WN5pB}z3=@iMH)*>+x41<| zYQ&5f6G7^u@61z8PqoZG0UuR~O63Ds=tWr2MnJzM&uL6^TJK(f_R(`-Q3(RE>jW&w z6%(}`)SztJQFtwbZ`HV+g15yE;aQ2R06*CF7dXWMi&@TSWeaJeB`~ zO?^?^mBK~2b3lxBr?O-JQ> zO_yF~oVa2|BB%Nx9cBvD!6U}fnwN9`e(}skK{}@{+%&fzxazZW&bmcpVQ`61!>CNL zv?i4%BGgptmGsVjS0BAI59(Ta9S@k#JM;S9myaD!P@IJ;D(t$LdpGp_?Lw}K9FFK% zmC{69sVbQY4O-(Z%BbM+Ek%ilIltMY#<9;6l^ozWH3ZE!spejihz31W@73of$ROv) zyNEX;r`ZdZiQGdh0x!#3dy9bJl!k3oYWjiYtCy-}Q!jZ$DN58KrOoTtEV&WwD!{2e z{#AOdD)6M84DIgS;%%Ozj7{CEt1nDga($}Z0$rS{^bxt#UET2Xv2vVC>oi|c^XC&i z#wI7x8_besx_xw2Q<@f#1Y~5z89F~fSO5PEy}!CZ&rZU%G!4zgi7dlTn51c-p!U#e_+-!lWmH-Uk2Z{OjJo*{^?3AU*!3w<*amI(|U z89r|^I>A7cA6OxHjDm=>Yw&BqMw0SFpA$a1v;jy)q$v`myps5?V;M=>S=7WvDIPvVQJ& ztz+w#vuKiMO#Stg=HaPqDNq-!ahgi9UR}!885O##{0=hq>-R1uq^r?)a}Ew8nulGW zpnJ#i75uY{72T&NcBDpVHO%veBJ|#ES(FCY@{Ou-Y^80^(XvHME-lKMlTxqMc^vaQ zA zN%>%GE39TfGAYGki&7Te7^69Y6isuHDvjt4V(XM=IZpDHooPZF_FDL|t8Ps98u>-T z``Y+x%#tStj_;D{%TLdQu`pQpYzC@WX}H{?-OBO-Oemw4bUp(;&}&?|p=Sls6SHYnOh)>olf*%tIW* z7L($~h~28oM)NNmq@;llEjqYOHvedf!?}cOwg&-UzYe^F!%7JZ;Bq2W&V=Vk9up?T z;pd-F-|vsQy+aV0(4{t6Y|d1n-|<(sL(tkLi)%T-gt`Yk0xP8V9gG!PAB*MkO(8KgzZNAUrgc@l4n&(I5JHh;2&zIF9=s(>^u37bTpJtOqL%UWM65#C%V4Wx;?D^YDKFMKs(WqjycWN zEKv-~GeWcdf%q|tXt)ilVK85oHRY;kX{K0mL*+`wy#3dru9?ryI|lVDIo-(LWKFhg zSay#AN8>~(o65ikbxLjxbO#|W@87*%$fg@Xo$xt1falNDB$yDto%e}F{9yZSVhK>| zUE(=BbYHtRs{|TWHU2W}BQ6k4$9)LvNNN{{z(l#ZI2`xJWH=i3D4B+RG8#sd^k*a> z{r+?sOeZu9CQ&$?PWt^}5RUp}I3jp3?1iJ=0FP$l@jil#9iojyJC%DZfpYUEc~ArD zQ)6Y6#hN^ycxH-{=ti(6OrIbXFvqLpmBH0O76#DKq;cX}Z;cKg9W=6&@ehdQalzd0 z3f)AngfS~j#Of9(p*dm)=zd)V{4m@#e0w%S5DxKp5)8ure2hoID5T?XGL3>>IOxrz z;jA~Dj0b%hkYRs9q5+7;M8PTd3R`3hw#wv1u|F^COZX|_9y+(FeMaFK-3mCAZ67Qz0kaKd~( z|CQMQaI6-FNA@`rGnkD2?}m!pj>y>)`M$B0o~>#!QZ+8spj@iS!hRKj2UapdciBN? zo8UDIRZ^{BJkd|?m?*JQ2m6xGvQvr^vYlzx;NsCs=t2^FP1Wl@G!|3=gKVPm(_C)P zO#*IzO3+gW^$F}G1vJ^ju{6@^FAK?|R04w}HmDR}t`8eV&_4Z}plw6G*Op?)lm9UV zH^7KqmL%EI*E}e728_fe=z>dvCBkd~>$M=ombUe^q;Uepty(Co-@B)`p}BCcOJHbT zyKz4&o)zurf4;ozp!7EEAi7TT?Q@oOv~}4jqJ%m{kuZ6VsQZm(I@dTgZnw7c=@|T)4GoD9Dc<->N!`*4o2+lr{M1vuD~>1 zy~u|!hT^gou5h6JBN)OR&o^8NUjdL%TSM9vd#TmjGvsV+;buN_^| z;8v2*+k+UyiX^qNnv(kv^4PpA-A++kDiEQ!_s9U+iJ|WC{|_erG*a5U;XJQpzv*Le z?`{Kz#_M%Z-`4`2L=-*}!6!cj})inGq8=?W-_q{J1g1?9D;gIvU?-B=Bd9zps zdGIZxG}NOMOOm!DFhi5hoX%v0GMm;L=ig1 z?A_3}qQ>mWsZMuR1#b7hzfb>`>JDYf9Lr z(b;D%-*t|VMNZczt`!Yyr(GomBar&tE~0t` zxjg{yJKMXO-0y$$8bZJ4h0ivv3I5;Vx@Vi@zhuX2V!zj=|LPo}2TbfqIXT~--dS#S z&$LccwJ7D}bz8=zgi_9(to1rR{n7!kXfHsq{Om>ISE){WXXDANV}84UCqmSPyLaaO z1`kubVPcK*aOHJ8c(20k2Y+}kXr_O6OV&fXBIl_b0c40nhB~wMmv#VIj^nn1I-pQ~ zakrrfaMS(jH#G&&U6;E$i?*C@q$U>NI(gy%&r~el1+&&vUz;=)3nW39QKABRs{OuQ z5L1D4XEcZN2>*_Njta2*#dJ8Rn&UaDSdIwkD7x-P+k~oK6QMuy`+m=abIc+V;%GD* zgwbd`rIX&cAN1%f>W|1Q>1KO&IUCOVOrR;VOadzie+`y@;_By2A*aO@7d(3WWLWSr`OOL_7p#I_} z?JClYcN~84P4hN_Uz_h~1LX~Hd~=7_V4{LRVajw@jv}T5GMHF_N}`uyYo1*)P}Q_G zq1#&%Q$ZM#t)8(6R7XjgAl%SECnw%EU z6{t<)s9qs^R~MIZ{_G>JYWkoVlm|_Ct{rmrKCZSlmVw)5=p7}P9m1Rz(!+A61zTg! z0^vdYS&X!O622{m7HA)sMay&cU_4p{+c=cJg-f+?ZJVNn{=A1nHI#?tPYtxjod(%K zyeUcpXn^uf`O+YLV6Jp$>cM!j476bo56+KJVsy7+X$z385)#rUldv}rqG&#vhr?+|N6~0Ho&}P4G0XuK>G?TK#RO5r1B{{||)z6<`Z^_Xt%!X6c}IV+)Dz;M*?Z#74hG+)$T{ z5M)2=``tPrK4M82Z%h^>4)`rKudo|&jKk30YG#zMU8)!pyEBHM|2H(XGb;Ed3u^^^ zpf;88&OUo#y7A7uQLooqdmT@?-Mlkz_AB$gbUYn%>$L2b+l_l~nD?dRD=|1tz^*{2 zsuq@L$;VQp>XMu^YqKotB@65UVEZClS;AZq*QVK)1<5%|dAf;}ywUA#{-!=8;S5w5 zee_IM1yR1!93FIW3PH(}i6&vTO>^Zu)F*34KO(=034*Lgh?Tfyg6VX6oNNP5whFmf zMJFUd7jlhQtk2LL)nAvNJ*aGOnXy|I(`)*R2yqM?s2y7!&#lTNSGHc>spF-lKe64+ z)$2RX^B307Z0bk5ug$8z9pjj5$j~z>$p;lwutiz+czJERuPdiulB-=p+iD$@^~t)p zwBxLTV(AOKW-)6>Y?kUBOHpLL149-U-756^H&fr|)#dG|BmX;TMY3&DZx$@Mj_D%D z;Z5yqXQ@_Z96V0@4!VSR?B^RC>p$qEZu^%yEf1XU&^ocIF#JJ$wQ%#|SrYMVt)zL4 zvlP(#vehcj(_L%@(C^D(ssz9ekO?RBvZYQyDTc$eQ;||;uf67&Ji{?gLYjfBdu!U6 zC6Ma-161Cz1+pYOsM0J4ak6u4ZS@bX%)}(B801bEN9Mr;+&xL~tvT?Th_)Pf#fhy6 z@a;q3IS+w&XNOC>Q`OXvP)!@(JeBF5ZcEvA*-`&r$bVd2TrOd`m+zlnE`6koSosHS z&ZhV-K^R?KTv|quU$1Fi>{O_|CHK$!cdy|q>}%(SWY?f_oL$p=ALkY?0y*s~egjqW zrzDSI0^mXHTs_lc3bnx(u#lGpz$IkKn2Pt>K6d%bh$kJ>Rh)H>(OkK)U8VpS76DS~ zwdx?Jh-iUh6c7F0g)9HSI&b5O^5tK%0CesF_sGFIjw5%BDAmNjN9Bk;yT-sjaN~&f zY-D=~S-**GTZK|jD$*9ntIN_Qzbhr(({!E2^r;lCfflYOosz8WAPcWk$Xthvb7Q*f zG`1V;oO1trmw>jrz8$o#&e_ zWS5}oWo1pUEXmo-yB1oMX#Z61R=cx>iW~xu+=DxHTmYLBmNZS}b5n4mm`f+l zMZLMl3CcE!suraom8xtj2(Zllb%sNFNizm<06ZaXf#n`xG*&N5q_qM~OawtfDNzQF z21yYBlykK$ZUT2{2{zZy`PjuNJC&M3%rWU&%l9d9CjK`Vd$+%1^sSZsUL{1HeH5+u z-QmM4Hm9+(NmH5PrL-lrBJl#pae%{{EB=~ai{Fx8vW#cTZ#ywO)~ZL{?6SHrygTBy z{MyGy03tjzQb5(0)HzRi%&)hLR2twH_T7^@dFGLnwjTF+DaFhkOqrTD1HLN&ez$mv z#oVjsd1HL`(PHT8>i?C6kO~BYjNmIn ze$OBD2L0Z=KQgxu!#=_Det$5Y;^_p3v%z#0^yp|Zh{%B8-hj?9#o=%?$I&p126#M} z&cjg<&gap%AI_}TH(`u@Lhrhe_?|9jv6@AXF0UgiD&$!PH7{r_+B z)9rR2tr($aj}YpjoQIF(UmiU!eA3dgyJht5(W8IGEV)6ej7C3s=8!C;q0h7H(?8_V z!NSu#W4BvB6v6}Z?I$m%pYl`qJ)`kYp2)W`6)Q?}51sxD5A46B@wy9wM*jNv@nf_I zaU!MBCeFp9M~@!;h2C=XhKbTKAy1)ALQJ7`DQVBT`+oicj751rgHayEaIf!vYNX~r ey>35#e*FCS`SJ6$KmQj10RR7BO_>$|4haCSPq6G+(BS;3X=h{X zVCJo+>?j~@Zf6g2+3o9_Gt$EC2VD8{uWj3sYFlC|tWt52aMS~pD*oy&xN}#8tuSIL6zLI`_xdnn!Xit`dJ7&A);VyJ zPYnHwT8o^N5=Q$i1(nwAxq?;!Q5+hR~H&UUtU5s#Lc0^B#axG0oWCylXAEJH1OKtj+V7BNEXOE5V^M4X=*3HTfS#kqa9>n7TBG8pat&ux>}U}> zWULGssw92lKx8Ik%B$H04|@&cpb>A9lq8~*$Uvfmv0nC0sEqYE4nlITI8a9%+D}yL zI-y(SCVYDr5IhV>`iE)yi>JF=4{J+ap40qfH_#94UFixO<)fR6G#(3O)D%=|Kyt|0 z6LPfi^Go}m!NA?5(Lh@pwC^uwm@Qcks$sMS)Ruc%S?-Jm;`d%Fz+*V1$x1P{iKcAk zoTpzo)^@^rjqr%+YLVaRa~T2LdtvS0ZYF_BAh)6cuv4&mU6O$AP^b@jYBI2-NC7A` z)QC}k4zGoM1-q9>EU~RlznzMJwn6y|giV436J)A|9WGN1YOcX7jyk-Gbe$P~eL=q1 zB%FFMG^=mP7yP(BNPKDo!vk4Z8bT@bjbf-1`dYLbiJ2YUh!`-a!1aJ9IR0^hOSY8` z+GYZ@#XbN4YN=(pzKHgnCC&OgPAuMxq(ih8kL9z)ao`5L_B$+lF6Q3#_r?V8em4e% zO~sfj#>0Dr={i(@D)K(L|HY=9PmHdIrDn-0XOjg19U{i1m}3pLAW>I^G0rZV$VAzs zT;rsdXdzMZ5jgi%{@2L}XF}SGBCgzKl!T0s#r#e_geg)G*h^Vs3M1HhCK?POU$?gQ zbR#tt(}P7nAlZY}Abkr?5-UA)8HLBHAizZ%edFa$m69|L*53*l6Q05j4O z=A`F>cjuptT@tmubL<5v#rv-`Qobj|%t_LgNRx0u5sy9`^xr7C!6!fDBf}N211C>+ z8Au}miC^85SD!R&7E=Y4p5lTqXbD@Wqj5h?5!2rDZkrg3olxOX(LZW=a9#X)fACR? z96EusLS+K8pR24 zn~M)2{CzV5aGqWg8Kzt{bma$^j~_0YYk-&DFra%eqbTMUZ|ajNRWXror18C__%G0y znGa&rfG__)s|O7Sv7yG7RYL~kaKBk#2J;Bt4?~j<5E%F83HdT*y79jn`-qNg6k&e8 zaULES*1x-2P&u-`9Nv5ZTW_T!N3K&ROb7;A2Tb=G6XSjMlKy!uR*PdZ{LqvFg7&fBbvt3CkDUO9jQBR~Lw=dnFtu>YEE#wWS zGt&c3x8JVKhMx8JV;R@2E|Vjj-RgBS3QY|7HLLWm)gQRX0{0~>$#Jh?`BZzOQ#uzf z?pXXWUn#MaTG%onqTYvuK0aLgE(3uN$`;4N3a0<+Bc1?xLD1 zj}nY+`L4E`6T*qH5Z)qw(XBMho6*M~oQs_~-{9>9HYogiNQI$v{p>VQG2(?xP*odf z3%zcW=fM;ivl@d55u0ITEZhd$fVDUl??8i1V){T0e3Njp+uJFC_Eg}G-3>RDBzPAL zz=8(maY+Pl4*#SwK1?`PHblhvfoT`fo}TE!dI(Xru=xxQWV1B`br+IwPn|~gvw1%J2f(m-S`==O_tM7WI#PJd?6LQIg8i-tnY%o5Jp-~8w@p2;bR6w zH{Gh@vhGWYSzmgEB;b$`=@+235+On^0esC4#1)o}1_rk0gC`jKy`AY#OHA*>#oX0XJILYCzZ}vI52>au#=PL`B^5 z$$@C*&!wq4{djQ@)zM#I{JlUby0(}v{;|dPmtHJA;{A^L-G}#^ZS=QAp@#>dq`ZB# zBL`8`s?0A|jpNloHErciz!$Qj@ixJ;1ODs=#xvXWCSHA{*bU{*Uh$SJOsI!iP0#~dDcY(@A1`S!bgI&Db?F z^EwACS?cwGs;mTxtTHykz>h{^pMjay;ljoE+u1L}?eA|n5-&JMpj zvmz%Ol`zv?xb+lAqEb%T!`MurCH5Fp7-raT0ez+_b78*m*yg*Fv+pc92B?Kl<` z_PN6~a5M)K_Q)?x9V&L*G0^w)(^#AoS25xyEU2B_#UYECa-R7m-%H~Luiq40&^=7* zAZUGt%7P;0U5MxF$p79(?6pa_t0Fyltl!nVt&T z_cItx=3_VX!(jJ=A@Q|$J!Vfh`fEHOyfvR)%na3s4F|5}prP(XU#JW3rRO5&uvTU5>E4g*5-Ezys7C0u zA3osn$wvse=CYuqGdCFxgHH%ZoJ8ci>-P|M>k9m|8+II*!9GtIA(u|*B@dGA-JLz~ zrsvPTx(wKgp^K)8v9!J6GfuW!jY&)GL-~WZWSZoj6s8?R7XD!#RSE4trTBEL< zpKFDZ9Cums50KAI+WQuKdwSwn82+d;#BI!NT!fwx_|f)~C#)~Y-~aT(I2wvw9Gp<7 z#w16tpR=7|(<#Z`CEvbHA|j+@8ky6UEi|EVBA*3y*u7rSRLBgB!qkMf291Xv9beHa zz&%wBG}b~L6bOWma80{j{dDV9~s0QLT}a@!~v}I&CzaEJ??FbphkOx zaaAofRn=|d?n`IK-(DR@g=Npr(|l+0L|QzuQa&$bvtY3#Klt~r&fpjZRQA@2a7qkR zHvP%w)=Z7Mu^10R#@HF`q>O_t&$z^-%n0DQC3mo}C>IL1_2A;4Myy4bS}a9ZRo&QO z3ucyH)0kQ6iMi>;&?y;(y=x<&7+daGE=+>5wR!BYSc3AqK{n64ON;b>(>L1EUUIir z6GX&#B2Ui(u)*d6Y&?qON* zD7#!U@hFN6n7MYMVS0?aa#~NTMHH)7BI+3f_gapL7_$S{v}VedRYepwx2Et_nrvL5 zH8X?Ss$n8yD2Z2Wo4o;QN;y#~64jjE&S8Lv&FsK7E1)sM?vBJmP=qz5>7F4PCS{Dq zu|MlIfg>?I!K6vP5f8iU0C)7l6sj6}cRXgfi9%R)qXVlIa#bf2om{Kr9`-;MU6iphOJP4(!wMHjM94`QSCzj5(-eWpZLXu)~`-_;bq6 zK92l1=K?hQl6$J_dYyFN;V`b4a$9?aOBHp{r5bkRo5y_I6G7Fr6#iBpg+`~NP3S5Z z&4V5dP!iPkP-)rWm)YA{5KQwCUY8b!evU~M09QK3MuL=F+WpGMhy>kIic3M ze2^Q7I*0Vz&!8Wi;N+d*Y=NDDp~zEB(7bLzYNz=ZbK<*IOz75eN2XL{|dyZX}B-CE_v$ZOptk6&(93694?