From b4656c7ccd10ec3888722a951ba71b1df0e0e9a4 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Fri, 17 Dec 2021 22:09:56 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- stable/paperless-ng/1.0.0/CHANGELOG.md | 45 + stable/paperless-ng/1.0.0/CONFIG.md | 8 + stable/paperless-ng/1.0.0/Chart.lock | 12 + stable/paperless-ng/1.0.0/Chart.yaml | 35 + stable/paperless-ng/1.0.0/README.md | 39 + stable/paperless-ng/1.0.0/app-readme.md | 3 + .../1.0.0/charts/common-8.9.21.tgz | Bin 0 -> 38016 bytes .../1.0.0/charts/postgresql-6.0.31.tgz | Bin 0 -> 72408 bytes .../1.0.0/charts/redis-1.0.36.tgz | Bin 0 -> 65073 bytes stable/paperless-ng/1.0.0/helm-values.md | 61 + stable/paperless-ng/1.0.0/ix_values.yaml | 82 + stable/paperless-ng/1.0.0/questions.yaml | 2397 +++++++++++++++++ stable/paperless-ng/1.0.0/security.md | 1259 +++++++++ .../1.0.0/templates/_sercrets.tpl | 20 + .../paperless-ng/1.0.0/templates/common.yaml | 8 + stable/paperless-ng/1.0.0/values.yaml | 0 16 files changed, 3969 insertions(+) create mode 100644 stable/paperless-ng/1.0.0/CHANGELOG.md create mode 100644 stable/paperless-ng/1.0.0/CONFIG.md create mode 100644 stable/paperless-ng/1.0.0/Chart.lock create mode 100644 stable/paperless-ng/1.0.0/Chart.yaml create mode 100644 stable/paperless-ng/1.0.0/README.md create mode 100644 stable/paperless-ng/1.0.0/app-readme.md create mode 100644 stable/paperless-ng/1.0.0/charts/common-8.9.21.tgz create mode 100644 stable/paperless-ng/1.0.0/charts/postgresql-6.0.31.tgz create mode 100644 stable/paperless-ng/1.0.0/charts/redis-1.0.36.tgz create mode 100644 stable/paperless-ng/1.0.0/helm-values.md create mode 100644 stable/paperless-ng/1.0.0/ix_values.yaml create mode 100644 stable/paperless-ng/1.0.0/questions.yaml create mode 100644 stable/paperless-ng/1.0.0/security.md create mode 100644 stable/paperless-ng/1.0.0/templates/_sercrets.tpl create mode 100644 stable/paperless-ng/1.0.0/templates/common.yaml create mode 100644 stable/paperless-ng/1.0.0/values.yaml diff --git a/stable/paperless-ng/1.0.0/CHANGELOG.md b/stable/paperless-ng/1.0.0/CHANGELOG.md new file mode 100644 index 00000000000..6ea31d2fcb0 --- /dev/null +++ b/stable/paperless-ng/1.0.0/CHANGELOG.md @@ -0,0 +1,45 @@ +# Changelog
+ + + +### [paperless-ng-1.0.0](https://github.com/truecharts/apps/compare/paperless-ng-0.0.4...paperless-ng-1.0.0) (2021-12-17) + +#### Feat + +* move to official image ([#1552](https://github.com/truecharts/apps/issues/1552)) + + + + +### [paperless-ng-0.0.4](https://github.com/truecharts/apps/compare/paperless-ng-0.0.3...paperless-ng-0.0.4) (2021-12-17) + +#### Chore + +* App-Icon Organization ([#1539](https://github.com/truecharts/apps/issues/1539)) + +#### Fix + +* app needs r/w access to rootfs ([#1549](https://github.com/truecharts/apps/issues/1549)) + + + + +### [paperless-ng-0.0.3](https://github.com/truecharts/apps/compare/paperless-ng-0.0.2...paperless-ng-0.0.3) (2021-12-14) + +#### Chore + +* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535)) + + + + +### [paperless-ng-0.0.2](https://github.com/truecharts/apps/compare/paperless-ng-0.0.1...paperless-ng-0.0.2) (2021-12-13) + +#### Chore + +* move incubator apps to stable and bump everything + + + + +### paperless-ng-0.0.1 (2021-12-12) diff --git a/stable/paperless-ng/1.0.0/CONFIG.md b/stable/paperless-ng/1.0.0/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/stable/paperless-ng/1.0.0/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/paperless-ng/1.0.0/Chart.lock b/stable/paperless-ng/1.0.0/Chart.lock new file mode 100644 index 00000000000..910f97a62af --- /dev/null +++ b/stable/paperless-ng/1.0.0/Chart.lock @@ -0,0 +1,12 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.21 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.31 +- name: redis + repository: https://truecharts.org + version: 1.0.36 +digest: sha256:ce264f1b19b953fe7cdf2de2be52ae7b15eb76103f8a5db918f1ba9e3c5f538c +generated: "2021-12-17T22:06:26.74181741Z" diff --git a/stable/paperless-ng/1.0.0/Chart.yaml b/stable/paperless-ng/1.0.0/Chart.yaml new file mode 100644 index 00000000000..11e1ecd63e8 --- /dev/null +++ b/stable/paperless-ng/1.0.0/Chart.yaml @@ -0,0 +1,35 @@ +apiVersion: v2 +kubeVersion: ">=1.16.0-0" +name: paperless-ng +version: 1.0.0 +appVersion: "1.5.0" +description: Paperless-ng is an application by Daniel Quinn and contributors that indexes your scanned documents. +type: application +deprecated: false +home: https://github.com/truecharts/apps/tree/master/charts/stable/paperless-ng +icon: https://truecharts.org/_static/img/appicons/paperless-ng-icon.png +keywords: + - paperless-ng +sources: + - https://hub.docker.com/r/linuxserver/paperless-ng +dependencies: +- name: common + repository: https://truecharts.org + version: 8.9.21 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.31 +- condition: redis.enabled + name: redis + repository: https://truecharts.org + version: 1.0.36 +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +annotations: + truecharts.org/catagories: | + - incubator + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/paperless-ng/1.0.0/README.md b/stable/paperless-ng/1.0.0/README.md new file mode 100644 index 00000000000..29930f4a309 --- /dev/null +++ b/stable/paperless-ng/1.0.0/README.md @@ -0,0 +1,39 @@ +# Introduction + +Paperless-ng is an application by Daniel Quinn and contributors that indexes your scanned documents. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.31 | +| https://truecharts.org | common | 8.9.21 | +| https://truecharts.org | redis | 1.0.36 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/paperless-ng/1.0.0/app-readme.md b/stable/paperless-ng/1.0.0/app-readme.md new file mode 100644 index 00000000000..da367af3317 --- /dev/null +++ b/stable/paperless-ng/1.0.0/app-readme.md @@ -0,0 +1,3 @@ +Paperless-ng is an application by Daniel Quinn and contributors that indexes your scanned documents. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/paperless-ng/1.0.0/charts/common-8.9.21.tgz b/stable/paperless-ng/1.0.0/charts/common-8.9.21.tgz new file mode 100644 index 0000000000000000000000000000000000000000..aa4eb2a0381ab703afffb0c640d71bdac73f8708 GIT binary patch literal 38016 zcmV)mK%T!JiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYeciT3yFus55Q{Z9JU+v!L)w1m9ZuYsZleRgVI6kqH{_fqo z$AL&l!kQvjf|8?k^WC3=R{|hNQGRRMnrFAMNMJAk27{TwU?wDs1xdQcbC~6wHC)7h zx%;Qr>-9#%A^*46>$(5-Mtl9g^oRZZ{e!)OVSn(KUVkt=82knF?g5w5v!pr9{?fa3 zTW;rmCl5^VN0d=ak}+5fS};xZ&lu*2=B)_PFvDri-~F&mLiQJk@g#%U8cazB&a)-r z1VmeNvOr@n&-0XyyWJVi=gUbaB#UmIEm6qJbYYs(Zk{33T|kkBp=(yDeMPseD!nDm_wAw&6bGe)# z-PLdZ_M+eEk2<|}@7vY_;v|PSK^X^z77)i{fRictuL5v~WV03k31s~>1^|F%78mF{ z6-04~LB3AWSfSTiDO?Ua&pU&D>w)H9uKyK`mx$gI1E^j9{oY`2FmTuZ!Cvoi{XfL> z1hm`WU5b*Arze1>D8y47f{-LrJX>avt@YLu@Lv&{!eyMZ!eo`idFe>53{{pb5|I2nd$KO7xQC%tgcdp_Me?Cp*A2Yob&_WGk} zI)De!=x{O|>`$JD!^6p5uQ3McGLAt?VjQkpfd4w>KgQto^n~Q68KSI1Ee`ExoS`3= zFpIVw^(&mA8LL=5?gi|IL#|;qfMyQ#s^95#2E9SQ_q;#U;~gFB9Sr)D!-LV`bJ(8@ z55v*$aJn~{hR>r(bT~PD-XHa!KOgmb(_Sm@ zGpuT6vESQ|_J(^s6di>9Xt*~;QU5TSME(B3!Q^0s!pUeF?j4N!{k=&z>_>aU2oCmo z;jlM=!^8dk25nc5?ooUN*Hn&cNFqd0wnEvqBU{w09$QwXEx|V&UZYAQh!zR&b^3!& zPqTA~~;{b7HC!qGu* zIvotc5bYf{Ykw;;hH;7$wCzxfTGhjRB%n4NVF7Iu9CuuYoq-zHVek3=-t!@xOdxvR zJ3!Belm2utjRt5Cp;0)T4tjmKKY4!88}1+M4TgImJVcZJD4HCG(c~c9*z|UMm(YBc zA^OYqoLASZ;k^a)rrcN8XadjP=Z2krLB75I0UAd8a5{+k2jTO>$zgbK@EkrL?nQ_F z{lWBLA07^d`+NH^gu}hP!~STr7w(Pr51;SDDB9a=)O^#SZp~scfpIZLCJ|C%o2m}w(Yhj}MUTToazl;k)=ybOrY6epNZ9MAyFnwXv)AH8`s z22&VQ)M_zREhBM^G7T3ca1tZAVAa=73&;=Am@98C7DZ9Ow5AUK{t?DF0)%U(6u^uj zn8swiKuP`#L=Y`VLQxJ#251g*G+o9NvCTm!UPWPR=P7;nsQKxHw z?CQ2!z^wHK(|ip6@lOF?>WY*skR13Y006FdiMRYu6PMd#Fb3CODtZ^g35vG?D=OT! zPd9AV?8wP-F+mw4^l4I=xm_*<`iDR71KBN)MC0#ODXR?8JkTu`fT&6i%eg^wUzxha>qAWy7&S;tyJS@t+MGKOxYm16r z9}5n~gk&5d7=~n-` zfrMsI3dji~5B3k6ItQj_V^c8B=TbnCvW<&PPQa2%=KOjJ5~izi@{J@?08=h@JOfYw z!W7I?x*W(iFoM~jr{joJbn1ojX^a2zjbjs_e(zfzD{QBlU0H76}p`K3xzpVgj~i!kRndPcp1s*gcGvTtHoWRK*Kax*s;{4 zxP9S@WS3$u()$HhdcYiIs8eTyDQa#cIjeL9b%jfslLh{_tdf%G48iG9&q2{AQ`io%%J6K}Sv zf)k?-uknEj*^KorCFwF2e1I~!F$Y&TpYu*jDR51eQYl`u>G>W3cm=t12f4&bktr`S zmW7fqTc?aVCTk@OJQGZeGh4=r(UeJuOdeta-4o7Hll6o|Yk>d^L)H&D{>GsXnBo|9 zS^`-uY@Z&To&Ego{mU^}tlKH1^onGW?Cx8L6M&Kx&Pc+g!WGOgrX z-4r$1UQ&fS$9spZaf!q($LJ-wO0HlQfuqyctTJ2T>J0L7IYC*1azs0rbR!bdZVu@s z?c#*-ly(Gj*oG+=LfGVVjahB0S#6`wDWRyHlBkW7DajV1EbHY*h8mv;)z_1EFJE1p z9KC%tmMY;Cqd0nxrs}tRa|-kMn6HCQLL$UQq195es^mXmGI|SBUSHH!2dV5!djZq7 z6b;*Qy_JfJ*Sc669CJnm(hQRf=W7tgkP2Zt!qX|r7)j@h9dqKI2qO&*=O|h-0a4XE zX4Ou36W|G;Ynr1)oAsp~W;n+ojFrS0$K;BtHP0jpD4AsemE+pdKQ&l*b;%~T9l>OV zGP0!Y0+A}{=rfy8oP#-`TmWTcpR)~6y--@q&vTSWA%}fB5nLWD;3Z<}91^^WselPp z43~gUa$EZWXEbL^<|k42Q_BFNw+7zOON0LhX7vEzsns^7q9SK+K}AcxT1<-Tv^1i8 z^vvo?QA?!`^77Q730N4ne5RSO67CJLx&51E9z7EECio$gmqpF_i0;V-W8sA~E1~|d_u_{fu z&|3!0{<;%34vgT=bx9-e;A_$OU^+tjMsRwUX#t#Jmg@a)V zeN`NN#1`0=kY(-j56gfpw2Dvc(dpga`x9`nejV^;qw2V?9YWF!fKRylkdvU6AetcRq@Ola$`04!oRJMSr;N?ma z9cB5GXr0m8qBx&hn1ic14u!#UirLa2#v5BW|CRy+ELb2);Y?f9z*UCx93>sq zoRAai#Ka77^G%41k8POZF4I+G0;4ulX&g{warx{qR0TOFZLWxbFm z);|4o1K=YM3R0(nQ6voh3{B3r4Hb^5k`ym+3^QfY|CW*Dw+hTgtjGKW8YiW_tbF(* zYk0P_qV8LGsm?(7?t>Q$O?4c*!}kcBh)sh&W7`ooz2{-4)7dqcGe62;JH$dbyubwX z6_{s+VUiz~kR)CgpLs2qU80ETyAlNfTK*_uZMj?sOX+et#h(RuwYQ0>!_*oG+X2o4 zQtv|YAWQ57>Qqaf96G*AswZsYm0#aUyCFEki!??%ZwQPgFosEpvfXEZ{rq13e5UN3 zuTP(W6B40QlI6xmuD=Siiq~7M!ndo^yGwT9G$Sk4=?W(lu>maLnh|z}ep%v7utM+2 zzQ^J0hG^Z$?X0>>5>!oZV(VnOv`reYr0El+B+G$utRh*%CXs?wD+b8dmN5S{XvE+_ z9O{i35aa0v18UR-B^DK|Xd^pH6;)U8qYXTXkHrRtWWc#0PZA?u$&f0Tk|phO5DE8q zEb5RfA3J5)Drf!3Nl4<3@$GDxau~*G@+T&he|jeVJ!5~IAD>FGjifubm>L=aPH2u` z1jy8Ahn4=6@+SCfbl42bGkZ2dkz9J}#Gi_(GdCZuloYrZSiAIK-9M4LfIO>KLWsF* z@L5v3g|!1wbEIy2N~8~j7-W7-$~suAG==H7Bt}Vp3&!j=OHtgmUCqJ7XM=G`;EuHP zkAJp|Rx5=&S*D3}R}{UScqidhi+9R9rMY;ghQMN{+OMaUm&&TQmG2~&DqgBuxp(?6+*XXiK{f z6*a|2+1@Fi1{|-8akWlhHLk_F*r6!p&X&6tIt)j$%mH^jk!SJ?)jCR|_L9n7aq5n( zn7ID&^K#D_SsEsxGhZyyRNmlB_^y?Ju)mCC}9cs~WFPt$*W;pp=Q8bTf8;0EJ zmMx&*cdjhlv6`WjNI9U~J*f$!djj4I;M8*n3)t zvK&vjbyzbQ!0(bAqb#@1er)o8qA1Nr#ICrRGFqWI8{ry3_=9wpl6M=}4pgue)(0fK zi`X_NuxD@al{BxG^PU3??wEqqJL7S;IM$UQ`thNCiInh)p`qmT2H;YSDqx}u%L9VIA)ZX z#_06p@iY17Pp8j7x(c5Gv`F*yOPoEEd)>2QwLRne6q9`zd59x&;~*hjnHtrUWTC$I zn)18NtS`pU|BU09OFdj=O4d3cK_>Nap~*2gC;CpEhW|4+8RSIlQ{up%#LERz%9?!^ zs|MI~IserCD?{gkOfT{|x)9a>_UV}{D&4?Y$#2`=%H5NiElrlWy-LLUw+tiEAV*GI zY5-4wbV)R3P8#L#)C5}`5cBFN;{G#jlEl)mp&V{Y40%h-hG?