$eVLP2Y3m=2r99ez?HFX*@m{ zKGr0aLf{FeNRYRosLkJo>E?KpI+<|~9 zb_@Zo@=zkIHE6>J?(Zo>VOOgXsdo#X743%Jo@HT602J*Tj&%9*aoo@DXblZ7tiRQs z!O=UA$#~CpzV#hXGD>@WOS$zFRkXa!)Hi*p^i<2Ly$EXh5^Qu`DcLdD6w~xRRMalN z2aB z8DpTe`jR1fr|YnKM^j+6EnK(uHo008L(b7&b0-?kQK!fGyn#nUL_bW&s=K^fIIknO z!)0Z4>lcf8cb6HG&9LN5%R52zCig>JWh8R?#x=`x1p^!gALa%lJo*bAJyly5mkr}D z1z&Kcbt|QM{JE7@YDTD3PR7mMneEVeBFT`TurC)=1|FF8M-8(82G+Z(^3hE8ZtX;z z0}7F2ShU{i2^!qj$#)LV=6_B8&boujmt0vXB9|%@^XPi6MY5mjR35SA+kg;fEc zl8f_Zb64V{2h0Tlmw0E7sS0hHaB4BZUc+&@_@$$zH@K4MQhR6qSDk!t}yE>uPdXmoMMI&Q>D zJvTk>c;SycoU&%trF6pu|4Dr}z@@g z%Q-~!HfDCFZ`q`ql_Zag(Uk22pf*zqTIFMYQr8=Q$_Iu!HI z1~gu9rX#1A^F=oimv^4K!wZsa|8g;&{bO_wgxIITUrnJ>W+Pt7 zM*U`h9L``P4=_(YjTe+2VTKkkM1gw}NU%lQvjYJ3r<7Z5ZW1y|Kgg@nHX+8|7U_mh;&s`+Z`o$}I!{+o8eOzK$I2J&g*JYEf5z>JJn z@Z^j3D7z92NDP~c_{-`+F0JgMDV(b4RUeUkp4!ht?OaTlZs}{&vnTOA zdgaRY2`n|swHgoVkz$e>&QwCU7PL_1-i)noqKD&?)|oifFo3fn`m-fD0XNALxUI&9 ztij_CaGDOpSw_RI?$}@0k#c0DA5$l)lUb{167{Vo9Ruxb*pfv~GvD?URypZ=_Cttu zZJ+ANjP!9N0QsBH_e`A);q)Nc=kkd}lHAPmnPBYs^*+eI2!S~e;{{Kik&m(DYxf8> z6A2OTTc8I!jI}{|Q12^5^EOs$WCU;Yh}v~-?izDQ`8^6Fh2QquLjseD5^+>E{gdx<;H65 zyOQ(TM4%;yXPBH&2EN56Czg(DNXFjsGm`I5k85U4wqi96YCN*;FX!VOmO$y1WI+b4tE#sb${ zQ0N{MVa-M@6yXU+vWW|ZC_P+RGxb_2bZGEo3&J$%Iq4a1M(d4}5L#brt)H*Tv+Au3 zBOxDtzwl(}))$x?p$o#rWBvYs1fu3Jm*U`sLH-*a@@Et0mTY4E+69{t^%=1i71?V< zmK3p*^ur9e!{-{&XJgyD$MxzMq`jYM-ohx0mk=Fm1AF0@k_Hd&B4@SNEghxU5nCl3F9ERY%{e2RSoL%7(dohb7-@@(^ z>&E2fgpK3baZRt4N@UTRbody%dq|gt^S3&1^oyZ)?lG_tJ`r+10P2gryn`R>1k7k( z8jCoEFD{0{SR2Em_VERp~7GuG?Cn4q7dkRlx1)Imi zEeZ}gC|8b}mxjKBH?uy0G+VqsreBH_wBT%V3`{|W1%+;OozTxsbvv!}e!8;1*1&q5 ztkIQeo|Z0k?H%U5Mx(bLJgz7zpGkLVj3o&!@KNZk7&YBg^%dv-8*9Rc@>|3c34iN>7gqPIUm2U*ewx#2nt!#}G=3e*Ke_ZZ zT<-hFh?~g-)`C>Ax+3erAe7rEf>XApFyyfI@BQ$)E^F!V;Y$N-sZ zsRK9>==lo8V=o>Hv7%y}q}mp{-5m%(Z8J1VYwBxY3p60{;=Vq zA~dJGn@ktScMc%tSl5+!*YmMcuzE+AXe?wvwT#Ow8=_4~4?S zzOGHVS^kJU{Wi^bl;{z!Uom+%!95n7O-OOm=U|if2AORIAVRKE`ALvR4PMa`PiQ?+ zn=T&k7ko3(4y7zs)jNPPT$xP(}%v& zBq`Lkh2{D7efws$Xq;r?m zx>NAa2scR-974^ zT*5X?IkBtA?fu8yb_p_%5IV!HM|EDr@akHJ3}E>V_qJBHz#sc$ZG-^d>)ayg^3;8g@0Nh66x9-)PRvHI7`MiPf_2RN4jYOx@ZQkIU z=|eq%Wj?ZaqDP@ehrpX@A5|&p{IZ6_4_fs!5Xq104le?Jr+;BLvK0Z=z zN;Aso;nRjKF)WiUvyvH6a}@Y6Y)7IS=+ac5tLmPx3S2IP=ve?*1(YAuu5g$I6!D@m zPfvOgsC^VOL;I@OmBB=SB~MK-3@Q6CTP0C#hIq`dh5DAfT)<|o<9sH=s;D^Hq7BS(q0Nh=VoJtV4;)X1 z?9DE{TFL+!n*ep)E(rqd3OLR4E|=|e$GJJA->HxIo;Dn`-VJ5lw}aACX@N~Q3Ca29 zD+h6qa9DAN%;#Q0k@iwogsJOd<|Tz{e7%Ba8VVxJ9n_G8uV$54ke-eR=*dKfZ3}d+x8Wn&K)K+ zTlWEJITU(UGKcNo5M`oQGfD}L)&eD6|Lnq#UO!Sp5%XS@PAH~uqQcYi@-VcPC;dP- z_9lA76G}RpOyUZzg>4sd^pZyg9!?58_w%;_25a7^Uu+cD1z%P85YAb5CU9_wyp6fz zf0H32emlDb{(~5>HEt%ahQbrt93w(o1wBClnA=innxrP$3p4g2D>a^}j%M@y2<5PeM4a{(kHNG9IG z00O^0Y9CK6Nr5d?0U*WmU(~<{q68qgZB?F|9dX&T@qS&z4ucoLVG)bEX8wQ>V4B#3;R2_lLJ8p zf~?8UMdq=lNap)$%!`s`(2`P--zHk!c5s>$<0tFsr)^!#;IE`jXsb^*W%B&+G%|=& znkv0m;Lxhj#!&a>UP5=z18BQ3-r6#*J#!j=4g{@65C(_sGvg_IGrCg}l1q}9fy$5#goGq}I+-A}} zL={>YV=uPQGcn+_TwYFf=3m;K@*V z)S|&oo_iDrog&~esQBu06JKwF+7&$pPIt`r66>v`q?zinwjmO?C*4J&sB#;f_9gco z3FT152WW)E6CJ!08|(=`c6yU;?gXavlAlz(SL756EN4$%3sx1h_}`q|5(8vwXrsQm zj9O#a_8RM6@dI!>hwf1S4WBeRU3zhm?6UXL%?QLeiaWR7y0mtU?RQ515gFgHH1;r5 zn%R01M=|z+`gwd((KO|1heLMoaFnd`CyeBgPaBrV7xU|Z-k$dQ=a(-wLULbhcPwRi zH=e<>M^@Mt*<|E#0e3NnnC!DJL)u441r%}4IEt-#?e=>WC<>HGLiz3Z)e)YVX}a7m zO>;eCCjm?0P;N&!Td9cFm%58d)D{`jp$lA~aKHPCP#U8Ly}_Y%5iKImzXK;r=8+xq z=t1NzTMD79TGQp(aJ(Z>sleHw{0$c(3QR!qI3 z3y&ft3a`HdUcKR*;c56q26j!ITN|Y<>?TgF>Q*2a%4CLRhe(Xkl?Ys?$h$Gs8mjV*|CMt!I;9b^M=H-n}jVb=#{+?PQ22hX325bW7b&M{Y&*2d-?_KcfqH-MO`YhEv34#@rgtg!#rgW&iYZl5O;QzjV z3V;J*U7Bu1m;{B*F7_^WH252zFX*li@hJDbCi4++7oU0E=_bT#6(Hsocolb$$}|GD zV7pY}KWu&giDmQ--oUN*vw&2ic#$+2;?yyOooJ4(zlV*BxbOZ3PJ&rP9d}FXqrT2} zOY_SezPecSd)#Vrj=B#}Uv5s_gD024?Awuo67aUtA3~NmvyzDKdjp4lUj|n6Nz%iQ z2g#gMbae3sz5zccPZSM%+q?KheqjCam2%84uy%Zz%{M&3{V1jOvP#$M_I~+z1Z@71 zy4lSq)bI86_6MF1N4U}(b_@F59iMf^Ts4|eK&H`WU1!{DiH{tJGw8G`oc?%8#!6x- z;6Wy#2Ln;6q4`NdCzF|p#+2>!TF&zikR+x}t*@UO3A+T(VtKeiXJ~$2lkPpTO7#%? zWR^ca-lcHt&RUz|tWphv){5MCnvnxrfjqZmtD`%lfRH3}Oe^icX zzH_RsqhfX%*p{6p9YlF40iqHi(VQpQb2TfIb|}wT|)KU zwk}b)bT_F*^9^LEUnP(}A2OhN=Bmgj4YtqZ{+C7b$-)9hP(?2Ou^IAn3aE0O#q>Dwx7S`|n}DqXl%g8WIAD6} zKi!Yb7I@hpNRfZTliJor^F^iHYEmTQ>{=pf_!u!imN(zTSz#_po}}cgdKGn{qadv> zlnX&q1IL-JBv@{tADQMN7YiopsFi5x@m8_+OQK&LuPGb)21tpiUO$n}sIb$EnvkGS zvlHcOnL!#_0p=QkqnTlE7OUQ5Z$3W}vQLhmu3#$`%Db@C?p^&DOx>Ede5Vz=jvtmp z6kFy)PPyTshbgP1Y$leGpX@|E!jYF0i6{X*+}PLduE%M#Z!8@pM>_iA^4kwCl8&!5 zsUXL>zBDH{SQC}asd#Tl-flAK01%A+@<;r0ek_VyEVxV}vJ~a7Dl9!LsK(Ef(+U{( zMUW0k-L<+a9QU05)*-|P%7V85VJrHC4-_ok;j)?WnhxZrN;45*Qc?m!!%GT5C^ZgK z_3C9|Iy(hcO1I2McXoK}dhSH@weX*2ahVmgc(BWEi>V}Flym6o4e*d+vWfQKIN-YK z?qN!U5ZPr#UjV$F);0UULof1(564%hofW^fY|YI~@MDRdS!+71p8^z+Ntk{fBt)36JckwP?LVus~chlrWXbxCS*^9Ys z@pwFqwn;5j(9D!I>bnFHq8iiKBZxr+n9O&)_9PQoaY1!fP|$Kvb30I2doecZmPiE9 z5Omuz6HyD{G*WS51`KYzK3yq=boGPKJ@OUQH6@#r^bqaEaWE+1tK2Fav*n>U*m}Uv_>k}M za>&?lL!lvuIunUOoK7+YlTkXn(FTPfUkz6uZc7Ya+HT7XsYAlzIv;VUI3G7)eVVb^ zjmo@W9W)02{O$p)eT1#Pl-5$W+7B{QKb|WL49#b~mrfKcMcD8XyZx zm`!own1J-M{IVKRJ0H`kskmFdG2H*q81r%u%=v@ME3hRfr=e2!y@nE&q;sVEu^y0w z%C1)e5hgLAv0N0stX^P!$hj}yBmX;n$h@Ao^dL&{cc!Wh!u zU0Qm!sK1i8m_N9{t2j+)tBAJeY`g+^~@Gy;INuc1tiS5?Jp>V~J&*dqHj5-w9iN*d}Hx$kPhhd884sRha zMP`ScRr-G3zUX!XYfGwPD2&+~-+k3&{&e|a^Tp87A?O|Ge!G_yj<|y_t@8@2vUpaaYlsj4`%Tu?pmFr2x#`|V+`fiO)3sZ&nkPQ?-D%J-ZIuNB1Y?YJF z$+l6{@QR;mc!inncvBf`-IOpT3kR*vSe*=^22hd68ma9hfi_1|@asQ^o1 zZo}77RrfH>x7(HOc+E>0XRfmx)IXtycUeHBPk41hV0m1~C|b9Ytv`st zq9FGU$$_}zG95F>sq>I6QdNI!PEBjob<6?ja~oo#SX;AWAQ0&3@Ah%L{j@o_NOvVJ zDfP}YV~~GIV2~%!C(^8r-qa-{j~1-)LRsH-+3}$NQ=yq=`s5wGAsZqPRmnqY!CUo= zitHzs3zt7T*rxo^uF_fq(9!BB?qB6$p2^s$ZIUMogY8%+c2{**jB(C*C(Y0*)s4*z z0f9Axo{>f?6=R`Czp3}rt+77Uor9|DQ%OwnGNoW zIl_6Fd~m606>7{GC#yLcT~qSVPh!JPl62EeU3>XKSQ{?t8tD#K2mCWq0`EYvf46An z2j3?%>ayoBf~reMkc-Ot06{<~2;)y=16i@0Q$yH}qAR@zx29kRiWsyxsABFPb&_M+ z=|{&TCp1cQY;Yjz5FAW)KPPIaZvU*-aC%g_BwoPzNl3PZ^(FLgj8Y$kv&gn9$Ep~h z{7%&zrq&!If5aFgUoxOn$1`Urk+lVPhNPjBkVku9{&D*>UUI}YgPykr!eTa72Fb3w z!V&(Lc9Rnl0;epVV^U2G1bd`xLQRYdL5@R>%@ca_@iPZ+WQ5+T^~^qoyvZz@K{bf| z=e)X67OR^4x)S=&MVO&P(rG2+ffm^Ea@Djk*g1qM+Qe}@vk6QYD;)A5QZV-r2!QRd3(pi|8C5(s};O(v9nPt|dR zl;e(M!=Tqq3>o6R8!DlQp_n$+S=#=T*gA#6TRT3#!ufZ9B+3i_k;H~WLARuWYlj|a z8e9PRoU(Ga2mj!?-x9LBR-e+Qy8@H^+eSr0qD#3E&+QM$g?Ox!X%6v^CWj$ta30JO zorlPIbQka3eLOW-1QZ&O{b4vQBHrgb z<%NJsj318e;|YVD8;4vWuW#h*E_AqLa;hAn?!;_^OEC3jRn%qWbm6d(vcxMGlJaqD zE!AUC%9%x#v~{L*Z<r$QyQ>+E`1;L+=HDL$is;Fy=r2dVbkcZ_+qnTr`4^9fN zkAfk#LNhhSb8j^dF=k%pRD;Weg@9@dj<+{slVyl42UCYsva(5sQp-cO(`gv7lZ}n5 zGlp|-jq^p;O=n3&VgI?z36DS~rhy>M4n9_9O@e`~WeR25Qj`r%9c?qYwi9W#_Mdte z(gd+Uxl2e=LXI`LRe|V-sY$Y$(h`STXF}6NS8PIHvuePsV4Jry4?6brDioUfqBoht zh)g9$nX?HeB0x8p4Vi&k%m2Yk#*h>jjVEZJTm%BZH0&bAxCbuF#|;j z==K39tjw5QE$=MGSpFH6_V@5}a_Rnh-tMmq8ARIL6>U!b6=5-c^aNZUzr*|3-+q7t zyj`A8SGHy_6%^cbOVlzJ2n0srpVHB2am5CGkA0BCW8+Yo!#87y^|_5Iu@R#jXfoz9 z6nOJ2TqsfAxgtbRX8GwMc~E)HMEi+w?LW8;Ed9OhS5soxDmlhJ`1Zub*d~0*~isIWd2veh|$d?d1FQ zZCZ~1S8i2vVlrbENm0Sjy7tg>0`T4~aCE7a*6jZ@3@VD0nE7p02uzHV=3W=tAa#92 zcR`bD?^v;+(KKw>?S3|~RnW!5HeH|N5G%tBNf)J2E_6VhT!Du){bdGiuG+j=b=LCt zn5nG|PQ0Xi5u(=6iGuidNq2Q$zwQPseoIm{^EW*-z-&6uS^wpTEgjE{p}W{?Lm)un z?kX*rP<^1g`3L_cU9xbLgI@`lcVtVc8E+s$Hvg%N<>;%m=vh>NpYrDw?st^E9QZ1i zgi+GFU|t9LvP6Xg)3~HbpY*BkxNwPB#C8M9Lvg~oWk6P13EpBh?f}Q%e1F`|9yE$X zC{Zu%Jh-q7dr|H7KWfWG6X9T{Yx_H0rnX;8@7irvjXtLh{+!xWHo zkW}JK4`;H!6(a7Qo~yIOb_EKe@zZYf<4PDM=$zaPG_6It3Mx>o`aX*Nx(wZa>JZX* z9*_+S2CfDUky=b!qMYXz%1&dmHNbSSQ08K%bFh{dkiift3d7grVHw*K#}9RR8u5lt z`)Jx0WsM&;MG0mG(@CHuUi~c;LiVk>W#`f_=7V?&571gbLx_5Plg0R^(k4q zR?#A9{~R!z;<2WSVuT(=g&~dTkoO5wqpyqx4agS%oiIKYU_wU&(QCj0WCC)Vq_g1& z@btEgCAAq(Ra?Z6h=PD>N$)g+_ICFB^QhA5Y`3t585nAj=z}tZs>8QrP4pJouMDY- zadLsC)%7TxHA8Ls$!1)^T7p;TFzn%DZ4C`8FIv=aWZN>iFcM(e$3Kr6RUeXsLPpP z;7aGals0DIz>5)lXQs(~XmGA(_nmIjEuFdT8sS>M>9oZj}cjGQB>seC&}54gQ7b@`juB_NzINTN5r^UiWRX80{B4W)zPhOc ziZCBE!a2a#%ymiHECHPx@+tA#1v-*;%?-M9+8{kM`kBwzNWp+mV0bpa{ARa{Z=;7+N2Xt_@$md(`)r<&SFp|JX@9y?^L|lG z!u##`43PA;H|Y9du>GF}=52G0RWdcH8@Gu8yFQ*c_9`auBK3 zuqS19N1s-47aza470Kz;nF128txZ~EvkGL$s2Tzl6-9DU|4NgpRzYDmpTF&^)Yj%n zUwX2C#j5!(Og9d_ec2{~l)6h1qw>*9$WX$D47Wry~e zTNVB1qzDt44F8fz!3A?7K#Cbr`9}3hDdCw)f?K&%#}XM*j!