(euyK}?49*ZZ*4H5l zMr{G$h8&9c?aEK>PtQQKPT&HEOd=B(ve{r_szxmGRO8Y|`+t5o`}EB6+0Y|HJ#7-<%gIe0dj^{C;?RTN_47Rf0=O8EsDU7fyOQ;O#wPt#_=wB#2d0Q!t6r_eBlc=4>5bm@+wzq5sB zX(z@>k1BM`VDQG*WSO-&NCSrt(v%mHaLB!djzAOGn}J$Omr=}e?CV53g$?r8b{R&w(%fZ93@na4aNUPWAOa>^B=JWE{qC< zD=~s18Iu+F9zGs}Wl9q8Y0iYPWx^&G#_=b~xL85=_VKaSOVsA0D1%ML9A->j$*&Mf z0E|sH_Lecq+YGWES>9fRv)y|CK88XxwnZMTz=_RIVeWGMuBhxW$ShEVm)v?8i2M3M zv714VFVZOmJMWL)wkI&WWb>qNR_v-3BY|q~Gcm;qFq>&sm+CVgxhL`Od{v2tZC1k% zrOxobk@)yMZ~dbfu}@%%V9u7wOx}{0z*)n;gi{^BpqfyAq_GAiRp^+|RV2s;MJp;!?%=)QkrP>i% zZJ2z8o2j%i-JeUu(xSl1loh^?J`|DU5}}nL*s9}2u8gE8TVP7LZZCZK!#TN1L?DRy zf(UY;C_gOVVm5eb+4>Z~w{kxUsv>@gN+DnU@GoAcq=LNixq`DKz7 zE}Oq0I9;w{4FAbzn9Sm!9(Iy}~|fU9` z{9@f!Q8p^*N*!A@AuUx_otAE*FYA=4>>X*C&6Vdun$5K+ym_K!>kVhwh59(dRSYUB7?gH~J^}5Mvskxh8Cj;?#k#GFv^JQ$jX>3s%8J9lPll%j zP9nU*(GtdNW-f)<0f~qqG>1uuIxR86+<2~{q){2^il15YpjD>k$lmgorV%)>tiS>P zE-bfPb$apyyvqPTHUKfExe-Q{DPPO9)Qa(1o8j|0Iun0y(f;5^EPh#M9N`?nv@PGY zxs#t9^%F)H!UE3*JR}LtGl+Ru(ycZz5fBR}vo>0ZWB4wl6weYKCWPs|-6si8j36#w z?Y7vjGwUjrL3b3uDfi}I8#sx8k6VXJYJ!?-tqqf?4U-(V)tlXx`pbi4PErz++4?MH zOY-=Zn5w&#{7R*`SE(9kQ{F6FK+a=!B;@nYKkDmeAuoKQG9AB3F5^2Q0hgE`|c`TP`c z`55R%oM@0tK0k^vq)0oyNU04ad4|Q?F3Q8M@MmMAm8OjCzdlutkfM+Z*>)$Px?mKw zB?9f7a2iB;*ycF28OP&)wxPhhyW2AQq30E+V-WP84?6wPVW;2e_j-a0XiNnsYlA?! zw1s35sCQRaR~_qp%QA|otG(*jih`~P_f0DTJat<7Ht@Iwo`9bbSkfho<2A@oNEQo} zMBMkl2&+&;!jLtE<23;>f-8B=f#0uZBp+h3qzrO6C)n^5VtYtO+{%YBB>*REFW@&k z=8WM};Y&n8woI4`Z3JVJaUElv=P_cSH6qUdU50bk_*#-eF0A@tR9hyZ zuVNIZB#y}y4|)3p#Ee}$12Fp6lIFsZ9#W7X#?xW87J)=%v{Rv8WbqnIGVXc~r#Z^N zx5XHL+u@oKNq#BUffLcX>DSf%FGAX8Rm{p6W8d|5W6L&r0n1&w6D%pj&SY{-J< zU7Y$%bD~`JZBf}^p?ivhg9s%#hQfnN1|n2;9oE>Hbpf5Px;EU^Fqj}KZBQ!4t*~p8 zXKGADfXltVM4>;Bi{pB-F?;*yGtiaYm#wtzN|2qr?`86S2N446%b5rW} z#?+EIm5o=>^6U*N^=)}~FjJ5TuFT~=;Z-EubHBb_!$7*po>3&1D+j>JmPt|`iGpY0 zA}NQ*ieqy;n5=6;*P8IP+4DZwgqel!CfvfPf3Hl#8aty=nP7&?e*k7Pj-kHu#WXg| zNKe_D+T1E4LV`z_yRJjiRV*g*4t-8Qnu$iN$xwho9;8-ujOVG*=9zXIE;WB?gM=go z7jO|Uz68>pw%b`z)}rY$X^JjV%>f+!In4FEGU0*k|8tbsDCaVBGbr+daJNz6VhPh! z1#A_|LS4jUY$t_toly;EG&g9Pp-8xl$7>NhS8)soe#E(vrHCp#?_4|A0uQh9J)~$fY@>vY zVC2^Bh+yIq!UNW;b;g87?jFl^JK5$XVp{qoqKuA0Cc>$3Ax7(>H5Z3h%F$KY1?7Td zZ~VOxk$8nnk3Oe7IR{o|-&7>h(>xe~PdK{BDEy>&v4zr^Op&03KIami$qtLa6@?$Q zyFqj|?#On)9?ozKYS&K2PH-0`q?+MX%FMecGzR^_-k@*1^nu6pv1O_MPamK z6nOIFUZPTPz!{p3>k=N^AS#8`fcc|{QUUfx{oa9~10&=@i4GDSyh_y$#iPtLLe(-vY5<- z*@w2J!_tq}?I3+=Tnag? zLif84E8x}FWyg)|0=@0lg-%Lstc#2+842*$iB77)GhAHZe9mQ#Qxe_T+E6&utqqOm zeW(!{_+2iJA|d)s7Kf88{Jv}qPoA`7G+A04y@_DD{O%1C%0!b4gDE%RCbhytB?3Iovo z!nR=c6;DCuqmUYm+`Apgc4R?O^yxf>{7&xpg-Wiep^DRUmB2Ls9lNGbUYl3`@}<>o zw_7m9QkfY81H0~OFhM!&w=QuKjX}kVYAsL>h0~Anlf1qzI>FJCTAN1H#Y}u>82t(o z%y@VXhODZJHqVWikkQD7(cOd*>k>*L^Ji@jYZ6M|u#=18meDQx*#IxAtLjHv zavJsbZ_RYSqNlw7!#KXhUhjK0?Ek&}LC@a*`@{ah-yih% zob|uIH`;q#{}1u-_5Yr)WG57yUJNQ|mGUbQY@l)hYx=2L#v;_Y5fcv@ZCEQWgUJkm zr>w#=@U*y`Gk&3kgyN+w+!Uots)7{xbpZj10X3RvfBDkVrMusWI6%gEn;Ac;6wXdu zHQ@tPG$;>1+;%$_qyk5YzO zxlQgmL+CO_e(Ge-NdTVK%4LRF_B&*qe~72d|8;b`hvNT(!N`^W_J_T}BmaMhr`G<% zn3`yR`9Z5nt~<7r^2j7u33f$e_6G$+|w z2JkRcc%waESpit5!{SKrH0E!Nsi~Wsj;i~{Ggl)4UeUD#Zx9RsrQxn>&Nt*8HVk%? zhxVjfW1o`fs66I1pSC9s;X@u}7pZDi!T7;O7s;dolSna)b?0 zU}M5MV{aNj@f?R0qx~q1J_@6MB4M;F|0y5xyE_BiDF5x1>_5GO{YUxlAs%krHtqkf zp!Rx;w16ZoBoS5m<=ue>h^?T_gAkRtG^=N3Y)+DY*_pi9G|^EQt_I~mV6;L zklX=j8S|z1!0qxoE}Kz^%A}P6c)Gh=XZ^P^-)Q@9-^}>0r_XM$so}q<4(yiYbTT&j z`5Abc$Ho-6LztIYJf4D%PNrpkl>M@fP{uF74p4&FH>>tHs{jOfEIJjT&%hq%676g{ zmhrV&YLd5F2XP}tj@(n4!D0-3#88L%<|81KNP)?A8d7;Io}z@FOM@uy;HN=S$` zZo4h2HC|fr99V`ZQ;NnfKoB&+z1*gQJ!g7zNdJ!3Ma4i3;cn48H5pFtBtkD7ezmbD z>f}_`w;VS$%uBSUo-X_<@8y<(+W`KoE@EZ*PhR{vB{2@ycOnID^8Xl(MvnY9+Uq^a ze-H9-```B^8{dgZ1UgLS9O`>tlJn~<_&k(SwQ)}pRm$N7dbJr|s5aRt{wNKB!surq zWf=#H%e)wc|Tw=nc=XH!(_WlEwm!<10lS)*))(QZR|QG?+wmElUuoxuiU zs;ws_Gso?W9OjdKKUoB>=%PP`c;NrPT z6CN|z7Nx!Dtdp0;VP^ zKKrk7UNpD19;g6X_`BCTjjux60ln;_&V!H~g&|ocxl?xPJJj(F)D)m!d}TQe2F?*{ zwH|L4ER6z?-la@{*wmoq)K$}7QSLU)8F9G-P~W0ew6;wPO!YCJi;Otgt3Y+vHG6Qv zDba5U>udtUD!MEc<`*d&mX*}kxV*OXbwI@;F=$qXX)0Ktr+HyADns+E>gpxiNlBK& zxDu})jy8m%n1pAY@Wq7iJo8AWD z`=0+WC|!jc4}jE(!Rg0i)4XbCJ}=uSS!umH?x0`5j&=~?=t5A1ne#9u+_TBB1`89i45s;>#ONz>9Oa1HE~6EmO^qBzt6JFF-?PN6%P@JK z8TOg~p-kP?22Kf(N#wVizVC4o;bitWi`zAmkr>H9FfheGW@MSxjC@N4g)!I7)<+^s z!5mndZ3*wpvUYGJHvqNmBPZrGin=s~q4fTIk75KV>YS+89=BTm;3`~;GM;fAR7x_x zKRvO${|jCGE+v2s`+sl0=brx#5BmMb{r@2zx&I?@=E;aCH}UGNTG?$po3ZBE0`PCc zr-irtyA=MiMCA=k+NBta;t9rHO7!ZM{U1$z@vVQ(Xdll1cQEXg&i{I&$MydpPs#qH zk|o{H-lGl4bq>HP2zyiiUlsY?umGu7j(?pZ-U|OZ`Ps1DC^$EX_o3=mMEfXwgso71g)({A?MXpXywiTEx1EDC@jE&lE{+a`vpDMc3JL z12LAIJv9#ZlTk8R~^FrBnXP4;6jM?>igJmM{>JMsnE^VD9MPj!KljQcXc0I-f zr;(D)#%t?obn*I*6%fz*FFYgeNC()k{)c;mzAOJ9j7E>^{~?|m#D6%G1aj9Ape&ah zS>)+Ti|TS|=`Wcu@~N2JmeJ40SnL22Mkl@^6Y^a}kf;NEhrH-34FX}sF1Sr3h%KeO9W%)eNce(0Gi_kWWJlXBtll|y*8`6BbqLX7%2{d_XtKmXE;ai zxQEX!_!a!JBxV?xB5c0}+D_ZA9>%rdtiZWL@xQJ1oF zB(aGMW-*z-H~>#ezO#Q6Q~Yo8l;nTmj^8z|XLK)&+ZH#`2sX+8gT530W6&QA4<6yDgu4JI@>(b=toRk-|9L*;&9VPW_jEj7K-D*Zl&!D( z9XLu;#t+<7t3?h$X~Kt5ghle@WA#ag`?!`-!etFlULY6WjxH^BuW3dWe2cU$z8Ekq z`=+)B8$B%}7w|^g<{*^-mJF-i@4#z`yExRak{K(jD_W%a+UmVLA#Kui2WF9Bsj!AS zw*U(GWv5YJ4~#jL^~9F0=2HB!r%#sHssqBW?M%nhs+dIyx_$~xM`d~a<`S*-VTz>O z00eoqL;(nRQt?xm&jS#&*=wF@DF~M|CyM|CD+4!)!EW7@=bZk)*dWu24$e>)lHVJ$ zK5!gOcv82xcm|%%3C+#eQ4%`Or(Jo*w<9zPUb!Q(1^0Fh>Xg(f`l81pV0Z+&GrJWB zX-(I{#_&#cYrzQabc?l6_4jWr2mM)}hVs9ZFK%`qu*v`D;9%s+|NY*h{Qn@2KL4{s z1UGTDJO{)HMOp1ZV4XzFmbpxMsK2*(mg_MHEQ6u?`kH<0WGE#R=OkN$FJHzr1#>t9 zU%mta=IJtyMKBJ>8fn)_bun(xE@xS{GOWv=(rvoeLdj~}GPVbqle>P?QH5ONv#Kpj zNctC7nndBYVJ@-?OMWcVe4C#|ZOa&QZAE|4ChOpopP$GS=WE_nS5%*p%$PH8KJ}pL zpwf49z&j?YjvUI%XW;3I4`jLTm!1x<%uf1ELwuJXw-h9U3PC~YY@fB$P;MzTaMaR_ zA3oaDqf zKoMs1Elzj*7WaqPA-0zF#75`|1q-6h=L}&~K z`y;jqJJYiT^w-$^ZL2>|#xfes&GpE-3d;*bk6^7hx{KJBa{N1 zOmTwq^=72+*hq7a&u0FwJ9XpBARG99?_l3!|9QOs@gPr?|Cbrb_aU9XilDyLu3x24 z!G6at-GzJc`toga_w4gkj7_b_*H*%K)%sU)pSk=eqpRMR{5Kr-OY49182|l29xear zsN!P2x3u}{z~V;u?CJ&V3qxLMvOVSy-@^3f_q5uoLCa>lmBm)It5ILWMLY(-iW42K zxGM>8p6BUB%)S0DQhu8Fym#1>A7@z_+8@OiF6)~2L8drHqLbZxk#_ZW-mw4nm^->L zxx`8y3S*3tTmfHZv7IN?y{ZvrFhz3dmu^^8w>P83U59^>$%US!j&rpkhdB;y_^gg_ z7;`Q-#3Y3AoX}jqb+5eu)|jsy_FP<~FrQysNL_>d;0i;<6@ovR38NAJzhC`-F!1RA zkNKY-<|*_4+v@-3R#4XeH7EAy|LWTY{ogLuME|#I+*1GFLa8_Qx!w#fxG|jJ;wign5WAAV3C8MZ@p|jaey(NW z_P73YKUVj3)z8`K@BPBxjkVX!{Qs8DKMm~vdxMhx*Bd9 zkovYsta`1JUj`&aiO8jT<5a8#2;dh`bYoXIL$f8!Zk74f1mbD1)kxx4rHPU?JeY`2 zKj2tKy8g48yB{CtspJ208FViMnckcJ-#-|-^50lRERUK4t57covM?9WrY`EWsVX1~f$)Fr0-(D-HB52*0#-fpe$(_04i zQGKO%9n9x(ulc&3M*RPN<3H>jj9mWT@9#hA{}1w%?tk9)_}9ZFi_>5E(RcVOKW#Ys zwMsQP`n4+DF4)5sj^FCd*?*s1ynXlb!<$!IoEo#y`+Xi5Gy1u!vtl_4_kT=Wamc{h zzr=BTc7^kBZnyTs>-VpIK6>-UY%O?q5*S6^zx#0h>Y{Iz=pPI^{ZXga>2>>qz@O+^ z3}yvUd=}1lCn9S-y?A}P8rqnNX0NZgxFw_54t(QMG39zn`~%{{U{q9ps=mv-`gAoC zDQR>G?@9cIzE#710l6@lFPRtGy46TjD9thk__zl&{J%8 zNm0g^`)+-?6jFLcvPg^!N>)E)WFdSNgd8W6go4ePIUSp<;_(LZWq%06>%sKXDGVAN zI)@pGI=Y}5MuCj@T76N}v3Xe2q%9>S{|hGUsG3du9az~IuTX+0JhjRu z(8|3zR5X(R?l=BNZ`2=@{J$UL|31uf5Ai=--LZXN*+HM0?53$__tPrR?vJM@7e^n? ze;SL3>dv;(gylA4x4(kPXo!;V>u__bTmRZFeM<}A#`Qlc`~N=r|2)i7W&itG&HbHN z042+)=NrZ`h~K(b;B-s-o;KN)+#?-KEL-31Jy`gRJ~zJ8b*J;+aQ)xP0<_8gGuqpC z?LWiOWBjiNdG!8YEUw#HfV``xumS1MJ}Z#^xWNwOlxt!Ma;j`&3)&wYI@TcZ=GOM0 zLMb_Wb$ayv==|M#%VO}K!K2BjY%=;?+Km4G`puiOpI@IJ|76WDcLS_6pA5PA#I_sV zi!Ei?(3Udv+fvG%ym>7{CW@7%mm}gKP8Zyb%toLU!)ZEiklK*75|GT*Nubxf*9|x}d*FWg(J?eiC^3>*k zg--TY7%M0Iw=lia+^;IhgcCkMvfSx1j#Yk;%{J(^d#B+oOjYdylu@dbW42>oVkqP( znGwI^&vRj3$v3}u%6B5{mS5E5`u8{mVFRx-Hi1QnvXV`hCS1P4W$c@r}Xe#@V8Uf$;=;mc;!9B zl_X#X=-d67ZESwzuQ#s-C^P|!vo`xyZHqNTNNj#*a< zfuI6Zp?Txa?QdA0s-Tops%s{LKcna^j-nV{!Ax+3z>k}_!TEz*L9JWIqr?F$vP26& zr8X@l!CJJEP;=;IL|<5zhi8BjaVNLczhDPY_O;!8KF>ur07(k0-1a7SEm4# z)SDpBAe!P!-RFXuI+%1bvdno}uRL3)1SdHS4A(bmd@$2WU7-m-h*8%6rp*}hESoWB zzH~}augPtpx~UBP=4p%GGwU}q_pLQL)%%~t{fu2HS5uqErEq*cYL8n#>&fHvSs zOvgsXehoxdmWfUaLION+64OvSTru_J{kMV(7RVPcX$WIg+b-8grSR&J zY3=;F7EzS)M0>G#p_zt$r6t~^jE{+tQI-F;BxMgy7UhaDPu0l?A9Eg2(o6Uzt!uvE zd}p=Kc{-@;>w*)WW@w5(2Ld?z>;qfE41fs?FHsVWt(TjT04hhbThZL0)IgW&0-n;j zTor(1xtO3#R47r`Hz>c*7-*5accz$h9RQ#Es2oMD8@y4-D~~bR0rQ982y~#9KB0I z6mZvhL&UP2D*%r~gAC<`<|O0pg@#^5@xQGGo4EaAQ|CoQxIkG+d|bS=DR0$XPzR}`@a&4@B93(chEm@_y5Q9zlVCZ z-v8Bs%6;tklH_W4eN#QW&5rM?nOp7lEmIl&t+srt{qinueyxP$N-%U4a&6PFit`{= z2GcZVM;;zor&O}m-JDK|KX!L(eM=-oR!9KmFx=Lx>acQmQ&fAR^Sy3^EQuJ`I=0x3 zHNKrRBRL64Y){252!1+0KRwe1(|UWU8g`Megwk-1*f`DeJf%Jh<7Uz1MuyTIk_kyw zky~&aFKLdl*QdcQ*b(7s)W==9kBXexx?p)aLiI_M*FUX&)hTp+ZC(dg#y$(RSD$l~ zC6J#t2PP_MR!QP*d#W}~ zMpZW`qKvm4O+}tTQO0>`3$(rp^+1Iuo)@(ER5dDoI8BD6lA|C^?9?WZ*QeWh(UrQL zE+;Xj^AnOYHDY}fMT{RRlBoJ>jcz>%t8u=MIre(C2R$>);MUG)q0C;Hxv;p6*|KJK zOp~U_l4P4ZJH<<5hj?mU=hnHY%#xBG+nSdYfR(w3G{Ca+TY8)=B_hWE= zeA@C^fQu4E=RL@}$0%M1RvSfyLOSq_&kh&OELM9$B5qw~o0G7zh#iU}m&lL1ySkI= zmC*(D%Gf#mI=hdi#c_LrDtD#bs?Tg2*_CTOMqy5}v5!NDPZg`w{w&vIwLfar+B9dV zTJF-Vy{Q+&s%-Wf_R~rs@>LRvbLzVmBTGX=mlKNAMH{FYkG>;_Q}2$bwqAqRY{_lv z_>E}V0J=a$zsGY5W^&jwk4~!BkpF=5Pk6TSdw4e5e=dZIb{i|uru#p8CI9b(gZ;<* z-w*O|`_FrnFSA4@+u$lEX9dFMBV%~mcAv(!99P3P%omaYopKH}ej%)?#dkkn>sWlP zUB}oQuWKEb!ERWvuWC>1ipbwRuoI)ihP7+5J%0IlM;T>Kh+x~?Ql=1O!>i0t{~LTm z|2OzQfp$k=J59C2YKACd$->ET)0o*EcE-$hnr1ZuHCek_{1PUJ0HQME@AKoJImwYzx|KY*@sC55x z^mzXNAdioO>x;i){)58gZQRBe-$41Az9bq$yu7~S`yqAa=ZCu_ajmY?2-|;zK9?>L z?QkyUzLk8;fWp1@7%zXy)Wi#%21Orb=Z3>Qqu){;W>vWD)+i72Ie*_R-pPg?Q2Mx@ z_rbD9us5!LaBcdN&N9~vR1pDteV)dqroeOr-oqDQr|?o_g`QS=Tk`UL7|u6WwRB3` zLt5borjRfBJ{Cjz0_=$0M-UVoJ^>r_-Th6vv}{kLMQ$?$mum+P0W!uTuidK9v! z^5j4)-#H1~^YduSpF^d5I+eB6om+z_G{^K*_Y;e^InL=!u#zGAiaB80?RIPX zfB*uZ>pDOt3JJ#mZP}i+x4jr!%QeTgo;lx? z$G8|g>)SGmOE(^6mxu@7e7l z|B7dm|8IZLcjf=V;4%OIgFHU@A7!}}yjOX<=!-3lon7?SY==WZS^g7=BP-IS;m1=| z*!GX{C7+S5Fy6aDfmNug5yxv*-5#neUfd}tw?R$#$ky-T_DZ*6dYM{D6Nq0YuPVpKGyoukd3UZfeKD9H=& z|F)?zsvlxJT|Q|YjI``&5X>E1qBS7aG}I5gu_t_WLkR){J4R-D@Aqv+#fWYiDY0p7 zKUBtM_tlNn4TolnrL31IzzM*gkBhIgcH9bz_j%~+m$qNKwtrjgfF13U>kePX7&b!; z+15T@Z_`jpQ$Nc{f^6(rh$Ksxr zdBHj@b~2eNgJ8W_(FsoG(t(Ia_M^mpj{TAO!qY9N!&R$ zD;e!}RQqbB8i1U8i;mz63?D|ArWr{y%!HT1?#JEj+~~Di^~wzER&+{Sj}0Wt!O5({ z7!oGkRX?!p+Y~KUC_5&Ll*ixuYroTf9(b&A8%MNbhjNe@Oi&K3CcUbrVEA(sUh2W1 zxoB^_-Eb7aKHJV&Z?i60QSx@{M^N56$dyGkfad zgyt{_k=--X&Fqo8{!yPg{x3-9-s8Uv4-Q=Ue>Chp`hPsg!}-*!&nc8SR{2#9G8N%l z7#UQuCzG)lt^y+d(TV9r;oed)Ts=NIQIjm64iBgoU`O9=_Iy@qgZO0ma_m;#8!5CB zzCCchr(01FEw>O))BL2fgz zJCik^;+H39tSnAuJVE1br}cUYGO+^)AToz1mDIrBVVMhfg20k8JSl)2d5LX3$rMgP z2H7OFenp=29%2f9kclAfh}KHr%Jfz$;?SJx-DbM8Gvm4SD%-QrPJ~O2ORZZ1v&{R3 zKdqj7c}dO^4V>Fx5)*%!QUi9SA}%}kTDM^|yc4Xwu z$y}}(QHo1v8Pt zNs6*~4MNC>LJ^7DGf9$XB#u$W1Hfz|5MBCwoq7x@Mm{=OPWsJ9D2>T_p^su6Q_#!O z=W9ERP&HtP79^pl0xti0hPDPvbC{#)GUkANkk4cRAMAF`wb~p&u!1p;fZOKIH*`0s z!pO&!D>rC1uYsV+{{TUU|5x9C3BdH1DA}~-{Sqa`DlND`hjD>M3&CWG;@-{eIE0e_ z>g0cl^5yNbe{MeiI~bPYKMseF=YJ3Kcu1B{yW#oW{SLfE*-Wg1n1nEvTcC85P^yEB z_9(td&P%~}-NF&Up>uV=vIC5!j+Qx@p#)`Y<)wt?vkcK+Vvs^guSgbAet#UH2t{?U zBb1^fLP?1E4HX5ZgOh)8Yf4?K8HzByRf8NtqqY_>!!VlMsx=A2ZLg8xrf&VK0Fd`< z{~Zht`tJGvXw-X*|M4IXmu_ygy#4#$suY9O5E3OQOOufhiv%^1biJ#swWKKXRM{a5 zoEI9OsObhkU$9~CV2o)sb**=YAH5!