%gm?q~T!JiYCG0sGk) zxziDCa|pcmUKvky?Swz^#8+J=Og}_*X%J=bCQ_CefIT&Oc}8Yior23F22ZLzJU*tM zE(+)V31L?bUCM%3IMzI~*EPVpz6G`^wA`I!MX8WgNh2Rv1*KEO;36kAUQmn|7RJ`B z1SaWIhRI-%y@@$0Mpxh6xY(_E&xb(N)3wFd+11vw6hBjoWMJ6c9pHKY4CsGOTl@d8 z-uMSKCVuMy4|d29GMHH-5$LXo)&5M7R+4DDbTqvN?sS~y4C#jF=SPQ=mrdQ1CL*$< zXa$lie~!sT+1fZ#D_XoBPmPxtO=9?dv0cw`}Z;FN1_0!h|vFsDaTH7ld_J3jn3}m zPFga3o7X-qH=drWE7Q>V+2v*w6kqO^n?0%tC*PUUG<{Dm@2`%=mz(bm#4=u||NE!r zfJcYO(e`x)bU?{wmEK(p>Dw1of!Pr$X>-p5i04xwk=)eB%d!zg;5p1o%jBY)6Ub7% z7M_S#=G?UAHCJ>HmQ)tY=UCm#w3pP>V!%Kmf4RqX;kLxtOY{p< zg)Sf*;;)G=8wSCoBtq_Gn24DlG2j?)u$pJvfx&GI&5_h$s|U$27r`qHU@LRPt>H@G zvamywK+={TQ?e@A6`eEng*HnKYS7-;Rlc>TPj?=}2W?2ySR@86okr9fEHxP3j`!o%z+${Q9zy=!duV zY|9C6V1>DdH5Gt`Q(74Jp$PhL9YZg-%z8rt=Ke-*q)FtsA~y!I1y@K7C}RsyXd9YA zu|;eM7^GM;6%#T8suUptY3cIq2JqHdb1thUP0J3kq0}ZV2eYC1(eyUWJmiuQGoZ9| zyg*%qNY@vRSLl7*2co*xXrXj^FX^qr?&xh8zmuY1;@$ASsPEZMEV)MUf8sdsBR}j9 ze+t;G6FR>41gR?441VZ8#_(iBf}6=W*E`#)V(HY+Y7Bilx+4MO6%8mAb%_p%H(+7O zysrt=rV9-bD*ALY@20x2MeZKNG4S1cRsGu_l|2uy}F#iYzK6`KNuS+b5bq8p}dsX(DBtg5X(hDwsyIB>kE z?+_Yrl-&O@@)xjHm1r5W;+@|pW;KIYXA_$YS{xC`fHvWms@eAb#m#hWaXhqN`t;SS z%hRLh&)%Yo=O_5!6kWY|as5Gi{qo}diM+S>bo+kkN(vtQh=6vwcea1^{OlRNKHk&b z?7h5tb8(Cm2VyuLhsfFlB{C|JW!)`mr-+!H77nlwz^i zEpsK_L(iBQOh|Aq0U%?eT#vNJw1yM#EAe8{)z}Hh!z~-QqcN-s>&bYQVS5_ZL%V7p z_R&8qI~<7eI>VM{q|0dq!;s~CEUoW~(&vCna-eIy0!R#H?*42l$F=&Y2Cr4Sp4LP4~y z&9sPP+35EsksIQ2u?TJELysldo=s^K26UQna$27%jT{>Ip>IcG z=91-H@pSoGM2fB}5cf$q{#0nr)@o_ev@o#B>U2Ue?s7BmZg>2Q`35ep(Ew)G1t5k>%fcu1~D6Pr`@=PI!~(_lY?hn|l|R zNlNFUP-+WZMGCv|$0UgE(?tvjrC%qmLp)y$oZo))`{UtwT5*lCmDMaPmjGFsUZl9B zKm&xT1hKjdAumvcaNzp`m(gM1k61QY`g|;o{V0=eP=Y{8%7|e^OqXR7tJp=GKvqSl z6ViT2ys*!#iDWsk&3AEe{Ey4yi+{wu^AG$F2|^Xm5~bG#SRRTb<8f;CP3?h;vJfYf zq*EG|>C=s%+6Iwmb3`tQE-k}c8Z1WAGiGLpOC!%~VA>RkFDGu(zOIXDQzX77_ZuQ{ z0n?^PykO%DvAiCM3z#-TBF+!;wMZ<%w6Q%)Xtr)q$j`JHT-zX1DIJk(;o2mb*>)(f z0dCIW+Q!0{yyp5`39c$KMb=sz6|<5Gjh@jEGXuc0_1M2S8Sk3XO)GCx7$D9MUu%$&Dng_w1t zj94|$YQ(BhIa?}W45+L|Y`{v-tr|vN&EvRGQ^W?W(Rp#9hKLmfqm?}7g_6&u<4;L5!ivaaM<)(WBnAX+GKoxPrYG*K&)u!1lXKuueDZRLq z4Pz#lmy~IURsjI6LK~N9iWXw95-r5lW2piJ>8q(l6~_jafG9PXpfqNJ3YC>ih|5%= z%_6_k*mW^xKRw%(Ms%lDHH53G{?<$GBq#~jfpl4;sAB5^EZagy#&pE2R6vBpWntv| zZYW*6d~qUb=dYfhyw3mq@m&6Rc+wwRc40qVYb?u1%dLIo*G-UQ#Zw#S%OzD8(V(2EmH$v#EE(SCNu~jICS>42Q zJ~e9I3}CGa>o;%)(5}Ke$Fuyquu&rmFzZ%Zzo`Y7dex??Jyz(q4!e^e0CH7zrDc~^ zGuvg9>h)MyN|8Ty=q#{2-EjmJ5gHmYG`J}B)y)?GS))b zAr1&dS;jJM&&+CU%Sg=yDzX7H7qEaL#JaplRwKyuNZ{89l=NUD$YmsCOtgJENw(FP zjwQ(k){A;*Nx3%YHLV_cO{;}I+kYJcI+g?hGN1uUYbY<;ypo?FK#E~#H7d!9wyQ*i z0N1P}F50pZ4ajvX(Lnh{Y$;@JPw^!5_&#cgR4l>*{>oBIQHLV8!3O@VL`lenLTble z?(xMbu(vo@YC~1-?MpTZ<@cgays7kIUKHF*qlp_iW0!r*r}}nS_|fq`+AN~O5pi-m z{WgWMn&kAzf8X*wagby?(iVd6@ULas{kr|ma|vXbZ_0*Wg4@9yqUf0$gdlXQ+0IuVnG zVp<2Z&D|2WnP4iMU7i2!#zj(bTLR|!kE`nUO4FOvn4@~Al zgVTXIfVPJN6I*ZPZ3@*ul@!3r8($Yo(@n%08tA^ zCkNQv5rGitMh!=Vms^HD3MOIXeB!K1>EnBf0Z@u=$g+Z!(}#UZf+zh?wjWT|cgzuW z{fWitn==n3s44k#;LTxI9C7Kgg>6wr1KH5FC!=HR>j+J#i;4yoPkC-aXg0Te6Jpxh z%?Wg!gPvpG|CNk9Cz4*Vz+{0Rir0z=`%o3H=jKloFeZ)oK?&)|i`ak#e?#E(mIb!! z-<6&M-5B^QhO|vb%_D zL*8}TyKTip3cgHExFng$$tX+zhq60zkqnt`#||8pH3L%<*fLQ}z!V*7#L#pd%K+NN z>r^&_vOUo%jFls^RVGsvFlZ>i(qzOivur>BvvmvW#$3MF&7f>S^oRum_Ay}pny@em zB@NagYXNA5{M`7RVfgCVrKY~uPA{IHeYnPlPY+)ls7DvqSFiEG@!t9C?cZ9ql7fe3 z$*Xq#bNuY^7=1W-fL!k@DR^j>oSr<#&tIOOzdXgt z{^{BC>zD7|U3@scl3yzCWwdv>eU_}G;GtP^esLsU9-)_)Z{EJa?+>ruDetiQ{POzw zt5f;Ss}ITpT=%z%f`?|wmHOe`F*-jud2_z^V*mB4w`ZrXUp{;F{w0>>ck+t|xB+n` z1(hsWb(@izb7ohUZ5@J=p{h5!`G}XVefthCz2x?t_D12iu=u!(W_8i5E}GRv zv$|;3@@Uplf!Rf}x=7X^G?K-`vz-;tSpl6D&{+YU6|l+*sFaqS3DB7Ue_#_J)f}Zu zTAd-#83LUl&=~@qAy8jtcIH554*WsQ0oNj95%uMYOW@3viWF`G)pKl-Mkl1AZ{}0}`DXsG`apg-gsrv7N;d!3ow znaQ1*{Lp6dlDYR6u#=a!zB80NL-|i*C|3{l&Qk6y<<3(6>L>AUvIwh=N@|LXOVYgJ zFLqKAWGU`9a0GD<*CtO&W~jCGv-;2DT0W2XO{>mi#8HoV&U<_E+iy~`D46y>AFYZZ z!?{V-47kpUllz;@|D*nBOadm|!oJam{eGYSflAkrR=_l=HYHpKaA{4mVoi{bC$1}L zin~BnbSwR_kTksk|K{6d7ZHEJb0+LKcxRgoYtA!vq#HEvjm&X=B?03WEfh z49h?x1X=1v7_pto+c82jFn~zau|?oMvRc`5Y?$}YBs?eVZ?SS zZ^sB50IXBlCMIGGDTFayHkiq5TQxB@F(JCafJUip0@YNgu9;ZHa5Gb5JC(O&gaTBP zVhvg{0jh2(mM&WwRv|L5qUyE^p{iM!K#G|GZD27QS(=5j<^46du=$!>Zms~fiI9pF zjcJCi6C}f!?*=xB2~@?Tj38!WT~%}w>xjv^VyJ+je1F_btVz556L$@4 zP*u%9HZo-k0o}v~m8q;jOchI}nqgWxHB|}?AQM~B5ZDMKwo-XZMrbD05CXt9WMt?j zH3(o>QL$!YUALI2U|H2Dkxj%9v7l|Ms-+w1W*D)R$}1T$7yr&BpG+>6&92Ty^YPS% zfOQEdLBm7sX#QftW^hZK#F0PoqEasrK@n>zSd3?4+=n9Qw{{Tc?A{v^F!widBTXX5 z6?vdKyKDqf1IpL}6xxPnP;3z!0tPA8OvQxEfGS0ZKw4@~Zvbx{+rF%t)a`)SP->Hw zgIRsX-eVCNCl{YiQ`C478S`!f2H>}bBdO%XeND(EBgUhXAY`FhHD(M2Yja~p?ZbZ{ z0Cfl;7Eu~tKx+gT=xun%%(yXTXmKH8hF1KB4jgHGGYA8kWK5A#YNauW=rH@gn7;iO zIiBr*q+}fV@n3!VQ^0PYz&_+rmNeobM)za(Bx0W;>64h$ERINUGnpkh|4QgtA@B#@ zB!5SQ#3imd8D!P}U-tgJy=@#x6o=<;e+nEW^LE@5O1z1bd^Wr5I7!Fdj^nYNq`UXb z<3J=NaZQnIf|BFO^!wR=53U4n5_PfrGU9GeED|UbfI^|FP*vde#DPfQR6V)c9Lf$* zGjfZGX>E*J70PN_zuOc0p4k8V#6BSnn3`cXo%tC0ppswD=vq!!mxTV9W@9q)j_6+P z{o-4}YP0+EF_Zst0mHH!I2?@8Nca2BXb8Q&jSSPZoRKkb2Yt_U$8KLA)*Ax1gt-OU zxv=zE7VQu0EB9=~jN035|O+7(OUF*9}e?3nSwbBYUrd->{{?x(@7uJ-~ zlkCT+dZcU$QgU%vdoe(yYdR<4y8 zJob=JJM%xlO|uT8bma z(qiiaHx2c6v!%tBZUlrEGes~BCP4(l{4UdO_9ZKF{}qKdVfluu8HVB5WrO+-_&rf= z?;yYHjgkxX@lkKnb_pLdj9%^(y-ua|(^d?JeYf8tZ3Qj28*V2Cc++@$UVYC2mPM&A zC2z;H%IRu$LEc0=KpD>BbS4in2>pzM5aFKD*9SwlcX4w0S{rn2Lwh+Nk5Q_LtOG^E z&<HEb9}fH91U_j>D^J3^rvkkPi{ju3D+MPTWruWP^= zY>L1J*Yg^>;k3H`mla$tz@jg~tkxylEZ;r4qU?sO#Wn5z18|ll`;x0W^|u1ol-tDT zo&{bFj!b*twDP%ED>P3Qy^&T?C*UOJJGs>}^&TH)ExU^~oI&qa8$pbGZN&Io%=w&l zmj)Tqf=Hv2V%~Uha({#8Bb=o{G@);ACMeT9MUQ&?wpX8&S2N5TuAysYzvgVbvFzqF zTM0zn)9jvRf4?+4)J%O~4IY4K|Kt{_-_pn0F(M1}dwWG-j8z=1;YGk(7OxmGTS|(KHf(0kj-rY}NA8-GFY>iAfw! zLL`SnTg<}W@9oMME@n9cWs%GctT+>Zosz2aaQ*0d%|(+<@=21^tkG$24}& zcR0)~_|7`MHENAL-}!U!oobfL$K^Yw;g*m7)~mcd-|_4r93ZF<`?>*r$3gCJh@fqZ z21ef=Ij*aZk!N~?4fsx5&=1IW`j)eEz9V36!FSfkXj!PS=R1E6zEh5Pe009!xSQ)) zr1JKB$FlXYjz;d-a$F*SKo5>}ICQ+x*z;}QFrlsY`(}N1s@;HoNWL@Z@1E~)m|O52 zcWu72#00$OJHIX8sSHV+qV6q9BNXyL8%97U$FI*#?Emup4{sN*{&^97xzfHLOwtd7 z@zvNeU%kq{ytuue4(#{%U|v%lTLzyJ3P24QzX|CdbAwc788Y-Sl#oxwEo;t=n1 zZR~Sxw9d7G@ziY2;b|F0zZ#A`=<1re9mR~oc+$maHsc&lU=pw!y`IX4!$EmK6t)d1H-x|hb5Gw`XXkI8asTZ553gTY4?iR;G1y9kF^2j;cQz4W)S4^(y~cf}py8wk(=6~p z)ce7(EYq|HcGc}`S?R5s`mcF5yTS21_0Ws4xJQKppl^@kopo-^oMuH{3+M9$cA`=&2N z$atRJ#N(S$Jdb>QLnMY9KfqobMaau;nmYNrLTeK-o7%RxnC@7HIfTZ@bZmPxcI;u_ z7!HP})wgWRG=0bJ;nd?nhF$N;nLTJHop0I3hKdYP(0$~4Bj3=S@c{KrzuzA?Bi+>d zBhPhQ7unu$;0(sYdc}WBm>VlSwl3PjJ;QUxaA=NP7g@Hi4~F*88Y9QIh$!z3h#=b^ zj2g05?F{;czJ`=2*K#(@YiyAi${HH$Cx()hb|A$|rf*c!Vr>dzFU3=V(KO%MfA9bJ z?z=1N@8?&??)#H7>x28@??2n;Kfb%{zkhgV6> z-~ayU)79CJKYzM9`SJYK%ZDG5l^84)3PYn?D-`Ok=D7W`|B=x(x`wamJSC&Mg=h#< zOfQ8DJXmyXHFd-4>BAn*;zXO{Aev|qhFTDf!#RpPq?M;d>0kP;oXDYx)a$HX)_qzYvT~!VJ#kO{v3wL^V88}L*!S2Y(hGn z&k{n#T`%q4C*3UW8GQ{;=d<{(oA_gi$%=A~QGi*B;H-Ox|CdozM%333W(a566hS`> zB7}QaSDL9gmNgu*KP}62`u&_Rw}R4y8a23ONsL+WMi6Ot@D`Dwgw9Y7o1W>)bnH>??r&_yagujdRaP;Zs}iM9E}6Q zz-Ht>BHm;%?oR(JMT-CjarDA;9LpV2OCy2sLQU5GpiM00yw0Z9BtqfqS(9XqEv!k#z*#ePRjssaJ>TOD&3wIKL0bcPiLG4E zrfq2M|DVZSg9pj7W9S3Ja9ZWnA_bS_3|V>gaG|ROpV#%O?(6`gh{qY{T!o~UYb`=qVVgDR4mVhXqSD@j zXYawY6Azx98&3P*|M>UgAFi(79l!k9c3yuxxqSD@F<-s?^wZnx>o>2j9^Q1j5`%3W zFdSpJp#z4jxp^7`(;2RnHG!6Iop*qiUXpi!ecws~uzwQ?Kp(c00Q4odL#(@v+nY-O zyUPSq#AB1%n{TUYMB1wr_S@=yTm7SMtNT6VLH7`PiQ~|%xrSvIyU5xclB2UBf916| zp2)swI_pd%E5BvdAk(Bd#`T`LZq}f@=B5IKrPKoX8giGPbbX^--5IIBBFf3$@Z5LXW107Ev zj-WU6#v^+O{Wcb$bzyEOu+lECnHtyHHdlhK+5P^yG0RG&$JX!P{(N!r{@thkkIw1O zKmT}qb@J+!d2;^Ae0BE5`sw)9$;0dSD>2wEMpV~LL*FPyRH^yzDVynuJqX4+%~V@egE(h@vf3$x1@YCrd z+?BfugH7_-nuhLbcDp>byzI7#1sto3d3N6A`ewuX6|p8 zrh$9c$7k=a#Ff;xqN8mAWOD_TsBG&fsI>fc&8?B+mzCdUw{zVGQA<{c!y+F>e>kX5 zqOq*P#_ZH}*GVL%*4Tob8cxkkASNxuYdT??!W%&<@fIO#oynZeY$-A z>Ein5m#;rKj}U#l5`%4pW5+NEx3bn3j%Cdy3oe5=GPFjwK3&(HemQNl-8C%DdR&Jv z-QilhKHS>Vstjv~4q+0sv8AU~4XpLu&JDe9^o>@>aHQalEFqF?HnoLF0L!c);wtJ% zG|xh^co``R&RYy-Tvd3}6PG{ZbvHFUB8bLuEsLP`^uATjcj$DDzma(~=yuP2{I|Ir z%Uj?(G$QP7gni~6h<)wVE!%bMym{QJRY1=$KuO1{JODCvym6VW`k zhYkcctV$c3L)igphH_O+eX!|fP?k{o+((P1x%Ke`DC*4!`8_2_LAbT&$Ke-oWv*@sQq5PA&P%e`e_x_W6 z|H-}o3{5C1NkdXF;~{#0-ZtMrJy!LrdoS_S6tK4?LmukTv~1!_{BUy z5!*|mNf_X1VcK+}5819=XsKP5#>KC>re-#ci*Ko>)vYo6#dJGl9dE`wK=#x#Bt3kcLvAg1Wcnbaa zuJ^ame9|*qb0`n7Hm<(2Fb6Uyo5whi+O3W&Xb-d*45CbQhkBE$=eO<3Z(^J<26|u9 zhpmhgyzKe}Hq?yaU{F3J-5rII?Of<$lU@e#ZO^d>mQ$jnree!DIabHP)lIW+mY`O? zZ#wH-2uJ?d?b|N&`w%*PeS`+iz#E%B^!kILZM&}J8K&rWlA#qUySFstk@e%oLCw!iqT9{m2|xBbO$+h6>)g#YfZeOpE>`)l9!