=b zwr87)q6T_17L_kj z9&62QvZ4$2e!^?l;o!xYk7?yj;WVa&-!kqx=tLzEl*A_Y(}PWYgRMz`*(iy5VcuY_ zttdrUBKlU|HCjMSV5MU3s#wm-UvvZL{_i&dt_cxvjfmw-u1@j@8Nrd~CL&?HjOI zqmk{|t6C@yYqehA`_$eUJ1xVz6ILq0de~^W!R=UR0l7K*e8tC+UpmDxnxP2rpk_E< zGfe?~&cW3jC8j)!<I$ka z`myTUEM1nrDXi0F&W1W`qa;Ten;N4BvN@c1dr&buDT&UU3G$4Jzhf_M3dNzgqcml2 zcyc?|shOS%50LGMuPEpneKmDp&;x^V-2I#5$8S0Rc=}<}(on^G(=U-54neEYe z789HZR}Nv$g>hU#*lM3PNtrIwg4{xqgfO@1+nRA>>OAX)C=@eTGA6TD@~_w6fRshC&vezTxwOMNt3m8Cv4zy{npxlgCGGqxU@ zt#&Te@rxS(aD$>Yf)KF|RCK%{5;lk`EcB39b>E_g7me#}(Vo*+n+R%K z^mb9N&kV0rjBpVU#o=`>2X$GYOs8PP1u5t75|LAN&deei*DlxrmpF-Db0a_zzQrzM zg4!uv6nz2uy}^)iOU)y_P^=)Ws@E@sykEgZq;_GWpVlHSzup|@^v2k3V;T(Aug?FE=WX7DoXA zTW>)Dr((a7P1)VpvLzTrfre7nS$)g6WM5XCCwDVqqF;dWPsNKgMyDT-123u|$hm)R zkgmcqeN@8x>2w3QIidL}%;$DU?hZxyDasa@CtRdw999J&yJ)bfZiyQ!3~C!G(5x(f zqjhS}+p0+Jf3Doo9&!R3BU;)gHsB`4Y6D`PNa&3)yuRJ_Ouzr1KKJfkFu5`<2&%J& zi*4NjH~9bV?HxGrp9lSe(PR9N2YG7qzvpx0WPoRH7G#;2JO=!WOhg)ZOhL9xS`#!S znYt&#FBiu#x1QHz4Ko~RY=ScavvEs{b&^=NtxYMnl@yf}!+OiGw)2dYMLgcMsU28|Yu~c6PrF7}Z&>o#GNd;EmUVW|M%a>MLhBtPGxCH=Sz?r=N zEqe~*6es94d*8`WN+`}rwgz9mj4KM|P-hjkrbI^IUnWQN14Y>w^!SUyAUzgRIe!b| zm|UHzPp@bQ1?8A!OaVcq&13?J`Wt{YIC}G@1we)ha&uuP%0;3vAKSBAWjeF@WaUIzZMw-}tyX=b-m=m$@y~QQ zu|LWe1%Ofs5B7H>EBz6ljq;zo1B|kp-vg&r^`4#B{2@ymN+Epr21na6Ie2ZlnXpUf@EsSqDHyAr~Ap6CTq=N zT2@xO>+2fXWRtFF;Rv&tWYz4iyTI=5aC7|@ss+j|gtbyDF`lAu9V+{U{&{=IIg{oR zq3kRWrHr8T=45<)TYMWEL%Th2gBU&F4LbIjHc+w}TRZmYkFQ@!dgInaYYEh7Th=lv z!2S6C-G|eQy9Id{(5`j#jh#v}WQJh$E{WIg3CWo(M%Oe)3oeOOR$)5M2}xKLP?EsT zMi=j29lgAGck<@HFW$dSHFH=)HO2o6g{$F2o>7xqkL2< zoT|DEb#GPk&_q@YRVq6Nar6Bq#LcqXB5u{)jJWeoPV29VX+#-Xpxgu+(X$81ZND&dzK6)5uA!>M>Ittp00U=T>*k=hbUR$ zj3f&-BFbURmnl;J@bhkztUT(}C0kY^(}1PEXqSnnm(B;h2%oM>3X^?WXAhHYfXdJ> zOPrwy1itQ35zvVrkC7=@z?7;Q02-mC)RCaaFT>Ekj42co^0ZvsKz_l~%ZhHc9rWGw z2{J`O6?lulNkBYHq8Rb$_;kh2KrUO zi7h@{)bX-klU9J2eyp`iSogaY5P=fJxyX68L?=gQ z;OzM5%`2edc|?G_wkA^|I>}0w?ahn_w1DLyP<&J;6akOf$9?2VPO-o0BLrU5^rR>N zX@|7pRfXx>Zzq3xa|8LKq3!qbY_$KSB)V+`m<{K@qh2Zg(?Ngu82|M_9%27$ozHoA z3}Md0IVMSs{jbw%WB^P_WX6B7#9?h}6De3ZhjHK4T4Tzty5$gsHJhC;o?)lL?Ba3M z=gl=YN>%w4+s$N{aDXwSR0ZEIy=-nRqTw7x%NS(}mi3}JoH?QSiAc@BN*F)4gQ28; z^>=M;^PWmV3oDoYVHtj`BDSzr(F+64alE8C%6`BZ&40%E{3lV;k;N)1l(#)Qs%wBpFtHC~LtKmK`#O_|*X zK>gaj5#vvBsCuTZwj?r5RH0M2pBtECXBiC9DatVC6(osxC8NZTr2-Z7&)Ba%HqioE zo%C9An5kerTg1r2c_kDxMVE!DDI`91K3N|4mIXxJX1SEP6)(}6RyFV|SSI)v@GGDs z%Xt>9UB^07oL;F^i4~x1+oYj67a(jG98h+{DH@Z(LCZi(`nfwWF8~xb=-dwmbf1bW zDL;+DjwwrYPcK1dJ;v#9N@6PNd_3HNl;`pTSy7 zRvqTWM0!7OKb<}>n@g}j=ro|m+C`BGs4L&SlVaSh}SporTD`Nh%Op%3QM@S zR%q!dX-0AqlGu97y*|({#@FDd^YhbyyLOb{pZPwVAM^6!WJJClgY)Cl(g{xSl_6e6 zsC*l<8mP4`-%-Z(&HSIAjofGc@4eB%pp^f6|1tmLgFJ%&^En10(;y}Zh{+6x&A7fi zI@9-U(hM(PwpMu&r5^4w`;vMhKXhbuo#WPosV;E`MRW3|ui2ux0U7nAJ-{w3_l>f$ z6hlf2bVacOw;gdnC%+2oaibmuDlEE#$L_9o5kKXld%jLZUMtRZbXo?vIq)JUayw*y zTi2Jw#G33+6e{hmPIG2!>T?hn>Ov2cDoQ&uCnn3QR5mH@?Yk+U#5bCv(B}d%u=ZHT zA-3=&a!A0M_;$&gp+Je>n`nEyN5uV2vs7^O;rv}tD(o3Kv-N`G`&w~QVpTxon}0pJ zmXQLKf|ofxQ#+v1hO^bVU)Tpfp20lN(;rbj4t%rbmR8b4%KcuySp}+RsklQ^aviP$ zK*Kp=0#5;gBU=ffa^i!-tV-pU($vpw{5Gh81j zDX9Ex5XLW24AZA>Fu#vM-~P(Q2+JQF#W89JY5h|WnIm0`Oj8UoJo0+D52iL(8@ zA<)#e=DRSh&whvv^$7o;ceDR*l>ba`n;S}j8|1&iUT@#M|J^(2Kgxd(@o*LOqcHu} zSO6;Xyi_`Ex$1uNaL}eLU&MMN9H=F66xRmFFA6QS%NHSUY1cID;g^9I8by zJ_{uSYwKR6dF!&X;ef<|p)OGX>1HN=Z3{(oAR{T9aYME!=)Tq-TO!pa?HZmcrsNPlF3Y$-pB$*SA3NztJ1K!0xG@w-H^~*AD-w z%8s4xdMuj5@<@`byk5j;>gz(mZdDO+(I>DXCO;*Uf1xnfEKOhc(^PB};AeSAg!eL8 zG1t==sVg$J8ZQ7;wk&Up8E>9~l1f(FX?*}Fehd06*uMeUYb6##BWj7iPd3%HCC@V5 z$i3w)iF7^V)wmobVG}?$%32NJKgI?*di-=o)uM6j!gNASs-L2@RLSVY#Zax}O8Rhi zQvJEMcdFF64vq+TTKt-U+T0Uyj$knuI9Tv`Ir%OFdo#W<$u#LxO*YfOTU)crMK4vHpu_``+Zmb?;i{v?)sgf(X+eoGUupyIqaTGdZ%!F-cS`u5e zzgY#K^B(aF{2k8B0|_Dk>YUVYSXbapb)wyF!4%67L1VD$w=QuKje)p?)LNh%Mlgqr zPl_x;#?huD0;()So|_0_(~|9n8H%XrRWwO6w8CU5{G% zh7k&l*x*I`O@Oh&br9V~`9888jusrNy@tR_I4X{A-P$gOkS!s8S>a^40Q)`v(0B`Z zd#eERkwHmlUmvgTSkaoVrnLnxvsjLWK5qRb9(TLntj6E0{_C4nTedRZ+v|W#W>%MA}}f6}4W%98MrbK+S)tm&+_p2&LO$`F|;m7bHS2WSGPU$2yH6PEwNP zjFCC0b6& za32ct(>)>~MC5lV{AGz+*WRf45|WG0EY8JH_%zMcsG$?~>GzHdKW-$mj zRWcA;5#$ZpV3hw5?XZ>WX{W)WyfG=0B&vb_r*4M6PH=vsW1vm31oKs7ghr?gj%*8f!3z zD+C~jPz={70&E-`s(Gcm##?K71%$vjGb$oBX!xF!qvC6uwO&M-4Xjv_s*oE3-;RLq zmJ?C%gQ}>dUt{cgf7tqElH(YpvkOc!1fw-*e*oTo8-Hr%|K$s4&&Bb9n9wg@{u4w5 z&={c<3;_F)puiV%_x1FI;D9QgYT=wgIw&MRcGyrb0|LqOk{4az4=<)u?gFIiC z{m0+m?!)+JY@wU%e-eSF(Bz+WU_Fg*Fx^$4TY}~` zz6Dqx-ZwT3>M`>csp@~dWpHCZRjW5J4;HXZmC<;+KinHwT4TNVP_H|B>)zOC*cA6_ z^WksMmyM>xTAp|}hQuZit89tRp!-SX?gp%ZJ&R2k`R{QQo!{aU0X<>GO z4VqFJ+D&vLPm^^z&jzK1Lo+v9@uIZP3c}(4ZMeG{HSR-{mo$DiQhY72268j6FTvbU zS{B2#opfuUy*2!%GVN{J*h-SUZ9`khul~j!rKdmXTOIe2o9}Fb}`~zru^LxC4S?#F+kz1sj%dj>h6L7>{JvdXMsDmH-GSndTrN5js+l zQ;WO-El|noKuL}JG=!a`!O!Gn5aa_YO02&X4 z^fMvw4@0s^NrDoV?*;n6GWdoQ?Q3ml z>S6_zU&QM*gf?arEuRp*CV zA3R}#mve&WY+DW~A7|Dc?n>L;*_4)7t>TGc&wDPYy;#m)J8x39GZyWn+BDb9VVXMk z+Xc!J#1M5b8RnhNDn_bWflAHMR5H^taH9PYCBDh|nOe05 z&qWQgPJsSjoZXfeL>Gu@DaW4fG?t{=zveU+V(;^v#`Xes(0uBi?#$In&>nT*KK-~g z9JY=}?dXG68M1!JS{|`u4%nU}^<<~%^Qanfq$kic3|aVeiiUBd59t}7+y2{U|BKkn zPqh92uVeE6dw#|KpH5x(i~avOKF8VrCU0PC1k#KfLo#?5C{|KC0E&FX|N7v$s%k3! zye5PhH`$P_9Y!3sMzS^NuVS)*u@IYk7(jW1Tmlxc+ByS zZbXXwyk(ID=1d5W%18pxUdzE)ycZ_*m@O<}^@J;kxNL!p z@1ZipVR6$*_bgLwZJ&IxOx5u40yW_CB%)&<|5sYt@6G?+iC@kCKb-_$^1pqSPYeG4 zU%3(qD1%AFjV?(dR^n9@q?;Rg`>hw~jb~r!)r<%(ND>gCG$uQlXqhVW!!##EpaOje z%PkJ!S+Ym=qng8fZNvOuy|c%C_MLyqNG9GieIf%maQ;XBcv8LpaosQZpFhi|z5ZuP z;2TLHK$ItLlBSx3L_v*0gc_NXn$}hEKC9A=HmSI%fbJAe^Y@5 zD#_L~wBqI;e;B9^1F;SwSs_rGSUD8nq&j*dXxoHK#;Y#2EQbN+s_3D00hl_p>WGJX zG>n%%01oN@Q#Yu} ze}D2t|NktXR`Q>lpj4(s+#;E&SXJjMjB2O%j=~i>YtjY^f|BNJp%93#n^ghv)zRj1 zeTWJ}tD3X9W>?`Eq8hDX#c)^i+|GG`wtXnx9|Kv!Yskb>XSVH zhy1^;KdzpCZxVbt|DWU2;{5+C$pOFx*)p)D{NEXgWBz{zSNjfrPD!f$EnMw!|6UWq z_MP!YXr_`bt_Z6>+>anbEA-)eoJ62M$o~4*=s*ACBVEJMWO^pkC;xnY{r2+h4`<-I zm=%Z+Lm@*Ec>e3J!1NxgJRmaR$H^&3g=)jcR;&@rJnk$b$tvD~3~}^1Q;Gm106q{L z)mM=MEUw=&5^ZHIMwC3@j3gVBFsJvQI9U>~W-O&=!(l{1>MSrz;08M(*$j)S{=+qS z956E63ZBhi5)ITS13t>YXlcg&{xO)+m(OSWDE{xPQM|$8qW|f~IPCwe`hP}&JNm-^ zKgZ`8xPpwKED_#SNde$-jS{ff;yB`5DTU#^xP$0D1LCEas{Bj=U86V#+_sZ3A2?Z^ zf(*rw;Rhs=iW}d=IqTo&v{m!vo~*?^Y{1zpRp1xfRYUY5nhT%7)<050oyG8ii$ENI%}3l)~qrehA12Oj_(AODb36&dA4mV_DyZ5*giLCw|#D~XZr%%e2*KXY5S&?xdz5u z-C1S(ShiCp4FnX4_Yw$XC?OBxVR=TloaGBpWRYYU#EEr6Q`>~5ohLM@OlaCTA^Ya> zT^rBZ9lG&s-=Uk>COPRm$#G?p6LXTmk&_ILJM{S^gZZ9Gj%|}1f6`H`lIOV7M2}nO zVxp5h6ZMUWmcBO-o7527kOu@{9E0322l*2;p_<=bTwF_R$1Q1Z%xUjymA0W7KFkm( z>*Ei-uR$0im~2y-!~u(g%m1kpn}QUs5P)ETS?_DG*ltoa-`>|CLoCCq70T3C+$unj zBI_1Rk2}!$q^46bsb*l~mV`T=?*rzy1m^DnHfqQ1$D?2$u$GvON|>p=D)DbYg%L`r zFp4Y>+3J zbbTvhvZ;2RHM@#pH?N{m-kkRA=l5rcPslwii*8duJL#XiV@35eHBa{l&9gg4vrN#Y zaduWXD+0YxH@$)H9y!5IT-Gu{n{w7!H>;>-6Jvs-d4=;pSuR$T_XLn@(r|-BY-5JP z4DqRxB?wW*22_QBlSD6yT#8Z4r5M?l!luG?(%^VUzq}M4fxYg1d;?Kr=Tog7BMQ6LA;-6@opxO|{(5s<1 zV8y9WUcRFUge1#Q$l{%veLGFtpY7AMZQ`}->?@xI9UOl0E)5)9C9lt-s5|kSvGIhb@PJq=FQ5R z=T$eaz+P5M&Cyj6`&>+@nNUY1+g*Ku{EyV_=@}Y!$ zGGzu`%lgPvElbOjJ++?fsYRcfcGah*WqoQ|)~BkZffJ=Qr5RZuS-M870K*$Zwz3HJ zBZBuR19V3j+ECj(nw6nxS7m5gR)(e}Wym|yE$L5MN}q{U`b;g_)3mGhG%agS(~|b& zO^=-5xScxdkFDzL)S^92yJ}CE}ePwDa5pv?khW;MQy5SAzBw#}hgkWab_@<~~c zPfCLP*ekbD&`whs1y)UEViDw%u7Z407UYwXAb0DU%8j&)ci@M2m-==)COd9ApO$oL zrD~g10p()M+A)REY!6dt7W$K}LVr>g`je8-Z&(b@@?aE+>_9LEFvgHlB;~$vAt10O zl!@3tb8X~0v=a)WnbmJQu?YQ1SD`9U6mKc zTnM&H5mn34lKai9y5QKd9OJIb;a6gr#s}8pJc{)8E4PElq68^`;5C8KcQA%Yh%#`_ z*F{agoeDUzdrEyJYWUoB>HhWSt97oNlgcLt)M~i;wx}q-b5xXHiHh>gs3>f>=v>FN--2(J)j ze1)cgA1udHxf(5RAV=kxic%1rcr)`{e03s$`z?=@zwbyj>)3wh*et&io8_CaS^Ji{ za-{s0^yKfOr)DkJ|J2wlw=&VOIZ?NAtYmsC>AB_7vh>JZXzMbt(9nK`^e{pRNdn|U zb+JNT%N6qWtx&TL&41`j2BXUA_{QpZ^BNgk$;SqRmtl-kia-i821cgY#417GBWqym`T%7$&dfMS&+T3Yt9ha<}9QJ4_OBDZwB^%WWJ}#H_o~tnl+6 zI`4*8*^QC88`Zn$3zF_YIemgty9Z?iglil}vi_09kL=rGr~HnwQ=(_};CaoHQMwry zXnDdBeW;{-t4)e)t8&-GkxU3%i)$1LR`>xW@+!$|d5z-PuTgwk6qVmGii-D~SC+>$ zmnW#~_5Zh}45S%(z!3uK<*A%}xZaQmEFqTHX>iL(in0xsIpyU_OxjsA-o$Fr_?7@J zziR-O?^G1nxw#B=e>J!49$?0KiXsbX(Xb4`O^g!+q6OGyF$HjC4e9nR5mA2Eh^R_1 zzHdZCsaZ6mVbdZzE0Gl)GH6`P{K#pSfg#PdS*%O1X-+$CX8?L*s{!a+JfVJ9PpI!y zG)7Zlv_Idey@8PG8=q`TkH2U4`1=;msNdBy>N^#k%~aX!?{+G3v!(ysvxj2&7Qdw5 z)i3Fn{gS?8s%q}siiS-s>Z}!2lp_B)G;I1ncXgnQ#^^XStdhJd8dW)d92z!(*->7O zs+-~-gT~0RDWk5NGAeJ%sJtm-D;mw4GU~c1qw=PV%9~Fvt8#_>^j%5>)g2v@U@`Qd|uqn zMvYrBYFxvpIe<#@_PCu@Znvy*yN1fWACqR4*X^eAD!+tR)?C~|@8!76thh8Qu5MSw z)h#QoZlSnxG^SQGniW^KtK#aG6<4=VT=%2VtWLUJ)k(LyDbwT7Xx4+=u6mGL)`Q$a z58`OptO?hm2f5w!pqx&}WnBE@aIx``?rfxt#^^XSnk9|fRnoX+N#hohWR`w}R zu)HdjxQB5GILb}bDu3vLO;C}05|V*R5!|C6vcY=ZqfH(Y@pRLO z-Jj1}*=O^)#XJjaVmIh4c7ux84XR?dA3fS<^itdfk?LZ^6lSGS8r9k zAeC9w9ubI0@)Z*o2G4hhodB|BfGkxyAM2EwI6=@^sR_zTO;A;8YBS>fW5kfi1Sg(0 zZj&uVQ9e82zt2ycEL0ClEtVwX>tUN=ld=?aRhELXf)Z5pq}ue3c4yrL0K^hDvFW7w;7El z519DAD;nc68k2p?rg#rb62ioDq1Tu)N#Wx8iTqO@W6q7zjD(1CQWxP*^U17wTdG)Vv`u3ia?;V9NT(JS zPw^@moo)GSYDsskq`Z73oy4sY=^H)~@h(etsVp7YW?c0&zE%CN(GtqXc3-QjZB=_L zhC43(8PNhWPc|fv8Rd!r#SsemB;#l{J`+BiYk#tAAmPJJ=g@Bs-y z$~7SAZ8v(M# zQWc~eVJ-FAz2}Iqb4M%#%0Mx6v-H$d;Wa*entn74c0`3OUPy7 z6K|K$V?MS#I8<0R&%A4hh3x8YSQ? zrjOjs;q}Y&7jItv9?4&i$p1eXRqOwa+|l?;{@2g(c?K@kQw34ax%d4xk+FC&USu%a z32ovw+oB5<#dfH{4Hi#bKum;FhASe)ui!jQrMaN~UJ{`VKtS;Z$1u~WpHBf>W15fg z2&u?NEyQDn#KVdW#0f(Qz-o&lL<@FY@L-2ztKkMFTNn@jf6?QH_xOKC?hm5R z(DepCrYITk?H`_iCC(^wdINBSkeKHCpYc7mK|bjXz(s-53rs_jMMdjKe&MWEL-rHB zx_$NYEz5W(J|uwPy$}v<#7Kf3hvAwKicWfi!Ju~@$KV>T){Jts4rLE00t0YcCT$g< z`zMn=ivO=sycsC-{mF&Ee*Pbfy~(t~|9yWn{lfo0$A|MU8SBeA%RrW7>Gce{#uTI( z-oOmUJ6RNfGhw0B?F9Y5J-<;g!TfkTy;tNBJ)rCqJRYr zBH4aK!mY?W#3A5~u!;0noL%VfWL44`CxSDmbpDDd3YIC(HlKm;qc3)aT;d%BGK}QW zy%Z*>$W$P_m1KoODHZg}d<6f6ICsC@rJTF#)#Lw?o@|rX*O~mFBm;UM4O{S{@P&L- zzEAKG-2M979ry@tQWWCl4!~sBXg*S~Mwxg}$E`>HW3~gBp$&DwOBk-3ZBDu-+c=V* z1k9*#zTBgoBgIUSoFRk>SjgK52Pmw$6=&edS@{BSVg6BYM(yAcJ5W@N;FJMl-hV(6 z>hPvq;z;!^Sa>#XZeDScvybe^2k4SdQC9 z@`nLRc+aQ`+5ta{S~7&Kjg8~BK1J+QtaGLi;)uvpU1^3w6p8A*$DpPP{?}1^`2kb$ zG)mn;s*UI0R9E0u+YA7GNX4ZS7PiJhB&MaDkoAE_;0{NB%P73t!b`bUnhw1WylkaV73;=_liVEijoGrTk-T9!$S<+fZmOr=Oa~l zxe57+IC(x+OFo|WJCcj18QCz1<0l}M9F##SxpEPcl~gk68jBqJLeGuKJ#J4XdZ1Qh zl4Ey>ObqDV$Rr=BN+u@cCnA%4td?Yw_iITej@ZX4-kdyA$ktTu=}Np1AQq_3rvL2lQIBD7rqR$BXZ_(rnhbT{e(@8x;xd z;S{_Og^_8|BqRwH6}1@1w!(Sw{(Xj)zZBl@`}_<#mU-k2QcvG=K@i1O1I+(s7CtbSX&DLS3@SUg9c%IO#TyuSkr; ziaC3^d`sAsw9aa4elCZQCxSx&sRB`fo|#uR2K3cB%=ikKR|KNl{-LViWf5uv?t{nx zGx~p3<>|3IpZN1JTr41(y8)Vy7v6HTj7De_p=mf?j$98;7W2RzPXd25_Cq*B3vU`N zW?{4l!u{BY(K$w0gO2j!1IjWk#)Q4aTWHfz+g!z|5J0w!&=AIQCi%wxMU(KioYh4U zfZ!F$@IQIqm|H#ITy<1%3d?dYk(izvJE2s7bt4wjB5kIa>M$*+#sGfAz)gcS($L6p zH4QCBoroHDLTe{zcG<|cprx$!Hv`69z3sk6{Gf{h@94e*Ly zqJaqgOjyNHuYw>W3&sbHLkf!UYkCZ_s+d3>-PiJm12bnCiDQ%Yj7iDxD2T39ikq!05Vf1iH;u$OgRuWfPk0Sj`IX z4g3I9&waqR34DM!7L?Ith*JOZKwP z=dJxhxW9lYT;Lcpj4DUC52L7m_WqaCew2}v|4SU|i{i3W z+>~>AE!z@KXu>30#%(=q$o=r{k{|2x%{oU%MoN~M!