*S`G$ zu6;`&#&`by)M|ffwLi65XLan4t@g)O`(vv|I<{J}4EN_&`*W)uoLeoSu>HZ+{@`kV zaMiGEP#QL$L+F~}82!qf(fzJD=o*^CEd<+W5~DDl;4Z;}B0a|_#k~jx;fO_#7)B5J zeu^+PoO%h2w32qDr6`0M^0h41yeaZ-@qC7>mcWNr;$ zn9Wn9El?Vaxz1m1PdRkj4$khvZU`Z45q3kWw^?d1@^5JmlbI5r>GcihkM*$+&AyM& z!1hM2>5a^hF&ex6z%mVcP=A2A1-!@h_P%=MT>kX_`_ohR?dA8*r;qP1-<*HE{^|Vv zo1gmMzxwg~;k~_AV({og^0Q?ge}DSXzI^-ryR%PcANqg)aQ58~@7|rh{ptO?$A}AE zi9zF#%uogi;Zbl&?DzZtXK65+Q_JJY#qoI$dufnln9^t7lQk=D#M%u*vkjwc8`>db zZ<#uPGT#kCEAxt5COr^v>`f6^ngCaDp$jq>*Kr(rQy4_rcQBgt-UK1iuF))!UJG_D z2Wwfk5sftKN@}{GX6D|@`K0$Mz)1-2=_W>0duM3q3WHy#)-oA}Cof1RVgT9L{bKh_ zs~AnUv}6;JXE3cbefBl8ZyS}94NL!&`!6}}kFCs_)Ap^gQ! z7lvV4rt6pk)6&iUfWEzZk<<42RW~$jc&=gfEqi3>Lpl>XX54YAWCrWzxsX4$E3{nOUTW^iV9ISh14B1$V;xgb zx$e#qvJl$dJRb|Gz0XRw&q}vtR=Sn>M4X|yR{jxMeoaPi8kD9VfYY}<9WjQ6+jrJH zQsI?$q^R>T*gR<*t-eg8ZNDY?L*KTozB4q9zCMP7@z@z4V`M9k>+7!FkH_p(wOCX(oDW=rE8E8DaXa>wVr>-paGyoKxe!MEQ|;!zO6^#0p# z4-Oc~9Q+HM$KYepa0tfnJW`HR4*qqdt$O|?AwF6=f7w6npA`84?s-#~W|*#|IO?5{ zU)_5+3wP57byc@*`me6*<$ra@GX7%NhHLaK*Rq_y=tf_6`hNlXZkk{I%y95v4eYqa&~|4`7nWpUlVhz(>rmNZ-AgN7P9Yguy6<={>y+<2s!qN;CLi z8qd%XsNs%TI!Bz!V3OcomLk-fL7btqNPP!^M;ek2FbkN$6n7b@IYucD)u2%4J=d{y z-R<`eZqfZ+ocj3aKm&PW2b#cCqc09Lz?-?9kC5!@H~;y<=o(H}*Ys}==!qZeJ$Kqmj z>wf`5BJuBx0W4krhThj5y}bS{bHDx{<#_@$4ZKfK^zq^x-~@TWIPicMN8?~JPwDyL z!4vS`KB8XIr0^9&V1&Z>?jTN3v`C`U8JwV_0{|$jD+=QtWK#rq0pNuJiZT$8f(HPk zD2Z{9#p(SKm`uI28^kJq;I%YXt1VoRL9!q-I1!xdzws2BedlQ8S+MVnOwSnhp*^xa z)b|{BJkmW=AC9eoZaIC^KqKEW9Di&=*LMaZ+w6~qo;?^@dTR`lc^HBu4g>H00MK6- z^v4l69iPY9MT#)#&;f<^DM-C z;jq?FCuuw*^6t7LE$TH7w1nJpoJIN7unMDWcI~byhSzWnqz`=0_YI$BBOZ^3_RzCj z57}ee?K`6(Lb_p@*ZaO@TRQSx&+u()jC^C@k9@;$-I41cZ{&>GV!49$^?+|kG#`eeZM(a5p~5Lve8AlDxDZO96rT42d$rRhaj@ zbO8z}hoUS<5iJ9JG!CMGP8^T`)S3alIypXjeFVlZ#OUCFXliL3hA5SAQ3OXJ;tN)M z?H&OB!9Sw9TN#VIC?HBxmwx{U!@vhIRZKB}DM2s^>A!4dfSYeVlsI6~n%U|EH2`?O)RYDdoJvk^)OA^QjiDe^%Q z`%;onkSPK`Uv1Gg&CUM)1q(U6ugqi;OC?dfzNuvXzLPrDS{aS&p5|A z1TgZ!WgLba1r$iXvUujo(^Fd&#jaY~j>fXO$3 zKUrF-3gU0O(((s>;-s>LxJF1VaJ& zFUc(~*^Ck(DOvf6?Mrp1%`hk}{2f-|f(+ozL zNf(dh4pUq(8Kf{L-j@V?$GN6X7173(Obz?H62D@vJ@T{+Yzfdq4n+o z9j;KCAkUAl7=Q!zp}gr#P=uJ^A$CCyfC(itn5g>@+ru~nIXD+En*y4!158mk0}Gf2 zqynZT6PQhpz&E{bD)mTf(->#Z8997`vm``EWIPx!2v|-JaC$-OlCnp@7@A$f8FU?| z>(qjT^EjKqEbw3$-h&CG0nI)LA|gs)+CN&4zqp9g>502+qj6E2l zv?Oi+haX@H>pu@5FB3$R<5iYG2Ga@3jtC*;+W_D2XF+r+_g(OWZoM=3rT9+QC6tqk z4HX58tk)-OTPB)c;34RF@jS{JH49$sm=!B2 z7J)JuP(TD6B*4>n9{ON}0FwlW7RvsT)4-uAv`p9_^nJk%OE7DsH38##%B613s>;}8 zF_>d6ah#4p6lavd5`lsXDgmal^m70ipa2UFhW zHwvhYwJYqZH5Q^HMR@$}x=7`tQiZh)#mhMz{<==44c+rAy-Rzg#rmvVX`OOJV0$`cX4{l1S}~ZP)#0?O|HAlu9(+cNpgkK4b;W9 z=HQ>aN)r20#uMVY92g=Mu%kwRc_EEWACnOBx<_(=34@4JkfIqGFWzOMrQ$AlpYR#v zTljN;_`m#x#(oollvcc^+AUeTwa}4}48p(*sMx~ZFfprT72dQWnti}bGXZ{(A}D=+POx2oc0&;sCsZDLMkz1jgt-ffyqUZULs0qx}#KIR+XqTfhS4;_Ve`OM73;T zSqT6Qbc7tIcMVhTnRco2WjxPNv5Jpy7DSL8x_9(0{lA{Xi#`*Wp*whgRDdsa0y!gD z43apRhm3_|qQ_=Tq#*RlwbJ`|&W&{UWL{qK2?5y@QkfegRevSB4T@;;E#xag{d2be z(0!7MqGO`568(%Qm`^AfME9fEzh?-r>=t6_D96rV9E7NQz>t;7|Hbju)u;EDua3a% zUZb(yaq9E#zJpXcS_EkvQ7u(U=3Q{jceY%5dIGNQqYQo#=A)y7C*b%HT>pFoK3t!W z0XSr>y*dKleEkZ#mxxko_nhpMzyA8o!4q&IiyZJNLDAw(8qef!0J`1o0g4v12Tz`W zj{+yweLkXO-yWy&OzyyBkuwc}RQg0m3Zx7JAru?|AI;+D%t*%yllB=*a2JFj7$H_j zgZ?at2p-o-C0k(o*#Rd#=YYn%fO}iFoPOQ5|R3XI) zftXdHTrh3%9ZYC_R$KUWkT2Q{CK}f}G``*{McHdvOamuO{Y%myPJ`?ocp=101<#EI z8QDoGagUhM7<*IX&xvd=>Yb2k=d=m%1hA`_G}0H%O9QGW3T1&AC-|B#sGt%m#q~h` zlwjfAEty=+htUM3@f>S8B2CcI7c!wiM!7AeVT`hj$S&fAu%djLqDZLNG0x7}1`THL z76D8|1InvV2K)$%y)p)$xkU0NNO4A%%v)CX^ML}Stb*lRcSo(>0l~P?c7Rz$%HBE+ zE!EW`0(kd8B1%V3tuAaY30H7monMJ@!O!Jki4fHzKh7{`Szre5L5gr3E)a-t7{|Bs z1TcS7BG?f{7yKZX8i6`bFvW%KRD|>;_hXw5BTd>0cc$c8bI0g#t$-b{iJh0_sY9wD zz~rnRm$4|?MY~HakEVn!c6!2||L1>FH2%jwo-JV-UL1KS$#759)3_`bL=*BcBFseL zBUs}Fdr#QD6GRg&ncu(4W6NHE{J$aBst*{rO-fQf^kc(9k z02zVvm?AE#d8HXC%*pau34<~6?!6E-bxameEnWO95JvYPh=S}SHwFSspjYp_*D6MI2_zx3WL|rC|NPLy|VX#0E zQPc>b2J|nS!8DsET0)w~y~AZ5NF$*cXc{=ZCHz`vO1ptAAax(KeKZy+sU=Nrm zTRe^}oTo9R;xqa5nQVGwL%s{}lrlv=`}grYrIRFpUr5-D<>l*-!^SAX!Wn6VsI~>} zh%7*~jgpl-N3_`I&h^Pf=O9R;uvmcpoYIjGYymwiIy5yk7X7)d%4 z&l#GmjcFYESU}{b_F^BZh22CsfMR~ck6{qbQ*=E|5he(eFZt1*4}*FV z|Gg3X726ZmCU?G<)Dt^af$o^pIqW^5uS4kSpzWB<>p<^<$jiiR^7l`kFl+4$!3YDQ z*+UEY(67c^}n_B7e-$vS`w*C$%tSH<_Q=v<6w}{Re|eQRP(}d^n(K?vBHAO zNKq80a|<(YHw`>y?;HnYX~fE#qHz8V1`1ffGd>A}8n{b?EJIOOG{@w`WnyBAsP)D} z%0~?*L64}aVGMnZXz}yZL%2so$c52+A{7M9I3)T8$AX%tB*Qq3e4^PRFpclpcO*Z> z6h>jc$(`;q(WX9Ao5$xjFbqe~ySxK(-nY^Yf#`i z74&^(?>N+cfZVvK>*&d**e!-9v>r(~}IcL(G`}9gKh>z&uy%lJu-3j>7x= zGpz;FTjUdcm!rTy^B)zg3;sRKP&yxvgD(uc*xT6D1-LK}MSt8Hka8E|N04kMkX~i% z%(vt^DSARSUj9{{NnQoBBt*~7V(5=x2qO=rhtC1|`I7&9F3g>$7tg_Y?4t|jk|Z{A z`IT8!YMo~rTumFDO?d|{(s)5S-QeKFHh>wtCxo4%U*4*u z4r)nn!h%mhWt&uBamy!l8w1Lz3TF+gL<&+ZA0Va2iko|o@MG$(N=4BmL{}N~Zl8k- z%4%QDVaQ)xvd+ji6mF2bfwLgI7gk3F#6eL$3lcCUMFYw>pz6j$EkrpQrxy$RIr(2l zZ6cu7ZSarUv18WE7K5hnR60rr`b`dEa6(DA6e|hVORNfHBTrE<#7Bn(K0?iXa8Q2 zKdw(MxES@})x~GEI#WoJtzn%eYiZMU+FH9pRy>u zX9yor=%p@6Gi}b{spB2(YDxEFN05c>fcBc5T2B#Bj#=oJZgF-$=b%568ROwV$mhz9 zG7WNv3nJ;c&n&=-#uG$1L(m8DSZRlp{+!Sz=xlV!409I*GD1FIdcuJLv#C=zQ>tX; zxaU}x>7fwa$9FY;^e%)dbr+(o^KJz^wgJhFkfi`)1!)5$Q^nJ z^Ik0#Qd@m92VIh`q`&|9$AQvnqp-@$w2@ZxqT7k998R;iD%_vii>qP?3hY#R zm@Va{!k2qXc~!cP)$>x(%7e?Ra&VUktn&0Y7Ev!Sl1@fo7WjU62UDbu=bPXQ^52m! zh<>WzNohMCv)ZhT;4xVW(KxtOzuXQmJMT`QhlCR^oM*B0w&#$UZ!88dQpCpGy-I~i zm;g)?MD$YvpZw-c=WR)EsJtfo$lJ?fCgivl4wNOX`MP+9Q9|8*4-4oJ9OHQgs3#3~ zF_?+gQRHiL%y-3cd2BgH(E!UnJc2mzl%ZDEn>^`?_K5 z!7!Iu%19+Jo90Ln0J$_uKIQsHj@bpwrd`kuB_J*Fy}~!iNu0Vq zyDF1Q7rczKDfdRCPM?H5GRh(|kfbs7(1pd>Ve^rNSm6fJ*O8HLfoilY#0o|toP_%# zQ!N5g_b7P=Qry!#lxFNYlbp!_8r5`y(yVZnRV07uPhCgEWpOhhw1P7Lu0T=0GQvv) z;Sb#Vi$~eONM$Re4~RKSk!_A)PvFerd6bb&_QTan;3MYIzLiw1U|W@}SqqJVb-SKE z6mq53YcZ5gwk_m-rR=7HKLha%h-pMhv*a%$MG1L%(vNb5^e+*tlmBIH7W-2Q7%NsS z1jB<>!Dhv}b&>)FAd3MXW)O(8W;959?rw50)yYwi&H9@E?kxnLe+LAC+^`BSMKuh%P>!Jm-JDy?73ih4&nwS(4qq3ex9%uX~=aw&!%8qVeQ} z*65MHaxjuCRE>(>2Q8xe6Ph}L^hFu^PeB+`sfVge(Y?&~l5%~VX>tV4xs2|V@IO(L zK^C)pia9XE;e3XKvQ|7>76Yt$(0}gz2SMj19^YhBbi=Cu=jZ3VDEDe7CBMIu3AFeRuH7y&g zz2%0Dt1M381c4J7-H|iu0sv~r!HCBBe%3xe2mXBoXMsl~GM4Xx3?_}Y!wO?ARHM>| z_Vb&o&(8}!C=vupYwQQSUsZTyO=nXY%MoJ4Ku&@MiU4N4Vx6kipGVYmi+u1*LF15; zCIcPK!|*wX;sPWpj#Bp;ddx}I&NP;min`vgHdPo*jnY(7=iWAVkOfhvXinog0QwSO zN}*l|gW2bf>dz$z)g8x9R06Is7s9(p9=s! zca^|&2=IKQF=wR+3$m0tfuAo}VH>A@(kaV_N26`!(jil+;rWQF4;(GFxY9U*6Yd{h zV2j5zWa3?{W|R^PGAohpyWGSWbCI6P$t>D$7W+spq1*^R;;vy zC1UdtltCtA3R5DlWOoQf0EVht{(&;e>kP6SS=yc-q=(D>6$uLdQBmZP3LM+~1mA58spMce<)r!$np@52dbxe8aPOnapIo;n_xIvCSKvm~Y& z;rZAsooP~f!)eZD$?tH2`RxArCin4{emakiniSy{OFx}Qd%9>(7cwsj&m9nt0n9bh z8Bfu&-P99sM8sS^^`w;Mqs5BJ7r3cPE7AR_M9eJ;q)b)e>&inBPA)!LD1xmxUZl!M zg3?)lG1cu^Y=Sq9?;@7hVmgZ%Ibf7saM{i5pieL}4#M2(&D=5#pL(9FeIewAdI3+iu3xy<6zf`El-Xj=kiJ>EST3%Gk?{>_M)M?vK@+-Pa0 z1+|$-Vz-3s6wBft*wm-=_u&kFuc(=dndI0^eB>Y#|PT|LmKEx99y*^Em2mSmad|&!YNbLJ5n*BWSv9x18lN)cp)MF(^N0P|_Ka zj?qlD%PQkpU>&aO*77<&TkQ0;I$896?oD)y?vKD6qf{O~0qK)7yVoXZJWqPFdrcNO zSYh&3?g8LbmLCRwRy-|&$PX5QKZhZinOl)qn`S`48H_yCJzyhDjprii8|I0-=$SRm z!KG@B&4Iz4#;-lu>b8-OstnUZptC|~oW(u(q0n&Go4x?+E? z(Z2azziN@b))X9&J`Z=KsW`QRI?!^(#QW($#xod4=EWcL}O*FJ%$M8Lf zaWIK!+7qJp_MSxa+8Gv1c6dO3T@^yh6uQFzj;S~Qy@C@Zc(^gk(ih>AauwfY}8OM_^_zT8bw^dZ793-Fkx-YR{kN8=A zVf&{S!V!`c5*g@rl6egJzQz&IvY65!$~=wYpb?Ho|I{GEymxq@^h3^TkSJL_jjo~V zj0;Fi87I>~N4T_k@vI}>-QC@F3-62R^F^q#IJUx|$8J-=4GF8d2Qs?(=m0zcpAeYi zIZZjAA}^lJP~=nJ10_vFp4o%fWRBM{2oYTHFbA41fRMZw#B)p_d(${jJcY;}(q&l& zV2EQ7L}V|Z5gt>*@Gkbk z@E(j(>Us{x8A`!7`51rGr74@pjIe#zOXf$w)^&Zxjf*pS$I;-sfabelv#1m`N(KA+ zyMPnHHNPQ(>;^1LF*||90HXy;VMvySMwDPu6iY{3na|3n=lR^{VX3bb^nIBLcWKMg z!|UV4Id8rTPO}zG1AgBMjdTg3ar~TH1mbxH{wJQNM9If&F(38l>h0bRum&@28qetJ z=*9C?%d<9%OHeg&Z7d&--V=F8qP9q)dc%;C!S(=vMWTiVsj@QZC%wq1?h+&J(D7W} zF&U>oy`NEDV8jcmu{g``@nq$iqeXdxx$emh4tx}40c0LjJg=g#>yXB-3IX+W)oJih z!XSbyw?T=Nz09s1&nLonS;&gg%mQTD+)?Q^2*azpAoHfmVG;U5^NssF=O(^6y;#`N zQLXN)Q;tsNT#Am5f*Cpk{9n7mHVS2la+W#+9ku$GnP|d+zUV*HDmdvuEU2 zcUBX6rSmANjzrG0g8TxT8Y@nbDD@wdX%xmzX_Q~1 zMdiQzsw-iUA{tvjNKe?CG-?%L8P5G6W!EAou3}-#W9YLOBq?j8Fc|`nM|1A7j?v4w zqtfluarNIJb2wYvgC46J0_%sQ!g6MP!?`T~CN5BBw^POtv zQsALgUP6oCu;jUK0}tvv0!gDV01JfzN?