~0)KQqo8yE7~=Q%6AGcwaqXw z*$N*Vsj@#NxO_;l!Lu2bre zE1A<%4g)rD2QoxS{D440V?yq?srKxXL_TFOyc!g-ZK|j@N@#;3s?O>Q9c91>=wHNJ z%24(_&M4~xycBMhxA`>!5K>wkqf*nKFzQ`Ngd3Cpnjc8FLwhpc() z)Lxy(F?rO!O5xH)ANYyHtmvj#sDOp{8Q%(Kvt^C<+0&(-W}CcY)iy5m&{nIyUq5JN zaspJ1(LqDAXxP=x+(4XsrQtXxst*52*&W~G4=8$rqbNp?FhjJ#49S@`(OMKtcDd2L z;eA!t<{?_yg!yV#VJ+*3=0~<4t|3ka3rKO;7w1x|_!Y$RoT8M=Qgl*6gkwjxBI<-trGaepxG0GRTdI5|rIi-E>->4O;uDz4 z%eWS!iU)B=k1ARpJ*xVnNZq?f1u)ynxE&obn-7vRDfK#nnrg3j7BR2muxaK6@=~lg z8-HR>P@D20C8*>mm11k+W3qP*!r%>83Pf+IUCDNuYs>33oX8T0^pu|; z{y)S*$8k;^a4Gb#3~^*O(jbQk@HBu^L+KDWlO*01KZ{;4yGId#I&gf~fIf@sBvHuW z+t)X_^v##xJHpl~l<%!BgDurM&R|py3H?MyGoRAXdu?a4%^}I((%3CaOw5js^sY2M z5aL~GZIA7~U85=lp`EC3JBG3iP9%YnEJE4gXz&;>QMe1Mu^7MI)s(BErCwrA4V7yF zT`kX|uIZnR%>VU!A=Sv)W=-}~Sa#6}iiQb5knU7?mQbho(EyJk&f?wm>l@y5OOX-7 z#V7FMJGlrt&TQ|cRuRNzztSoJvR-JNi_-A5tD8!+TUFaG!)|elr8^!Pus%rb_DT>D z)0bBhcM|zy-$hXndePWlqR5*?i^%hWU=d7FxR@?OKbU%+zX-=(2{B+Lny)+3kPQ75hxAQ;smIE0}1@Nv1{WUI1G!> zhm+}I6ngUs952QpnuOC}xp2dgJ74-U*Pl*C9$G}cH;tAf7(~Harptwb-1vjeM|18v-Qs|(HmQ}_;SygaKPV~Fs zUpQ)iBg?-lm>>u4E*kqCrq zph|t*@zR`BEesTJ7z3`XTSuYzpA|}&&*wkjJPH}gjUmgt0EnJUhW@cdl;txr&ICI& zw^E^}CL>jiB^#8J8|APsm%{tW31M(|3Zh*CH#n3pJ1HiKDpI3El}a7*+BbKnrC61` zGs+rVJZcL~NR(`ltcQbQiX<@cq@`TU%IvvKgv%X8;JGpMi8x6TXtIrCZlu*~@o-Vf zfr*z?;<>uM!fKd-efhTw+kt$iEX9x{f7e+bgb{sL;$(M@qCu`RKtQ*PfpAISgz5v3 zdo7~kNaq=;xN#!VL0K@Y-~FZ!p}zF3b70ZDcI$gq6yiKp|9o|I3et!06rfGYb}w*t zs;tY?B2wkFNUO!=h`d{9#&ZKx?RK-trc0>7G$$n&sxE{! zJK1)yfoWaGH-ulYj%v+i#Jy&FhcWoQnX4e0f!gF_2t!htg(?ha{}u#c&gV1kgd+iP zsMfe@NnUa{ep2J{_F`dM-4aUHJyeN&)s>%#nz#{+(8Ey#lCvbavkH?gh&trSg_{h(Q&D8qA<9LBV9y>JM!25J=*op`uYi3|FoaVXPcYdKxB;^ zZgzwG*WZ4rh-o#fgu7n@tf2C5phQ(>WLK$W!@cUXTF9ex>B_jjv-(EYFcXfsW=~}v z&Z^BhJqWkVdDlEaU@1*H{Uq5T#)@!OmmLyYXM-ZVZFKhO%Xig+5zv2wHYD5i3wncq zZPFzL&#%wl3>GlFN0D@2?kGc>6Vr+od#79_8sr)>zi2ji` zKHFMfng0RzJ=-RKk`u3x{iAOEC%;p9!p9{kiOvr{F)X+0__R=`&Phr1+V<*?Ln*)C ztMzLC1keC+W6y$c_iKMif8gqL|7S-9?>_CsIiRuAdw-QrK$k?{cNbf0s%|8jlEFobFhh}ym8tgo zeDOiWpnC%)jEeAkVkIiTx`j&^Lp6s=R7YtMEm3qmJZ#fY^*8U{*zt-t@2(f1aWsL; zQRD^Te72Z{K`@8&u^-L6$!Hl&;A}LW_!AhyvG32k>C_MX>0~yaz$o(l!&v1}5*a4q zH0_I|RV~Q^S(ThC{%d6`2ZLk$$PChZA<*P85-&<}S!jG8;|G)=N(bDC!s1^dzuq<- zNYu3BS^VMX<~D?1>)+D`%p2f1`g*Lv`V%4(ORHG=V6cjHz;rF7z1oVMt^uT>%4KUB z?qJSC8E{ydL=&89EPH?0m!cDbSGTuUs;9oP*Kbz^-{QXy`G0QmH*hCLP`2*VG%Bs! zJXG`Nir<$Q$%1-(uW8{3tEcKHEtjJsNvMe2LJ_!=dvhjU1>ULb`V#t@#1Yl7^y@FB zmsFrO&7*od+rPcI;_H`J6qU;-nu+v}31Q0Dm0xw$_9iD_+X`Ky2;yUiGl%rF)R}{= zk!LaBQS@2N)V>IxmqLqSpO{3;YxZO`S_RuUmEVO*6?3&M(T)1~0EH?jPfMQ)XpK7c zU`Np=Elr>S%4elZJ?IltrMXg1Mw4Zr4U>3sdK4)n_bZlpV$3~ir3t8`Qd!QUSyL%X zBeYQ{RmVdE)(5Gpk|SsAcv_R3`HK*tXf%aWf3_HTUNoI7rfB9yW9a*l>qX&gw3vBl z>bub-K(m>@7|&f8y5S^1%kd$Ev>ur)pp|a5BLt`iyVoR^?^}$&zr#tSpWAX+PFVc5 z-@2{ao8~Z0@YGnJ0Cpd?>bJf2@p;{}J`(yTfGyy4hyrf2bs{&P1;uOe+dkyzRu#r= zNIMlpApcoioz@X?08YYqs~;G`1$jWaB)DeBFbwkx!wf}upDKpw{>M0?|7SF{GepTY z3v2mWMCu{hKl`;GrrZ8mf9$&MrhnR(9auH=V%d-9wKNkRbUyvtE(6_I(WqwCdu0y0G-NusNsP_5O zNF^kN43r}};5!7Mc=9ORl1vorF!KCx$%K+H+oeqU<&(3E^pb`!78KY&6G!*7ZzkR0 zJ6q4*bJ|aJ|0wUKZ#Az8Vc+L2T%8}-EPX1!Yvc23c>Jbc`yQ36K&wuN9H@D_Ps>!G z-z}Sn+R_M=^~pNB%;#AJ^~90&)^TJW?4y?X#(aT|lO@SElDX9uS_195%4^2beXA^> zcU^G#*nAJjghc4d@*=$yEuh=Um>f-duL+F4gE34(l!>GNR=3kzz_r;Y$gh&81LE*R zQd&NVlf84Zy|lm83zNvycY9&9d~q${9(ZnTeQm9fu)VgHlxTfwZJz>RBoxRS`Y<=c zWcCIQRkv|;Wk8eJ-|@D0r}FG&7Qx=Z0>0wB1(xXKBE z|GGk~IH@>cDC6hn-Sunnt2oz2`l)@BVlZ1Fc8GF|0w_lNiWwc@9KlOIdDi@(OZVV$)Gn((Yaga5@B8p7gFbzXk^3vbd!r#iUrJdpE3PlvjLb3{B zm1gf0$O_#2Z^g7wq}(;k%xRXV#4!+Tc?S2Yd>pLI-yn9vS!FOpS17~cQkW!>neo*X zA(Yxq!wJ`~MH79UoFEiQm0W>DKmg>^*%fzJ`viIZ@XPpd08>2V!aOE08sxUxFeTC8 z!5coyb3~l{Qk&3*+k-1)3)d{GZNifXnKB#2MyQG$#W!UQ{3~jX2GnSIjfTezGlml9 zGt7P9?U}tb#oA>Oaq)z}nmisqz2f|6%P?xnn|jBsA0_L*hjF}s;r%UnO;+^B!!gEsDM8xibLp|U>Uq4UUA;$>0KHUEn1#|Ruc4{nHhBNj2yE#iSPrC zwlL-<$-U%VNT#fz4CaOY^12s$9oawQ4E-RgW9;!{mqB%NWfucA`?4!zv~XtUJr9oA zFit~ggyT9RcjUQqZ=9!+hyp(td5c*voz0=Q7|+7#c((Kx%WxhoqS<0L_om)_KK0zC z8%;xRIhlpwbUv9P6fJ^!nTslB(y#sRTpRoUgpaEKtzBzRU;O)E{cqPD2X3YQ_bBj# zFZI7a$7e7Y^wu~+XFUK0fRRuXyzf0Le3snQdBEtg*ZWJ1lY6kv(DIvpbE*E}-?#+8 z;gDtcVdsRD_Juw3O`o9;Y$*QDQ2b4wvR#bm8X?vP!*4}_?V=Jm|MS_iXW%A;31=$X zn9*LZ*ZTZQHhO+cr10ZES4Ywr$(a#%6nW;csmy31DaS7B$;D>OqRwcl!e*td!o{wjuFfu}Ve{L_&eT&?$(~Qr z%*Gbzs^`;dt2LFA+y9b^b9R?S%AE>$f2V5$Z_EvuLjLM4wb=W_R1i5)Q-yRY8t=BW z@3wo?v*(et4*`fu30dl%n8!-S*FZ&USX)yQbQKOpGmu~;DPFX%z37_?{^$TNw*%0+ zg8&3n-Z=e(0HpaXAlmq0uNW2ujR+F;U=JjnSo)m>)G8}+KoMz-`-5|~y>_whM?rAq z=@(-%_FA|TNH}aHOv{Z>SU?~ze){P>7H*sj8b~nOH3;w9-LyMB$dvn5AX2DzFeQix zDuil-Yl0$S+Vf00%)Ws}55ehBD~ZX~+eWjU4-6mlo~MXENQAjgN|-Ch8(oMW5fpA= zs!{*7G5rc2gqYYLm%WZ~>lSK-3$bux*}T0Wh-k;0{V|V8%vmpG8Y++2v?srG?*DV+ z!T3z|06RAvSr*CF{G|nd3<)8`8YLnu&VoBaiYvy%uE#u?y3pT1xd|Hy=dUydg!0M) z`Q>2Q;b$BtvKJkWA1NVpwiSsMT`O>3lyI3&1b;gWi}vY>>5(+R*3tDWlI3W)yKrdz z6wQMO#$(n-Ip0@@k~E$1o(J%N4p+njLHas148vm>jg=4%i<_=Lx`B@6cmY`dan0Vr zFcMC;i2x6Z53!@F^Lz{y#S-;H*8Z9?BW!DH8xn(ICjh_K6LbT^1+6t{sNhWRV{wHH zL&o*FR(lxxuAcB;YpZSB9s_?zAT6(%@K?Jy28j6Fhz)Y1AdhqjvyMnAxhEJ&W>!?N z&yRM-*4tTwP8>DZYWL&+DwpPFG7F87!;z6>LtPSO4uBqL1x|>BKsii692?