|lVbQ;@ZthWSNz5Y zA@r4k@Kkn~C$7l-sLLBfcjb;;Oh7~#jzaCy$+(oCdX*~k&I=s@!?a98d0U4O zDCF!AISx6tc`gd29i_mNCl8X9f&xy__-NVv4I5;oC^Vq{$g@-c%Q1A9(See3p+X0d z%wDhtA>@|zrXXstP8fA5GOHAW3-~QFZ0fqpB5G^mWJ&G1m{-bB*A01X40;vOoa@PC z^5XbhAj@U4FrF~851s~zOfL||x4{~M+H!eGw7*PRk~p>%l|Xw*Ny4rblQxu!B+!jy zqS9Udk0B8$BU~pBmPFIfP)u zt~F-Np3+qmXNZSnez-il;+Iq^I|7-4S1$?i&eKpiaJxi)fY*SUq`{O7AAWP52`A^Sgw*SrWEyL)UfPv2FUV zuIuH0P0Q*3#jp+6=v%I3Ie*bj)3L3;0R165E}l8gVEPw*>$b|B`-41RzxKX8pgWaJ z^*|LTemXk}=O{@7ekc7jzgs$qS!OOq58R`R=R$&Men)bC(Qr{_>K=UC`}Nm@uV1BC zQ->AkP7~Mx+OI@NAYX$q=ze5!jdD+Qmor9QkQIG8O(2aLK6)W8qLonD`M$X9xC6Sy znoPZJU-{Qx4>V0XfJwmBts|gd*ISq)ltJU*Hi-Nq(6EROW+;QqElGHCe*Kzvf}+Ru zN{MJ0GxnWe^e+$vWS7Z+O{$9g{~i>Qx$ z6aY|gubU_~vfy9RmZFX|1yHy`ya9?*Mge7T0P20?O#t#T3IK}(Kv^1i>M++6-SR8U z#c*icv~ z`j;Ua+i-yu>)$X9tF-=Ix9{xN|6@FK{a@0RTuN3a7lTNvB|Kjk8)#g>l4P2eF-yj- zWbK1W8-09BgMe*N`8mhOGa zG8HK&f@+4RO2R!B3_}MfZ;&6+l-unVAmuo6EN=*2r11*A9kpVIjZ&eHk|!P1!ULW6 zbb=YU4tVAVUPfk7PG7mn!_p9z86!OxQ|F`uo-UQk6tV0N$U6TN&kFu8lkq(u|2Ivi zEdRN#+u!s5$9R_7e+W}6T7alQn9{_R4DhS5`tb9tb<94J(mJ)q6>g?rCJKo`y$Pk2 z`DP2-il{(+ot2G9gt762lLcOx#XrGW*bGbZM%5XiK>$^XbVX26Et<=aR8xT}cr@dw zU@44CDPpPj-Uc{}(|ev`L{Z_D_Ug(q!14kziUhqk{!E#gWs}ntb#hJ*)PAnWJ|L0bs@cZ`p47{6{x+cfbEX#ehD zGm!Nem9kTpuU{3kT99L^A`Z%C2|5Pomt{SD7N?+#=jjB2?mU7E7=&;XA~^(w299b( z3Z+us{tSNkkiTb>zeJ8GLS)#eu&&6P7Eo%A!}8JI3!{5s^xsGrT_OJom-nsC09VR? zR>l5fyZT=KdyIz~w^jT9DUYRCYW)XILL8@;<);7qqRy6LY_F~1Kd%moE%WIlZ1l@>@H7jRDJTzNR%P+Q7y(eafZ{k;XlK>2OkJCmCTXk7Ag;uyB==NiFdxG@VpxXx>LVbOW^d!r zM`=fCr*_!Ngn-hl%i;!=v!B{7Efd1(&xZ~;ugd0WR7p8kzAl&No?F4E^5vJao~N95 zoJuZ5Gz>B@8?YyBJ^qwWO$7!X{PLcDn(V3B zxX0-zq3}9#wJBbxMM@L=ksAV;(XW71!8n+Q8+UI9G*)+E6byq~82Z+;DGK#6iTx|Z zl(4k3O4$aZ-HP(82Em;x!;O|Zg$;&ST2Crwj_r&b>Ylx_>*ODrhDNo@p8*lbCk7Z4G7GigS@SFn`FaMQWPa5qv&%WCUKY>$0RXIxnu| zVhH?{nF5<3sqLUI9!d(j1$$GpYVp1|SJK*BAM4e%>YEzH6LjUx^^y@Bf@e%hBExf7 z>1dqRR_iKDpMq#A^7>0c2!dJ*%jzJV{PK)c;K-2_L%$puRoAF7!%C*N97+vGG)x6{ zb?8^2rw&8~N9AK%L{)g}W4i(AsJlliqERYT$))nKNGN59lvL!)(k3aM zi%Dz3wJkL@)!%}SmX6R`6too5u4$)2O9i=vr90rolr%Vva){F?hitT|70iE1a+p=y zTA`jsub!{$Z1g_*{oc0U+xB}~Th6rK+xC0gA9-(k)UB;xXZ)>gjw|ecGS=+@{r@e; zs@VT@%iP=l9^;|*zboX$kq^^*H3*cjRAI;uW9akS;Kpa4hn&uJnL0W{@`HTaQ>`@$I~?S-8|`{YMca3 zE;`g4n%9vYhc#>`$1u--zZ5ev$RhiDr;O(!iRe8##lxFg^cG3f4zF^Szcq$URBb|i)OjGx?EX%2{b$My+ zZ{+j}&GOX6ISZ_5o;fL0q1CMF<|Rv|MHn_>RXsE+9)wjo|Jd^2D*12WJ$U{P!_?h! z{trjr$NxXdQ;Gk-$kWmD+fV6rdYfhgpu14LGhnjtRyqI*kFkr7C#rjm%$e_@(q=@Y zR#IB-RnO2b;F$~%py<%=j49F=huoEqR^#~?@5GBTvXOQXzM8Cs%M$=T%$QH#Lh`A8) z>mDxS5dDq<2PxvkkioB81PnH{uy(v(g zCi_`jubDIs5l;jPli<5Fo+nF2{y-!JRoBhhE^%|l9FFLbD}#4cusu*DR{$+qE6&wv z1o?p+I~Kh}A%Yln&&BJC=+QK|0@u7u&A6J4lFT2^b9lx6&(!2CC4d$CzuwoKa{QO2 z+xz|hF&@7EBXCu7XFuP>o40CVMXA}0CC_Gne;Yo{qNU#_@RvENZeZL>L|7EP0{az5 zZ`rc{v#BpD*FWXD4;uez+Im_3ckTXu{Xfc6vHytcd^fcBNVD#;08nvFSljqdaW|P_ z0TQo@)*n%_DZYw-R%|x{&L;UDMcsyMk9mw}q1pB^qM|cxV?>L+d!YP~a)OJ^wKWsv z)oW$odiHw2sZ>V(iF0XOAl6kxxh&f6N|5BLV811_SPu4EL5!7PKZ(Nw#ri3zSDIWF z>L=={p?;+y{p~{iWDoX{ew#e)_J7EdXz_z|5g2ZZ9Smq zN>H`k6-#s(#1(o&!9-B2KZxDAvUOGziNhvLqV4ZmsWB#$8mZW9YHdBO5^wET0a>;F zbEk#Pb$}J?-?mJn?Ehyu`}p5Sc{a%Zcg1O9*BO8d4l=yR(}fh(`O=bKQfA~6cQzG_ zeszqcm_ShJ#P7(2ysHd?%K-0?7yV9?02XrBZIcP`ee?>2=m9eUs!ORwD!@5y?rM#M zfbFvTt;!hKO<p0TF$BFYtaol6A$Pic^$_teAZ5c~`LGLO|Xp!v0J z1<>?X;=(QV6ss&w;Uveoi-Ug_+8Yjs-vynzR_fd^88l`d>VRjU&L@dXWM>k_BN%qT z(~2kSpT!jan>@?qf95IQQz9pNH%cHxOO0Ta{BIhi{Ew#P*!%dOM|qh1FGT+=7Pq>U zf@R|9KwSGKmT(UQ5l;(*aw~qr^>344fuhxSzg41UYP^7&<8g$oulFrDP7=ZonEH|T zB){dJoA9CUQxOD)C*qS#_xP3H62)uO+zVUAw<}At-D{l2GrC0G!O$DJK&Bw>921G?vjzTE1HW=VEm=siCnZPWD<%>0Jk+!|i; z$7weu4F#thFRpGmrtSUsLX?5ZqdCwOyQK< z0i7(JqYmiI;(3%^z--z99gV!EH|=)3InLr)2Xqz+ZXAQdWkcpy*MP9*E5o#Obv2!0 z)E}s=gwrr!%MY(QWu8z2VAJ!emZw$KR_9S|yX(z{NJ!CkHkuMheyvS!yAn>*U@lEJ zTbT_Gq4zC#g))@R2v4VxYV7Xk!a3>xkH%Ez$EA#n7M`%W=4$|7Lg_Y@jm#qaQx$hQhq3Q46S`PYmeKwK*xvskLx;R`M;X`@* z96VjnfvooZwx+`iwUhOxA)d@dKvJj>YEmk~Gd@FAk5u^~uEnOea{S zlV;GQBt5)hxwh)Nq=Am6QOSV(xfQA%-clm~o>uo&kg7JmUZ)TdQW4G+Q!Z0d-Vwcq zTb;8sm{B91`ic47D!#Vent5bto0^fG1X-@ewJrA&V&vFuOJ7N!;hZF;UdIjvgbH^A zdTAVIy)MSnUf|!P7&1Hfe8fKUcVCyp*i^BRrdk@!q1tWNbX#Up*ZTYa`XK=;_J6~0 zOZUHu%{C; zM)^my4od3Tm2FTRkB7Gm5(0*i&oWf>MnTlWQ~I~&(SLA=Py&Kz97I8OzZ&Ts8)+W! zS(E?E94sosNyapz-g8xHzD=< zyGiJ2;!q#x{Np4|yy8dph03~WJjgf*5$j|xniFT@W1isM$S^V6xxu%Ebxl(={vz2qE}4GhwXH|97tcn`VvvukZQ)qdZmq zzpehSZUt5SUvlCa{a<`rq5l_)wbB2JHMZ3M*HG$}eeRE_)Ju}sl~S*c$HOc2E4*$b zGOc}X*ml(=JM)Vk%DkK}7Nmks#j!|1sTt{=dh0n(RO7l~0dp|H*HET0?!TxBsXb z?e6VAbz;r~+kf)0Sv%rSs^!hGetD5rea^3}s&tftDReY{y>_r)*)p+x)Sv9f;-NzQ zN<0072mEcUy{^gs*LVJDVgI+xivOo=?&Cim z|CFBA{GYFh-VLMKUF!daTfYC>bnN~8Uyt%M@qZBx#AX|aO#sRi7A2KB3~&bGajj~7 z03)B)gf-Dcgp)G+^Eg<2xF9)my~-bpAf|`V_<7rpsPN0)uC4FmEff2QzT#ac^V#n; zzprO~{=f7550>kc`M=fg@Adyjc`EUr+aCYcaLN4imw&7~{NP{MG{uHkg`uHG}uPW?sKY%m*$;tO-eJ7;&u z&t&T z&;Ox2hFS6d-sk^)oaX`Zf0T7c?V)Z5eX6pXww~Qjn>@QeUYy??f4F{o#4@Uvwv{$4 zw;j9v7Z^DJ6UNS?pZGX@!bC##{G+DmH&rp^~?7^+vZ;Xdz5GC{jace`zs8E6aG7x z?DXzeamhp}eE?^<<9Qg0`$1OQptW*L!#kLW+BqntROOD@ZZU`Fzb}EO@UKmiIFuTr zV0Uw~uE4u|oo*9HUU8qU0JpX9C<|!HC(khqT*5TJnGNB|~Wh z!_z23=@@zl@6!HfSNuOLeeeJMD9>8_|23xqAjzP46PV*5ny~xAPma%CgYQ0^u4eyL zGRr-}OJ}tKZC>Ho!I#&S+KlbYQ@Sug9f#`N4sh3tg02^N<8Bc57Dk8jEG|YLXBqUS zL^*whX#Te#j%v7A@I@nxtb7eQeJO8~6<4}4c6S86px&FnqV;cp4 zEMNbIZddYu7>2pe|M@7-+VbBizc}t8q(6DZ*e+y04s1=yPrVm!Yq_s{$=>fk>QhIh zD)XsdTS$Bgf=`n)n8Eb^ir@8j^a4zjGZ1kFVCBF?UQolTmyTJU^1Ren`EBh@b6Fmt z51_dX4)9&zoc0e)Ey0C6eNLO-&paE2F zc?-U1e`ndulHl6O zLUzS5Vc4DEi-+hP%5{z9>iQ*G1Z2V1a@}AIx;Z+HDAFNN%E`f~XRI|dDu1N&Fh4lr zGq9)`el}xy>-28wnn{>uS&~mHy?*vb(93*^|+IQn0U+cC~7agbS}VGHvmG z?E+C$?uoC(;)P@y@|Bc$qbfcsMoLxsyC5mo;8dVoHs*;q8Kq-RGs@NyzDnzoFO8o}pjrOLnx*VX$l`7GkI!zED=CD4cciv?pADw1hgC zc8;?S4vI0R4tNHb4OQV8 zoqX9&!gvJ34tT2CD-@Dp&UQIb=D!Q5D#hyJM0a*X*mD0DGV%kQ|LLynmhXQtjJ^NY z<2-Bc|KdR9A$ELDWlMK`RXyBh$1kgyYwh+2sxtapZTW@vtGl@RwGmQTg24-qYMY8x zoF=hTn5Hs2{P3u7O2upK=5&hvad^1Yw~SL{g9M-s!?tGC5-TrniegVJeP6agRz!@i zGPmHf!uWQRG|pl#4vSN92s&@CuP?5o!F0L3R17=2un1#sipV%kvn;`N7RJ@0$wr3K zXK~6TRY7i@lW>kRl%8I64#6{)u1b77fy8*l17dq-Tf|bkw8u_ z*7c&TbUT@k!T?XtrQhPa;(1R^@#Q1O zYXkzB{C9c!Rt+27flDV1WcPfo81M^wdZEAMm3oUGwT>6;uwB&{%kFn88fv@wOJ#3+ zssyr!RSX{h60@o)O2X(gVyhPsl8f41{ zK(!DGZR8blxu#}(o>8H)ut}W9KDCRJZI#)F*xpK!i}=UGL)l63O6h`lrR@3j)`q$T z!5jr5)VQA>Hhm@=;34NyA@Z^~J*wkv>{G)kDSqbMq}h|ciL0nH)GRT|*3Om-kWHrz zD1%6RfmX%;Srz|plf2s7e;(nX_Mc0X&C`fqwnJ4;x}ccN zhv)Dw+I?Eva>^RMV!q(Z_=2wUqZiDont!k74&4HG(3Y`>lGnA&%TjEZF@a`J?1s$$ zI(QbMs0iy&Wgay7!82i$Igc6hqn0v(AQ@g^hWdYZ6dFBsq?%v*GiONjpqjDr+s z&A!tLz@6B}{~ewc{9gpF;vQxFaJ`HF__Kol+pb&A|6|zwef-a(Jarsg#`?1<@8l+L zC7A>J2C8W~IGrd$+SeV&hb%KcKVFc;R}oIbZ2vy`QVAk@M!8t|E$3qj6za7{c==PJ zY~2J&C+{QgoNZf5zqwLLs!-dlQXXbg`o5RH;|-TU$>Vz3hk{m5-jt>6uc|-kBrSV^ z3L+q{uai)fw~3@pd-wu8%e@pyp{I@Bmb835jMBHVf>tVB9MT3yFoAr<_c0&R7vLG& zeORGG=JnSIbD5&2<`AM=XMI#mVKVAGf~)nbp)mE84{Ow#r~KrAE#GMz-x7#n9N*3p z(E0z^d;9OUZKPrJ{_MX3S8Y$@J{GNS*?u?szOIwDxtk`wvD2RC>F!A&5|U6;BuhYY zv`OyYehiBC8BYj+%1^4YIx&9@o92I#E{*s`I1onMaZZRGW#L{Q8ItJ<&p_ z1)Li4l0F5#7wny&J-3)9HC;yrwh~R_Xv*{ux!geBP8^3AH63N{PF&qwy1am<{#rbh zT(sk}{f(q%1!DTTRkG*1p9fLgIkP0nm9AzXPH$I=0m!z4P7vn717UV*V5Xrqv@ zT)Kugw}`wK^K69anEoj1nTj44(`Y!`boiH=DC>HX=4pp&&XH;02(=-KoB+ zW>LNVALH3^h;n-ThW&fhIP>cb< za1%2f63XdMX&f1uZnZcbUt=>q##MYuhQc`S3U!P|zD}&DS#^8J+q}F>bm%+<-VZ$! zw|2c6aZ0AhDqUZ8h?KN+O3+27^FuSzsM+jxID%pj@&2h3Q^UE88g+aVQ+d7Cj-av}>1^NCyvQs~N zKKG}I{BN25XJ`KJ{&-TU|NKz@^L{?+{3pj~g8*Zv$8#u6Ubg0VjzdThz(gjkTIVS8 zAO2W8S_^pHLzX$BejhQ`xmpwY1flFA&9<7?tdwdhepXM*6GO90PK5af}9E=>8%OIFLxItTx8p}{W@tREd;-(UG zH0&6e6|&zYjLI3^HB&-pHJ>U?*nM$x)pBYYY~^B$0-ON+?xK83YUiz_cvpme@uL~n zUMA?%`vH%NkX(EE0&UtfHRN#TzR^cH&(l?rO`fZDwIkaxqOT=NoH*JeUK%;|b5nF@ z^l!)5@Al|z5k6wSIro} z&iKDUuM+>)f2jX>FCS53EsoP$@Q?KjNgtW4_>>AiXoQl$yY-z3&~8dldU%?O#|^=N;A9an zh9ojcoBnNrRvVOGq^peQ-}_rX=%02R-ngAJ8kngZBnC4?q0yz&)D#SViNc#=G6)s@ zZJSL;ne4M`o%QZFBqK}SVf_rs*!_I%N}c+kVYdJ5&Hv>khc+I-UHrdS@&EPv!-xDo z_wv#8KY3rdnd+y`IN0V>`A;~>)Rge$&t+;%@3D#FK8?<1f(r&DIL|W0-}xy|X5Dz+ zXt_J9ulQ1HRN<^(0v9Oi&SX(Rbry70CMBz~*(-Jb=o4nPG7ViPemjaLm-X2l@8X0| zn1sk2nI2~Lz+L~UpS}6Nprg-`|7A3t+WLQ=J$~T-_weC->gl@-${Nf3Dn~jO>08*! zd)brDShP?9k^kt09z|i_Qqe*^ezCG988ICWP>;c*;)bx}u`(OPBO{jM(0gyBv`V;m z;C!#>ML{&eLL6Q5^YVP1gkUn{f8y2EdOpYRK&RVrYvBhMJYx=k1qSnV9B;uNYZ&7> zW`ZKi_<{rnzajyhx2LQRwm1aLPzcuq0g|o|H{b+U7t1)uD2~LHqZqF+MUg0%jR|-( z+wvuT^5TlM#mRyfXgv%Lp3OlnB!B=SYxojL4g5DOYk|)YSQCaP0gxjvv8^YWGDt`x zo1`|b$Wh)yEWr=55X2qPS_NE{-YQKjnp30OO?Tqbx_aGy&)c7Yb|OM@Y-()?%y92( z@wCO-%S&>GYGB<4lbE>MR5~zUD)X}QsC5&@zPHN?6H)9z@!Ebn5y+jWkvQXrQg>wJ z&B8&^(P}l=B2Iy9lIceZ9>bjufpPrEDkT<|CBF>2_5d#agbQ zCzZ$V%``%Oz!0s{gdh)G{`3kp21_WUXugg)U>D>o*}w(6TXU_J0thxR#u2dleDn=D z?D#Npab>T7X6xD!H2Ghk6YzhF`!5|Z|07CviM&6eq}-(?7YG;^*lQ!`EK%IM`7{op z^uN9Je}d?`RrTN9=YP|Yo&UMt8$O)>-OI;8vV5hr$nWFtz|SaOhfY#Odnx+espq%ZzEG2Z2Bl1TKGDyg6nn#4+A4e!c zQ620EWhjYI5@LQcMS%%$@;mpY)b+~u#3yygA?(%H3g#F_vrp%W<>!{#V%` z@7(`87)<+>`rrNOL;jC@`Ec##leV{8?rkbLST!Y4f-)=_39&3t6UorK+PBsO<&IY# zr7KKJi%-01CqQ4ZQAg$5t2Lo~CYW_}n`4S>tn}^-P(@5&06OK>3Wbf)lS}hB;Bbz= z1H2)~(&)SlCU}ks6=|)^-^J9I*Cq95PjEmO*uUF|t16YPRIzS7>SuC>l zQh6g&;RKT;<#Wpi=I+_qgA0>lJwE-<>4b1kwMl{}>^ z0#ME~FIXXpiO3li8yV%*IeqUaZBEh3Q|N^EQS|^CxgTOoD0eSCQbo|Tt6Ya>_5prh zouXBc7=_Jr=Unyq`|9O;oyEyfiuc7}?DJJ~4kNU|yQgo*Bxyi)%#UdKh0jn)G7j;n z6{{(LIc|HF@=~u

Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-shlink' of Deployment 'RELEASE-NAME-shlink' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-shlink' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-shlink' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-shlink' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-shlink' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-shlink' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-shlink' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:8fdcaf482cf457e6051b0e8f14d8c0374c06862789ab6563d36ec2797b43124a + tccr.io/truecharts/shlink:v2.10.2@sha256:0c1e6af979733458024f143651f32fe63d3294b2320faccff864ba19a9b4b0b8 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/redis:v6.2.6@sha256:8159ba7263360cabeb8eca0a0a9a7ca1db07d2676aae77643eaffa3f9d54f105 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:9bd4cab3391b2c8ddca31095557386b5f3f577b457072e941caece660eb9aaee + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:8fdcaf482cf457e6051b0e8f14d8c0374c06862789ab6563d36ec2797b43124a (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| libc-bin | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| libc-l10n | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-l10n | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| libc6 | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| locales | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/shlink:v2.10.2@sha256:0c1e6af979733458024f143651f32fe63d3294b2320faccff864ba19a9b4b0b8 (alpine 3.15.0) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**composer** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:8159ba7263360cabeb8eca0a0a9a7ca1db07d2676aae77643eaffa3f9d54f105 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| libc-bin | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| libc6 | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:9bd4cab3391b2c8ddca31095557386b5f3f577b457072e941caece660eb9aaee (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| libc-bin | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| libc-l10n | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-l10n | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| libc6 | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...
| +| locales | CVE-2022-23218 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | HIGH | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/shlink/1.0.0/templates/common.yaml b/stable/shlink/1.0.0/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/stable/shlink/1.0.0/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/shlink/1.0.0/values.yaml b/stable/shlink/1.0.0/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/shlink/item.yaml b/stable/shlink/item.yaml new file mode 100644 index 00000000000..b2ca49eb3cf --- /dev/null +++ b/stable/shlink/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/shlink-icon.png +categories: +- utilities +

uhZE2;)Qs&;E4&gTX@*`KDhZCOmVnS4e~g`>|}CM96)B`Ip4 z@5iF(D&x7<>@Gb+Fy#q__*u^m~XV0cNKr z=7iZ|t&J)GHoAtms;u%3(IgkxrJfl*?6I`Q!pZ==ayeCIDqUFNWYJ1k>A=5iL8V5x z2ODMxRoJkawE|Eb3zm(IRV=Os**i}*cCy~;vnG2_;k@6ztM+wQ?A8PM?pUqtz{O@g zeYaq-S|`oftJ)|QYc+oU>`QxR?6eB+PFSe~>tLhR4x6#i67v4+^C_Q4e(4m)Xn`WY zlbT_=WtIYZN5Sn9CAvO~<<%Z+5qMT7OQS1mfgH2q9@yiyP%Mf& z&ocH4FK)*MwJ4Ut0i+r6l?`39ua*uBdSFn^Uf&)+e#`mC%h$WMhHB;@1p2+H z7q>87&2S<@IfOeG#<7R6m7LZ|nXI#t+`=>oAvNjSSaEIcG)!x@Xq7NPr;1!h$D>bosEUo?y& zd-3GW)zeqMJiB;WmDLw8JC7oVv<=sUrYrAb&ilMiqiq6LIP^YOT|ddwtgdg*bJe-$ zaoM}OL5&J#+*E^6BgAT8o;QWl5_;@Ce-CBznf30A>0X zvyBewQRSlOW6%sw+S4G$0L* z0y=EJbxJrMc_q6thtaSn7)6}|O4Vj{ZR3i6S#cg}SHwhr02QB#S6PfMf4S&5Q3V~! z<8wRNCaltj7v4{oJHRbdLN6g*nkl&hg6Jj6SC|)EBv%}k2awscv+LaoH&z(bc2c70 zZQp92n(MYHi~C=z2(Q;Zk8r>p@xQ}irT+V9IC;qbaW9|R`tNj!tP1e#msPq>bRGkKPiLYGJSHGtCkHb$ zPjhuohF>m@W9~h#sT!sQ(wH=+C1&HE7ULwb>RX!=?kg!@QVi>7hP7E|tg7Piq4~}# zySBb3ninRo{Ax1b+Ur`6#4m>FE1^^_J!#gXH6&@k3f%qI8a{qJ=*slQ))XHAfLCxK z?|;jY!#KkUdd7Yaa+IY6(=^|Lj~~xGjVLUt3L8rzv+l2xbMl&?{0#K?52Zu;Olal& zR~X0X?WKD3l!Q=Fj^0LB5LEF=rjV$=0qBDB=g$uS$PwY?n~VCk+_9pNFP`cyf<3F| zGO~q9B)aT^&hZQ<$7I=2-@9S)CkmG-`1af|&%-p&QApW}>+CcLzWrbC-&gBCz$jvm zH<>EV^aGAjL3g}_YDz^t2*)e(Vh<*~c?a-nui-MiO+fb*7*9^l#*-6pyvdSd)x-Y+ z;c}Hm?D^uqZp~-l!v`S7B-+d&R>kZ#St7H<9`ReJ+jPwqK4Ig0@x#?-1kNv>lmE>J zDW+1S#9}+}%@O!|nQ@PnP2d`~jQAuU`1n!OUdUE~;7FpF0#O+qtTFhpu0r|vu^#^& z9T%fxG$6DZF_JUgr}f#FSQ4Pv@|!FXaOEZ`Fh4U_*XKGj`J{KDj6UrWt46P`SwAq! zG4aP_Ju@H5A4&j~77pz1Mppo=KvTc^D}I{kfAT^w${XDSsn`Gdy-`K~8%&3z2mS9p zKJUeyq-&7N;f^hLrNCoi&e~bO?RDF0O^N6M8m_BJl22SO0{(QuWFO-@TM5!biLL;0Q zkN7X1vDx7mem%K?4qE9Y#&Z;IL*5|%DN`}YmQb`ZI7sCcX1cvd6ZQ(ID3(`~H?N+aKY8==#q!`g}DCv zF2wb=O%XTV-Ho{Qn_Sipish9I@1*j&E9B206qIauz=KI7S}>&H6_StSc-1#O4$>ee zqq&2!EeO^eRK=dmkEn z^#*`i#w>Nx=?FK`%t~zu#e#fYZLT4|;#G6SFuNA|c2x*jdAeh65o4wvD;(Vr)mCV?rBmQo%28rwFs50)uk~jL$v~#SjVkDbIw@JeO*G)eSsw~ zNx?2hq1KB}m99fNPiM%DbrI=y{M`W%`5(k_&vm{=FV3&P)y4Vqr$D7Ci2#q-P3EZ> zBx_l9qca|G0F1zg@}W9->F`v9JoK*;>-(WN8R1R!0Fe?<5ocHamQ@iZ6zT#Asq_ zHJ(vua4zCCp(y_W=Y;->>GCJh(o$MHFI44&nbkE)WMQEo6$RHEPdG)Qe1me=Q-WX~ zE`_iveswx^t9|j=kY7IC3FyX{x7B_)1Hb+24!hEa4}kjCyc6wDaj1HwuC^qyOjN0S z+mH9~TP|`KqDz!x&MVR+;xB0}eylX`&_83p#j#1Dxzwq7m4F!!>uHc94^uA`y+oIR zs;*6aZ9Os~@C{diy3KMUYb)NME%9~m0jv}J2lxO;np0jy>(Fu|l&4p!RH6rz>BQ4a z%o2ndf&;2yIAv!tIcODV#gMfp<}rZc2A%ytgYL2=CFN%^c%%$>6Tl(2!2ALztdLj@ zg;_^=9?CFJn4*ZQ5is^ph_iv8PGsPLvB1IIuVAgqrw;RSA)Sw#FQ*I4u0?HRhT0aW z{I!%5Wj}k%`12S;BAB)I_0x5uB#lr}Oy%Rp1O5A_Lx*#&^zyx{{{D2RG|kdDU2Lzi z9Kq-!O$f~)mSHm9hj-C$jPf!eg7&o`?7yJ3`|z{yofn?jqGnbQBk3WAnDK`!Ody1^~no) zHKLxkG^Bi`v4A1+z{y)O?X^?QPkDiJm1L(S!CX4-$b&P6~!0a42JEV9n{w6OjnITn6J zpa2$tM@0+p4LQ;t0g;?vq=<2LuZ3Dm^@lYOL)74uE@N@6(6CdoJf&%v#>THaJOcfp zJ?;E-eSO*CF%Z??uUrqVFL--#gdl%C1J@Uqm7|XGDMP%9Q1v#ZAE+Ug@2KK>L;lZC z6z;hG_i!>DRO)|^AL>8e%SZ5kzN|pRQsOiLak{|aeq3LkF%|c1vK+5qzEyP*r5$cF z`-*uY9|ZFCqQVcpM%&H}ThecCWXYsB6W!PEnRY3J2cgg%pSEZ{zxsSXiC?iAELaYIUdg zrXF`Xnz_&el^3O-nG=%{E-Skf_x9})P~sWMQ0R&k7#K3vilr?>ZY&Zo7QS0K_AgQ5 z_a?fIFbi>iQ*YHde|`P3Q)%p&IlcFijC$dm-s`mjWu z{e(Sm;{-r443 zpka2EhBx)2sGU+{%{BGJ(OWSGT%C~vaK5~AG|i!ByWzS>NkQdjgD`%AVz@2b*xE9( zZ5%inf%<7x;F-#~&e8QUM`W4CQ5Ck`Vo$&nuTZ+CUX;z}djic&Z@vxFcU9sqBh7jJZvZSL=%4qEr+ zi(GFh2Wn^><+Z`H$EB5e%r_zL>Ckp4pg;6P7DZW4kr6_4q*sP>^rRAiDJY(zl$uXg zv@aplfDS6qO!T>)V`OuClpq~Mr`tIcz5wf%rFFxyj64>}_zaXZtc`n>`mM`g#{r23 zL)|t2G9F8OYYIgSAWt*6;Ert3(EfD?R3CG-1^fHm#TSiYhW;bXO=v`n`_r39YS@Id zh>tdwM(G%vkXAC>8E?57R4IvXEZ(%-R~4dR&%K1B`m}X%{+5?+s!w+oKD=$ zr;Yq?>Hyjy|3~Ag9sf5NjVBNC|2{t4|Fc{E@8t_B&Xq0ywPJ|6r1vWTg+*2V>~VGL zT(V@_wq)1g2m!Apfl|iyCVZiil6|GJ`Cn5e$PgyLku8NJEoj=uxv@h#jEkmYEO zasU%xHplZKkq$w$$o_7l`M9pj9W}R)zXLDn66Lp;ARy4-Md1;+{N+Np>aA|=5hku` z+fl$Q4%)XVgjQY{fqyO8}^goqYBnuiq1KW6PM&_Sz=ZlB=X++XTfBmI)8>FJThx`1{4KcTLT+N;gur{G3L`d)iND)rDtgP5j$YoNER0-9AC@F79@maewYn~nBLZF) zzh1VRk^j?<04*h>T?%VqRXxN`V=>PZeapZqgm;MNVOoNZoRZ*Rsd!bN5);Y5l zsM;9>z%Wk<0qZQ{bb}&HiP9@Mae3{B9hJ<>qtFFoCQO_an%JiM&87o_SBT$q4>&XL zNDv*M&Pla^bp>8GC%WAOnBia8K+@z4Z2AW`IEl`HxP)}DLKH@jLdGXW6(Q|t(^3Id zl_AGX1R=C!|6z_IB1RR>vK(!2x)yO#X?nBHKxfnMfQ~@G8Xw7ESPqf{>L`}-bu_z# zgvb+e^<$o<)cjctM=72f2IaxIg!C9Z0>Z}9ng#6r0)?(3jSe^jAHZxficqNK1~2>H z2N-Ky2hr}7%aLX{8gPvM_5@bJQE_zRdUH92Yzy(r3NO|xFz&gh#@Wa@S_PQT3`#=t zp0$5qWpA!G4H3M~V>uVaaqA!P+41o=o3n2=|L2=cSN3u?9QG#MMHQ0reAgzxIWOaw z`Wad+Tp!Hl;C_#0p#_QmME;1y6)!%=4jQ*4S6jB04kW~bdq6+}ccCC3eMTgN ziu^Kzf2`5LduP^s38`4m%Yq?2(pZFmSg@$wU|vZkQGn98#=gLUbsmEbr%DE*5ka=- zgHir{^uu%%-K27N6SjvxO*3({k+t-yxqxLlsA8)%0M*c~W-m{>p7wRF-A!*k z7aOCA&)B8U(e`<|b-UZXI2PJ?TpmB%XWi<5MUUM5ewx~UynUnSkKOnG`@M;6|MmJ0 z@!$9I`LgUkPF!rdtQ zwZQgJulf5DOiQI&OlC7BSVOxp{C!p5PwB&_@G?re^NxIKZiCJql&rtnXSe>hrZ^_Y zZ)9Rj+&ul$&iwzAK_&lR?;-!w{e1ZS{|#Q9i8~-TMvR+3Ua@Hjm*`Af2IHCR4qhR; z&JzFuN#_(KX@t&I=G3xoz=0#@zD7IjEfO#QMH;0WwC#Y-4=-PK%KS)=c#gcz_vf!V z?BDLw9l2HsTa-Fp77gq6uqOxJ>@;t zNkgG9xC@x1UGYn7i?Q}DK2MLF7683 zJy;pjD`)Xgv*-IgP`R;O+;(1NbgNC;q207lxnY(CH|rV76GRaSaC%(4bS7?FmJ?j* z&Y7FbUCgw)C^km2T7gW>;i@g^={QmT2!n4jekNzl;kl?lRteDm!Pu=iA*w)3LpgSL zyU~zpf6i_!#oqnx#^wUH>)v&Dx92LgTKC#;pT6B3o2}(m+k2x~T~;?)!!5SY2CLap zceb1EN7WEL-GQc|$-=u+G_)`S{kmbx662ZGbvXaUMkQBrJ>wrhH{3rkVDov?&k`3uHplLvtNVEo>MV!uH z%*AF612B6iBw!hQcliQ^3#%3TfKrWBmc9(VY%;ABk_HoO=w_s zhck$nb^s|`L+MI^-T(?G=a6<4O*s!u6A+;+PPZb_wvu$Z zImrW6$R;#f?84KqN9$27U_SR@{%5c3exJSfKcQ*PFSs>l0K4@6;i#hj52p|LzwhPK zT>sbQ_mv!osPr9z@c1SoIiis{huGM zENH+=wx^(#AszT#SH95Y^T3l;0;$KDF&>9@?@rLZ0UOQ>Rcu>y1N2!@U8@2>RcLmP zyWep1S(qvBE*LM<3blW(*{b#}M_;LA=W6Aih#gZ=_v(8`-b+>M#SO-qszZN6!s!uI zQsdvvjC!(sy9y!|$tkoM5IG&WF(>iq>XAzSIimPa`RpzKX%=r}f!U@Sz%KoN(zEmb z^{1l;{r_G*jpRQwV2MbJxke&WwXDuqn&iR3YXTSO%%u&KG$f4SQX$|!yHx@H)858* zwF`?Ovf&xUFU4T2lNg%C>WMmX0nQw=<|~f^b-p8VF&w(z{(=H1_ul`vFi&u@XyXCc zvH$zM;mF?q*uj44HcrT}hI993tL z0L+hH^E6tETAV1^;5dIcate39VQg^<88BFQnb8jCP{|}ZZUSS^faVLH3_WxS`pZ<98aQ=Hg zpRd3rq!i@|_pXXX2e(U2q6vu$sb|U5nCyOJH zqZm@WK|HCv_B%|XgRek>WDT!JS&ruT9g0L^tN;5j0K8IIn(#LnN+3fyh;f2~gW$>4 zn=6{;=-?}G!KoDda&ZMBoRfoKf$1^-SD=3o%>JDp^MBP3%f&JKM|~xm4@0?BKg#25%0&3+Rgdo#uFP@ZJA+@D=z4=KMa~vnNl$a#Z?pXG2L}g#gFH6jvDCJ@CqaK0^gDn5+cEt6!B<~>1%5Lg{Ogg@Mi!VZ z*E6n%(0q*~O~EYVgq6V@9qVuQf*>#;9fC)L-eAz}^}GG);Q{N5VaImt!FTd%F^I&8 zvAClggCtG5EBJewgGax8)t?Sd_Cf~}vPR^XwLd&O@Qu0W8*{JamgYGjlt}r7EgAN+* zsb0@J?7nZ<{no?o1ruY~{pzrtsPuw~8Gi@#@^}g z1!Lcs_v^$p=8-k#@g0nLI&C)Q>9l6dBj1=ut;amH#yn~>W-(s*BX@H=;y)eAIcUay zCsRNB?FB>M91L5}!N8h>p*9D-Q;Yr1@jDQw3mh`B%DuvDh?9mxoYW1`BUXE@#cIzI zt35-k_D1bUd(?2uqq;GBq-w9VRP9+pq-RLg-mvAE_v5JLm?t%3_DGOkTM2R+45rqY zr37K(qdPct2~H&-nTi0JeV?QoHV+&+#j_Y4$(Uvp6D4M1(2%hWyo`;Z?VJhrp!G}` zvXnv6XQG_}GU+!IV12IuV+i`j+)`+t27|FR=7~P$mb<*yaGiToZinmxdwkk#KF6nZ z^XXOy*n`&dIkM(+tj}jVg<#xJ2^#yAAcmlC%qP#yrx-+&^tM=1DUe8c*tY zg02tF$H!h=@NNmNJr$~Y%#=9RX<#>lR<8^BT>_O}C_O0;_ zoa5bhjjQ^Rn2N&g8c+5U;^lnwYv#kPDX<5v=c8xMM_-?hcACO?*l^6lx-q*o1@@rr znER*Jm~~B|G_jkFx!+799QVB%Aw$qJ=Kg*jEZ3M%%rW;*onw}StP~@Xt`LauoM()o zJn1o5=kd3M?|M~YOJz0m4(G%-oc-p^8V*H-c89?*m|8H5B#Z zUJaY>`&7DqYn85VsdRl^rR&*jn&w-1{tf{_Jh=-hwcACWt~0)XTFD!lL!5XAt)YiUbt-viLdj^~J?2 zfo($c`f)&Og0z>fyg zI$#Yk8yJ|$wKDiOr@{zjgrDFuvRf>}T%4Arw}F@Ded=Mqm3mlgZp%dI>nfsS58WYU z-N~%@6v#bK8GW;284`V6iR3OeH#$DmuC-=oDR!qe8s_3OXFs2xCEg+T@JzZ-0d1v! zvKKAYQ`bCuduX2RIhtpHK8>@r!f6TgQr+x#hhFc`U2s{?0Da0?Yu(IJ&BodQ2llxK zjBnwV+dLtYv^nA_E?^RY9ECYzLr>=*L^|y zP6NyBHPWZTHZ3wp!==(DlmQsyJW_pq z^j_zTy}Zq$9fl{~XopkJQPpYNld2PYd3(+Qs&lGmt1L!5=7l?B2wr6|p5u_mni4S2 z(-rt$1j>t{H#~73`cIrsJZpQ>c5P40wLLM{wqN18BxQ<6dMj)mad!tN3xE?qP`<&T zmR-m*0{7ybv|YTZxp*h$;`J+sj0N`Ln$UDro+FA}3rtMNk&r+xUqi+;^)jZZXZfaW zmv3q=-?V=DB+C(GyTXLR8xfBug0X&v8Cb$3isgbzk;3O-(oFRmPQ0q$)I$K%wgfOS zql2a%0w~y%ZjV1dpP#8nJD(=PdU6^gcZzana zHk3v~uQZx?IPs({Cmx$d_{8AE+B|6NR@p1+cq@impV>0@nAGF8CiU1fsmF#%-LD3y zaIY^|XMm@&2)1w~!tI6)P01lQC4F?>&_o{!6TQHcRz#e8F5TxxGhwnBew3jMJm^c|DISRRZb zp2{4?0LB;+f`r`XE(8RYDWUu#t3Eek9-0Y-!HL&zJN5|uaa*B3vge`aoCmdYaYA{z z0qHkEm%m(ySfgGn=o z=wRY?hz@<>PQ#YrPW;WOHOLcvkb53D4H|}K4*a2+Ltl*3uyu^n(28*y>M>6GAXSK3 zY0iKoN<~rLKHuF;*@zO7X2M0PT>%|TnyE#DiPvx)`l6zSt)rrbR#enbkBaJb2VU!3 zCQ3QhDvvV=C%zJ`IKqx74t1OSyIIVe8ne zp%t4o)MK;irrO$4!-n)UtfMElmOK2^*sPv4(2+jSp0%w+CU@bvWzy2f$jG&I5m=~c zzg&7~p@eAyL{>#ULk+Ln4*b_`hh|WhF+(kt=wZ+wShF+KX2%ipeB~%#*_+0d-&GuV=S`)+6Z+KA97Y79{54~6|kq!!{2|tve zkfQlIjtQdP)o?5P>_O|*=v%8X&{xAgi@r#+EiiL^291_xO>AzSyZ@ z%h)OYroHj{?!idij0v1jsI4piLB(`&7A_e_<$r>Wfan7CEmUOSan`X&0N z=F%(mUWUtw7ZCFF#Vt^hgDrj!ayJ`{Cl_BkkFUiN;_*G~AM=b!s6i zvrw;;H1%lsSlOps!Rp&o(%X&8l%edRR`H+>Hd9OP2}l|$WpIzW$Odl^;8FXwvw|Q> z_~lMM_rzKCwG(Eq14t*qz#9*AeC9GSN<(oj;%Yj-RJK zaXxJ=&Zm|*pW5QQ@423Fi*vMC!#n~g*?O}?f4z~Ipq(L<1~DM;rs_q2CNE>19Qt<+3SrDkd? zHI)&u_hUp6FI&K`Hm;L3K~XU}?!PZ~97^CUM!;w>PjfaOz7e{VrD5O|i2Tz-Y2b_xN05dBy zPHHbpi<5XUna$!cPDMBd@9o(t%hL^yaN>U<5G7(^*%pyyqIk$K*(Mae!*cZ+Mf;ul zg8il*ReRc2)n+eRii4pyR0CW%ms_Q|%F47{&&nz16aC{)7q7qy=ebPQ{MY18W%?MKr2#!$51|im?QFzGd*b^Nx_1HMm zwl>bxv~i}EjZ>XWo^hNBQl<$(9#(k?>9WYvBIN5F$4HgH=aC7ji87CMIow+gc zb#hK#qzSJwMN^Fj+2O8KU99Ah%htj)Gcd+A28K`9Yo+Q%8(wwrf z7uSbxPDmHh?lP6(5@MRzz?&uXIQ3;YmRPz+-ZsQSyxKE{J~Zu_o;PQw93w@9mZ3{n zMEssM%RF-GOFSYG^p3jyf}h%h_AI!WAz+=!o8&O&?gb;BD?yk$g! zA~7Y+6eE7$?@zA(;;R4i>goBDpP$}Q@t-~FKaK|jyZ+CpKYghGb043tz%v>B&v^X7 z!4K<1gtx_bmcx9@1@v{kMi(+LY*<%x{l?IOTp0Cfm!W;5^HO1}?wPQ!Zd3Ab5pi zn5)uXM}RIdDf+mDgx4eE5+_IeuEGl9grWqp?!uH%Fhlefp+u+?0z7xZFpWdXGMaAz z43`*f7>bJ&#tg?9Vtf0^tN#udO8~FXA8VX*9zYHb{;{5+JV6wZGw}BBkNZJ?67;&g zx4h{SjVT@+d;qV?@{k_@k3stYenB}?a>0j#4_)o^!T68;#UVZ`Zh7%>@M$_Y;APh^ z0TBFz;uUxNzY>KZ(|0xw=(gP)(Czqkh1FTwXu!Lt`v*XPfl zKYaq8JbU%@;`;f2^B%9nHP3^CF1QpWEW;%VZ@7N@+aGHj-gMa(pfVI_XU+^&h8$ zhx)(w@?ktogwHb0(iJ6n4-PcC#sp+JUcns4TTv8}F=4JJZ8`nFIKPr%wrqO`2S25^ zXoK=2aEs)nP|+5~vE=^*@QSoBk3_GcrvN-l1lunPSTP8A#mx-8rj?5L6*LNP!a0L1 z=O~#XXPKO?*$B96dbTa)5_^FoL(?K)mcRs+m;bo~FkRqKNCh=BAHY8lHo6TSjv#ZX2WFlO&}(}V=9DKAFH;R|zroudfwy2XMTI6`HoL6}B@3FmhI zx=YW%Lg^6&9&9#v;%5e|E1?ObxY-|uh!9Z{Gyu=&9ti%B=EBv6lX-en$WRJ?W26?P zp_H7eY_n!ga#577^Dbw+1~2YP%)4^Jj=$0nK6KAYAiPTv_yA^U%4Xv29L5AOGI}Z< zPwOP9j=!V}oXFa7k++MDi%9wH@2y_48f;*WS)W9fm@B*E1nUL=91{jP7XQ8d?O&_| zCWuRbgzpKAA_3|a$1z(ZVUN*N`jrY|kq#Vfm`eRn%tchDm0GLzrf}c!`ZuvErKgyW zdjJbeeVgNDCbpsAh)nqv#0J5Sm;$Z9_-xB>%gfA9ka1z|EWEngR7e9X5rp;4O!spzR6idq~h^zilLs_2j~{U+fvURyG4b?=pUlgSo9S+;anbo%RQN9C_$0DilTMQEeiskiJJZVT8^L!m}TN+CF|vW zUZv}VW^k!?DK{lFP9Tn-e`c-p(IkkHWtvttWebT>fGWiW&C@j_Z2q&X)LP{3z;wyC z?`0b8DM}o8H{$69hPxQL2E83SFM6_hxeob`IC;@mLq1--wpQLu=T9K=20~BaU}C67GOBVUrK`!%7mr(-$=w1sA&_F#ZNPZ5~1u*MgqTFz6kuo35ugp zQ`Q>DGbDap;&91{Owks5Q<-!#DJo5a&DWPSX0`tKY-r+L5R1_sMiJ9m1p&;^oY4f$ zc}tp#-o?&>bQy5sEPbig9%Q>sCZedI>t;I583PZCYQ_`T-q@2JNKEgDiG6-tnL_4Z zAEl9k5(ZHs8(Ng@1{SOd$`j%Bwz=3v&NO<8VNB$qd%}8^<7Hi4N&WN@-z&VZLKhx_ zmr1P3G^yNS026?cbiG*Gh}b9iwak&pE!DZ^5>X?rz%sj{l`W$}!75rY>wq;6z%MYy zk)m{N2C0{hfLf6>*WzG#r}H^ZFx@(K!4ovc2{WivlQ2yPFH%K8zUI!0-+s%{{9mQ_ z`=;1~0ZuuGJ`U3)L>VQ=BwV6s9phxtMH}HpI%XE=BI#yn)J@U|9e<_z>cS-I!i3_k z`b9G7IKv5g#!1mbU7|@Xag{)VY#qm!X^cb5oP9Qbkqj;k^u;pF*$nAN1pKx7u59oWE=;%^o>XP%vSa5NwE`fxluo%TlK>2NR_hVTT<`jcpO5=OIWSdR_wone$abd;AHl;=#0 zaeIrkP^O`>xyoI^fvjmtLKusY6bt(|MZ$k)tS*WG1V5!Y{x^F!W>yb4moG{i4I;*=#sEfoM1iCull49go8B6rPN${HltTq9dlOF_Wd1lw_kv zqohEm~eMVIlMrbpj9P#K}h7!{hK7hA<*2jxAPuZHzL4*iq zwqKS;r26s(6PzYLVZ!*|bG+idZV70}ear&>6~9U$T7#u%4r0;Xf|>G=hu1vpEXZI^ zvEc9;*Gq7$CPEt|c%{Dzv{&nTAnSaAe9+6;w1BVRJ0Rbz1HMk+2I81gMw>2-_sx!& zZb#8#>w{|&B3NgO97YHfuQA*GNzpesVj3}yl!?If(O0Te(<8~V54n%Zz*6`CuH+(I zAt#`h$rBVKimI=dpabxPlPCiL@FL+BM+waWu~68<9>Yo zjBRW4V4a~OVh>H`@Y}x(DXFDq$eV`j~>xqp52 zeGvtzNnL)@>=(G=u_kBrB(i*P2@%7vrkGiiLK7iks^v;{&VCaQJ7*o9*Rpfe;l$TD z>-0Mx|8>+M25WLQ(z$&I#=RJm+4P7sV+8;8L1z zBctiBm@a=3EnROh5hXAYLQ0y~&v9}?{3^h)6#wFStw``BoeX~WZdseBk+CV?>dFHX zoGgx|Tc8Uwaeag>byqe#{z^E`nRQB+Nd0^$$LMkr{S0y9#ybGl6{YElUjkCR;tZT0 zg6sb|1Fx?y!1ssX^8D)R*C%J-+xPE5@Jc3W=OKO{KYj}?$_D&{lFbi!x{}`j2m-Yh z{P&7@R}ZhV*rz9;WW!@n7(YuW%I7ddRjcncK{Ch&%iEifQXU|}-Tq8v zllvYkAb|=DWPAG-=I9LY=$hF!6KSDuPDnun3XdF~yNph5AhHLzWIReig!zK|wfIJ2 z{6or#09+OUNQ$Ki6dAu_{Vn2j2IFA9j$_6Y3Uj1JOrnJ19PwCm)(=ifwLwC|L^9v% zX3?AN(;-Yis+y<~h#I2BIi^INLuOl<=a%-YpZ;9x*s^jKN@$M7ug8dn$E+m*U9f^# z#?X3p$y(=#$XD5O&SO7)@4_hR%I>=~5=d=K0q$ z^j>dSrUuxiYmwu);I=dcZ#``CZP8`LNh#OrJdV>_<)Y=DZ1j$CB23HIr0C$VaGlRV z!gM`WEfu+ze4ugb<~r;%SaY-{7MAWptjZ~`6GfIX5n-w*g5 zihjmX6eGs>h{FUd1ZJuO>ijqLGaHf>n*DxwA3=!8p%lkN->9CkPl z;mTn;7ud-c@mBjLhpp5A;=+HofVVACXz)wn~ z_P0{~q9p3BiS$z$GtK$gZ@qumoAIu3VL*Au`8BS^;%GYzIg6)|0N=G6be(MkhKQqOI zzb!O8(N1w~ak7aMQP7bbvHipTLo^J6;4lEsxGtC@hRjMhLtp~>3c!)3_;8%lB;J;f z`CBl*K@or|W`FBIpT<>^DCO|=^Q%Jo7E|zjN|!Q<@`WnuEmTX!U}Q!NbvsEhAEWD9 zzlGjrm*j8gXfP!vrh5n3Ta9-_*Bh<?