$6b3+tV z43P|Z0E>4=bJa))17{``Q$Nmg^AcKkO40#vtjkHdAb{_OJu_4w*4F;ByaovN$;Qf! z-$_Z~&(J=YzkduxnAHD#Yd##^hhZaY-iwi-c_%^? zLhFo6KF4yZNF?2=?11Lq>ap2r4eCFJx=ak zeeNuP3V-4vwg^y?1_A&X& zSvlfrn1_%)a)LVw%q#XPfGMI7DLe8sTr{FgUNq0_>6V@(-)9`qGnE~{#ezO`k|}ijbHZB_O({JHB{9%jGav6=MpF+AZxWu7gKGG*=2Mz;&mo%-@^`eL zQa+sT=lSyB9rinqJ3hljm`>lW{vXhnFVm zt|V*THHg`TRDgK!$AsyjqGmQ+=({e$e+H1vw~2Cr#V#(*T@XtA1Q|@MVoYPw&yA<&CtZ~qQ2vN(}eYok? zfpfqxh;k4eUn_plu$gxQe( z$A&`Us_RH$kAEivp&Jv(>_=>$zTx}f>&`}F{r!23OY0Iv=r4QTmnL}p1R~f& zb*4@j6{`UZGV0*rx-ao(Zo}WPRa>IMA-xZ5>UDIsxW%k}0-%!6XagY17no`81^&Kmf&n7`Qb4EjU1qP(~5?y1O-xakt5`#2F-Cf)wfulrFa z5U0fpDthp2y+Q)eW%)NIXc32H3RKS^`@YE|-0mN2dkU`OMhozfg0#-D6<0I^4` zg-V+KNj}Z$uh3rC!*ku7lU!$@UGf)!!wj8}cz!Z`wx*?;(j*{2VtmJd(mrED0YClx ze#U3Uqnq0}ZN#lxI)rH@^L=%`$-)qp@mVGd)iepv*O3B%YEg*5W z@z+>X=uVkgfK?So1+DZzXkT&Q%ud;$N#|b+DO3VP)ISFT^ z*GUeToUC|LU?%o0r2?KN7P1=~OgV|>iP_rtU~PZ;U1SU9Kkja!c*hjQOosPQ zIeLNLm}IG95pq`_H!7%z(IpPWQ|U>W1V_ZVD!lSS;|}%mPG}A+Z>7p*elKS3l3@7EB11!3V}V#>YZ26cu-Q zCOk8?GJm%jcKsSGi2m+JxHm-<(}yKIjyfrT;mhrrL6a4Et>EE@|Hyt>laBI#b40^L z`?t8Knt#o^+m4pI1knpTjbASgjm2VAJve0%POG13Z9*A@UlwUarJ==@Q3s^XFco0G z4>WC-pV~RdEo;5m^aRr)X8}+{nK1I+d3|-!r);ptd>X57(gae7Hf-2t%-5UJP7mOt z-R`)at*H7Nfc_@DaQGe4y?{S_$yksoxJ!$$vf$D#q(}Fpy|jbIU+e!pe03hBARkkO z<>UB^U+3i7pu|2M7pW8Ocs89&+w`(#;7q>D2%xpNIQCpl)mV9!!bz$lv!HZ0thI3zF!gZ zBnGKsO_0435I;BUZm*L)f-*R3uRTzR`d8U<<1INoNOfg%Bqbk(NQg3#*U-po?V(wI z>vQe?^(G>vkIlg$2Ib5>@f*wK^C0yw9i*i?a70XOc+6P$`2c(-6$p+*?R&!}CX#}Z zqUw&33=Q1ve=T`lg`3_D}K1E0+cf{a!yDi+}yT1%^)(>IFu2L)w4-La=;|88W^Bv!K1O+Be^^Zs+)a zF%AMSdA*(_-%dA&0G_%e&YKSw!0;26XxOmfLu@e$A!E@teH6bo8A?)X_XpgC2a`C; zXOT5AtQLvUOgOBFjaMuM|FyIQ!XiUfLILaw8&)3?nSH3Z+Wq%j&LM%%g1fi8xP0ZL z33*g9QtX8ng}Lzjn5pO*=?g5`DPQA42#A4SA-PvTLNmF-9GgZk{Xn_ zWe|KTPyB%s8tmUO2#tZ*_d@LR;QZxkK8if|LR9;~+R+HnBYDzb>=1%IYs`7S1h*L7 zN`7BGlk0A*9|twibTs_(eO%vwS-Y%Rdxu$jh6_%u0;hAwZdPTq%{R2Hprxw@sW@bH8oLz03=tRkJ)?&d0l5&WVbY5_U z8WdmR0u7uSFKchKHY4>KA0s8n8_hT#{r%0t&)#t$ntCq!BTuNG98!!a03TU@CA|aN zi$a@b$N=Sm-8jUH_~9Dq0t{1%avBr2trS0~HIcUq_t8n z#3K&I+;Xs~w8Gn1xKhrJ($iR}_NQg{w@!?jHbot(r`!&oL~JEx4HX9ZIAw_s5uZE% z930Q6#KrHX7S84FxLlt!@$=d!I}hn6EObq;Xt)mgsZ=A{UBoyCwK()HEO4S;EAv%f z#Oo6bL12DJ)1P97JEvU&WGW-U)O`?c58j4>d%s$K;ip- z3;8faxu8CcKY&u1V{8y{!y65AGQ&_Zd2wdyf=a1hG%A@&x6;T)cK*ET)>=xcSF5k0 zw%L~SKsVo`oeO6<(mfqBM)+hwnwv<9tgnl|(nwf^szK4CmfyNO$fOD*ELGRWj?Mt5 z+Sg2duqX9`5%JUgH=NBRByrK9e=-bMBXqJ;Y!ccn{Na~+6}okaismtjTjCoSz7gBV zNS&me`IyWDIZv-NhYOZNLKqG1T@;}dS@^!k;L48}+PT{Anih4HuyRYcK5_Lc?dmsI=5&+ErpHG#;>++9+W6^gIVT{y{|a*f*|$dtS)q zZkkL{Q@^}lUGstRE42KB?+Z34LW$JuNSqrbuz`4kQ0r@-A4#Kj?#4ds=I?U zk|+l;{RMd*?9pjTFbt$7HX|FG6pLEJ17Fvh1PWs-WftSO=#*Z5qI>3G9q+)xtdSb$8=hXiK z+L`KAb&gydSw;&)dWy-tsG_21KA54A?oCnmw6^+)@&Yv1Yuytaj zoJ!!>vU8YUa1=DJoYiz5VXUPev>FjEqpf>w8?@1aCR8~F(htuji6-zDyEknC7I z_wkQRR4R!wklgOoTPn= z5bAbQgYXGL;63IugU92BIk<@AZ<_F$lDa`f%P~UYEYa{-S+t!_C>U-Lw91x60dV<5 zIP2*x=1g$KYQwCUMra~-cmc)z*5Z7+(1LDWw==Bx%;?zmyBi%WFuE2#V^@t#w>Ew_ zhP$ce>`xDH7TM4}8AyLzOyp|jBJHfY4XEL zR9|XwN~Q8ES)s&#gCTHx5`)D?tj0t5^uvW_b_$iNX^rQ={ssBuw8vlDkfrlIpJ~O2 z*KX+Pm#oL4B8rxgxMUERJ#WQnD22{mb3^UKlEd012cjGu zVU^)xJM;k&Rw%V@whp+gw6aoaQ&U}KmNolF?H$zyNX<2h-wQRWODk;V%9ADTKrx^HY@eMT@+;*!&)rRPAbmu~fagW>vgR_p7!4VvCww zrj}6VMmV*xH-!`4Faj zf~n|>Say7?=TQ|Z`#KGOCW*#P|CpYq?%{*Kw7dBcTC_RWlyz?Ui+_u<2}QpoL^Qhm zjaa;mvsPSUX0)SwW7K|i!u!FD$G+P-t>eQ)pjon0u!>WI9Qv3Zr_gDE7JRC(KEye? zr?tCq&Y3iFeA|YzXA`4v9pOIYs*5w~jp>Qh*kT?7b|@j>5h1;j{s6Qm znFcLI$COi|Ci^?Lf)HG8=?J@~11D+4!hks}8eZ(NcS#1XqJ1e=e(iM6`qi$z^wrHJa6};_XgO>FkX9B_QJqBCv{uwBE z5GK;~TqJa&>9Yw-Ey)ZQe%9z3K|E#|qn6hIZSFH~U=`2235M3t7D*(BZz=9C^Am#Q zRQO)ibaiF!Qu7;9(~aL|Fyht`vPo-${8iJ5eHbq`I_oeXM##olP1cSDMptz=?*m~K zy76UBOvJN`e`axsgvH0H%nCE*vkj1unLs@HR9oNtrps|ZYvq`M7iBwzdxSfs)lM~w z<^LhbnRfAkEA^{zHbY-X(r#UhK)2*B$7SI0NLHr9JxFR@1_oq}sN|DCd4&n3V(B0D z(<7UGrcJd>XJ(jm#?ksresf`b{zd6MfLWctuv_oARZfavLlkBnAj&$LJyq!V5T=sY zH~{-#%}sm~<=v7PP1>H-VwIJ$ZdHO{YguJR?05?bO3(11DQ=uy2@}@Y$)Ayalq!}V zb0`in;aq%R!c|OG)-tM5iz%S(rgr5PCqct4N=S`c076Q=p;WbmjPIQadr$?da^`Ir zBS99g@Xg$)FM4W*Zvt5O9p)T*Om?YZ&l;2%yX#eQ^OCs!0~&5_LMp;sK;ah8Z_)~B zwK9WZ`F{vnVpx1Q$55n+EF#T?z#)GSY(BqE5wk6kFSGimWLmDhX=hU3}2W{U>kO zUvn&!JRfl_KHO*jNmk3y&!MdY8Ja3rP*2&sEq;bc_R~LI<7CB{F3J;0cCy=IWCpQdK62KN}Tbm zAZs-{4+=1q{g5_n2bM>e@vP}O>Yf#|elch^f&B+t$_nC5TGvSSA|h&JnS6XL*v=5z zmueU-8g!naG>R%;ZK!f9kvR+4YDpTSV)eWHmgeIAMQ((@VZ8gl>?lF2>>x~C)L`3N z5JfK~mN9$Pf7zi+f!7l!0I6lGis;E#7Ca~Yru0{a!$eEVqK8|b$1xkj@)C2xt>jz^ z>&&(ixwP0+{E@}Mt8GqowA-?={~S3+iU#QA^v>L*n{Q#((p-UkQIm;SkAm9%LYV}m zzi^s`t0`N_|6*z*BTw#qL?gf6$Yxq^eWYk4_7`9DzF0aUwlhvj*7&zwDp0G9dl1E0 zCR+fnDYMJ>DTF&l^HJ`#iU}s%K|(9!tZqj|S2Oj@r`N)_)VnP5NgZ2+JhA^|&dllx zIuc_VXx)zsrF^Nm{IYvJ3?uju&*}gQgNA->RX11P_ee>DaxBVHs4(w{4(s&8!0jam z>AJP-NpId4-2gQ&JCha2EyZDS>Fq0)&V7LHqAx4el3Y=Af_T+jxM=HjKlzj$rv>lJ z1k8}d`%k$K6OWOj%g?oANt2KaDN@_UI6We`G6D7#^;}aIqTV$eG^1?8=t_+`M<*jJ ze3KF9a$Sl1M%>KaDkBvrc)_5Tfa^7;w}1aRrfh6mv;5pr+}}K*N1G(dh@b1;X1E1G=C05-#5Ot+4UDEU zW+{=@9aOQiDw_%F1dl%VyVkk*ob&ZXhp}$)y zNBdG(dCfyj!9}#E8zJx+Hx%ctV|;l?zm0qa7d1GXQUpmv6oN~TW5z1&Ndu1=!juXCtxJa57m0Nk$fd`uC|O{EI=gikKG>RW%53;>Tp{BdX8FuptuZ&c4qF8tYjJovC@nPwZ7U&P8;qO-$C zFuU1vM#eCl+7ox9LWFO*-W;gACBo^8C~m+8&L-j)JkPnzl1sJporT8=1iIXn+3o|{N%bk7vd22W ze<^VuQ!}l-XKqGsKEsbB1=QOWEua`(g(&gjMhtT4M2WtgdY^7m4SkssLVv;}!e@^^ zh+_&_#=g*Mz~QK9^~0%H0vr>N8RRLLR-w5VoMBSMM`>z*a)H0 zmx_*0l(E*-y{cmSIep|s=`zjuY*!-H3jwMGwO0VlLB8Jrh4!7!m$fhjAea@GMn_(^i_#XAj0i3f&vqYBq|q^_cve5tn$ zI&c|t1JB#=ar6(%-WS`9+}RO2(4543j|S$T-cJ&^O$