@>iHFGx+X{qpJM}f^1YY@72;QWo>;~Y`cD%LK;E;&b6)7aa%^S=8rmAa z3A@1oqIz*xht*Ch2Zx-9s5&?t_r}q1H0+^h8up{naE_w>Ni>W4{poZzouF_wnTNya zq~9OT!cjjOjv_c1_QFwb07oa|@h*gv9U_gyVk&o70%mg;Kd1l=kg_sNw#MXBnyaKF zvJqbsEG38qrnyRP4Xy&RG=LhTmPWeu=5+YTppja_-y@bs2h;8dT}7{iF)mF+dkYxd zG}r<1y{-VhU*DDfc5H@OIE3TLY!LQO$8a(d1+{8jNSB;pk*G?Cpn@+7gEUd)J208-JR3-1FeO2rt%pmS?^`Y}GwD8`o+? zB=Lc6v-|Y!xHR>FmRCV8Vu)8RDn|%7M^4%|lc%4n(XRf2Kkycpg3uop<{y(-abM`+(~y%8i&SZPwEvKf$TQmCDio z%GDbqYEuR(OJl%P6$0Y`w~I9-~tAt%anC*F9iSFqJ-1a(;smW01m~% zr1PSji5g6f{#YYIixFvig6X zk=FGg-$?>!vW{bBq*W^mF;U8Z@k?wxQ-C@?bd111{p*=;L%x=lVwfhstArceh<7f4V#Z*(N*!XqD0J6PzDO>+-0K5;`iAgfTfH&Ntk6u3)CzZa(?+R6b7U{L-rm zJX;kP#cHAcb-1TKC^1o0A+*|xw%rxXsyeO zg33Hpp+Wmg5QILSdt8Y?0ANtPA?<>^#A^H^`(y3-#5Ovq6s-GLrX`lgjyh`mR5C)F zy$GaWNn&LsCT$S;N>!HjW8}LE6roLv8$h)^R6YKG;^iMFrtS^b>3H^=6oWf=8z*QO zulf4ERYQF1$HTEvl=s)#Cme-FyQJuZAbP1Kym#!$bLDmC%8H&HUmTZ*%k(x8X}Wpk zKWA4$81GH|S7k}```H5}eg&aQ96rm2aCG-&?+Xp#FJXIV=zR8FqV;8NmV!X;e9H(8 zwUMGJ6HmDH2@_r*Er*{|Zq>?g>gjaKgA7WcSVR_Zn5$HaD3ZPH=tsDSGV#S5?A0PSqmlHTe3IRW0Fh`K5ZC1>hO9M`g{C`*97JAyPmS1w=3^FnGrw=IiRppYkye`Ag3_)CDh>x z*=cPwhgO8YCZNLt)-I+)>&hL^VfWG?q@#Rwcek#tsyPw*qo5!3R5-`UJPP4_ zbTSC%qwy3?dgK1Ahfe1GQFIdahSO2lo19Dr)00y;n~W#JXgERPV0t>8jfVZf2=2zJ z2<6Ce%C~%7xUX!P&X89VyJSzTrR;Y1aduNkZn)GHd!1jsDFn9mdyF?IL4k8DAcbtC-RC6D~&(-tHfw==tpw93dCMstrSeWj@QG{hc1}00clE|glsKD5?#CT!k>lze zSFgl69)}-{-Ra3bb(-o+27sA8KPz2tJwK?P0M&HWn3j+EwjU%F9 zscUkQL0eE=MX!k$g}KlFZwJ;>Ys%BrO>k5J0?+c&hCsxZLrRvd=@H|%+)tVSMu==3YAdqmOdrW z3U#W^_M%N<48Q^9Ug=VGddF0$&(xjKqzTk9h&!i8o?^6Ku`Cj&)~J;_pq5IdnP;`4 zQW`xpQ7Gk$yE?3PQdK1fftI1IKkcL5Nfbs=KbnNS)7gA}Iyw!9(-4j3qv?1uJ4LA1 z9}eax(aC5s?4O=Y<`51B!|`MQ9f83XLQ0R!XV6Qx%3A~E&E{8WEH2?_-@nI6r0yj% zSV34mt2e=`MzP+F3!d!j6TsGCE1%UG@#j_he^2P20JenJB2>A_((&Al9u!~kXLZPt zwX8+#$V(PQpm;3LcdLj504HI*R<|JGEZrbgg32ECNCmXql#fte`AQhe~+ei zj!3%B!%9LQo|}qv&fa&zY~4BQjC#G^s&mv4Znw@^=j2D+`FPZkF}GR)tOZm0%f8ue z-1`}KJ{rCf)u#&BCE!@(!XlpgSOQgHr|GEnpwfbV5i5aBzeyr7Gg2#QH2l!W;m96K^M5mwI!BlSPcKC=72ZvK?nqnbG>u+8=>S9*_NG4P*I(ywqL%QpM$t?>l%W zRwRbsi>|Kpd+|7#r};{7^9p4Npl!)&NoiI`Rvda;3KJ;+YCtAwgf2aK0*n|A)lNi8 zslE0*h0*sghDnHW&g)*Nc4`Tj`hEwQcZvjA3?9$Y%m#5-J2qebgKIT0iAV-n3!~vZ zcn){RC3x>0c!`AX4!od5?*(}O5K@|k9C>YrGrLpd)L>9mn?RMy)TP^7*7og@`2ULi zaeZ<5mM{0)*H13r20$3G><4MiX7Dxv5L{ne7KFf_E)XquD$l*e_Rs5A&-qinueB4B zx_wje@`D#v%UO$b}Fp{3bLIou1Hj*A=q#a z*6O$%ERAsDn#w0C;YK-^TAYihxtB&DUne44l!Rnt*%lD^G6#zshUgOIn8yL6Nu(!O z?(rU#)r%8mt?(u)f*?UC5(bV0i2w)4=4xA>1lDN@#a%z`VHaljm}v@e3Zrge`5tF! z)ZO%tzbev#9R8~^pcS*O7swZ(YwCpDFAJ$O!ucx8`Zwh-rakj5(R%~3x1u7-ZH_5L zNpKHi@Ahj(@6GJ@EQy%xLtvTS?mxV8b1FMKa-}JL%WO%hNc;ffcm~6p>-2fLATN`r zd7kEP?{{L-SgIaXv#ZdBdEF7c<);=O;ShPDkrJvrq^4<>#_3{vl`#YSqNsaPMNbt; z@x9TeQi_^8K4oIw6!bX*E zCE7mIGhx5gaz*1L!W$f|VayDv8i-o|9>x^Znt}|#1T3>0H6zK8XmA;4!$aV(#*2kV03$M@V6Kz zH(;5g`Qwffk|j3`(tL6JhKUXw9@89ewn0cphnsJYI~2X6$NYPa;>R6Aw=p71glGpG z|D6}u{|UvbE@w3C>sMcW1+GGvFmAMtDLFVeIQRfwq~K>v3^Bo^&^n1!qIJe;&$_!l vA9#;tdOy`86UF>oUw`Dp=FeWYhtI?3;q&nM)X)DP00960$fbMq0Nw`x{Tnqj literal 0 HcmV?d00001 diff --git a/stable/shlink/1.0.0/helm-values.md b/stable/shlink/1.0.0/helm-values.md new file mode 100644 index 00000000000..62d511ad324 --- /dev/null +++ b/stable/shlink/1.0.0/helm-values.md @@ -0,0 +1,49 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.ANONYMIZE_REMOTE_ADDR | bool | `true` | | +| env.DB_DRIVER | string | `"postgres"` | | +| env.DB_NAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | +| env.DB_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| env.DEFAULT_DOMAIN | string | `""` | | +| env.ENABLE_PERIODIC_VISIT_LOCATE | bool | `true` | | +| env.GEOLITE_LICENSE_KEY | string | `""` | | +| env.IS_HTTPS_ENABLED | bool | `true` | | +| env.PORT | int | `10153` | | +| envValueFrom.DB_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.DB_HOST.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.DB_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | +| envValueFrom.DB_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.REDIS_SERVERS.secretKeyRef.key | string | `"url"` | | +| envValueFrom.REDIS_SERVERS.secretKeyRef.name | string | `"rediscreds"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/shlink"` | | +| image.tag | string | `"v2.10.2@sha256:0c1e6af979733458024f143651f32fe63d3294b2320faccff864ba19a9b4b0b8"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql.enabled | bool | `true` | | +| postgresql.existingSecret | string | `"dbcreds"` | | +| postgresql.postgresqlDatabase | string | `"shlink"` | | +| postgresql.postgresqlUsername | string | `"shlink"` | | +| probes.liveness.path | string | `"/rest/health"` | | +| probes.readiness.path | string | `"/rest/health"` | | +| probes.startup.path | string | `"/rest/health"` | | +| redis.enabled | bool | `true` | | +| redis.existingSecret | string | `"rediscreds"` | | +| redis.redisUsername | string | `"default"` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `10153` | | +| service.main.ports.main.targetPort | int | `10153` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/shlink/1.0.0/ix_values.yaml b/stable/shlink/1.0.0/ix_values.yaml new file mode 100644 index 00000000000..ff851408a6e --- /dev/null +++ b/stable/shlink/1.0.0/ix_values.yaml @@ -0,0 +1,63 @@ +image: + repository: tccr.io/truecharts/shlink + pullPolicy: IfNotPresent + tag: v2.10.2@sha256:0c1e6af979733458024f143651f32fe63d3294b2320faccff864ba19a9b4b0b8 + +securityContext: + runAsNonRoot: false + readOnlyRootFilesystem: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + targetPort: 10153 + port: 10153 + +probes: + liveness: + path: "/rest/health" + readiness: + path: "/rest/health" + startup: + path: "/rest/health" + +env: + DEFAULT_DOMAIN: "" + GEOLITE_LICENSE_KEY: "" + ANONYMIZE_REMOTE_ADDR: true + ENABLE_PERIODIC_VISIT_LOCATE: true + IS_HTTPS_ENABLED: true + PORT: 10153 + DB_DRIVER: "postgres" + DB_USER: "{{ .Values.postgresql.postgresqlUsername }}" + DB_NAME: "{{ .Values.postgresql.postgresqlDatabase }}" + +envValueFrom: + DB_PASSWORD: + secretKeyRef: + name: dbcreds + key: postgresql-password + DB_HOST: + secretKeyRef: + name: dbcreds + key: plainhost + REDIS_SERVERS: + secretKeyRef: + name: rediscreds + key: url + +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: shlink + postgresqlDatabase: shlink + +redis: + enabled: true + existingSecret: "rediscreds" + redisUsername: "default" diff --git a/stable/shlink/1.0.0/questions.yaml b/stable/shlink/1.0.0/questions.yaml new file mode 100644 index 00000000000..3be229565ca --- /dev/null +++ b/stable/shlink/1.0.0/questions.yaml @@ -0,0 +1,2158 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: {} + +questions: + + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: DEFAULT_DOMAIN + label: "Default Domain" + description: "The default short domain used for this shlink instance. For example doma.in." + schema: + type: string + default: "" + - variable: GEOLITE_LICENSE_KEY + label: "GeoLite2 License Key" + description: "The license key used to download new GeoLite2 database files." + schema: + type: string + default: "" + - variable: ANONYMIZE_REMOTE_ADDR + label: "Anonymize Remote Address" + description: "Tells if IP addresses from visitors should be obfuscated before storing them in the database" + schema: + type: boolean + default: true + - variable: ENABLE_PERIODIC_VISIT_LOCATE + label: "Enable Periodic visit:locate" + description: "it schedules the visit:locate command to be run every hour inside the container using crontab" + schema: + type: boolean + default: true + - variable: IS_HTTPS_ENABLED + label: "Served over HTTPS" + description: "Tells if Shlink is served with https or not" + schema: + type: boolean + default: true + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10153 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 10153 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/shlink/1.0.0/security.md b/stable/shlink/1.0.0/security.md new file mode 100644 index 00000000000..35cc76e5216 --- /dev/null +++ b/stable/shlink/1.0.0/security.md @@ -0,0 +1,837 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: shlink/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |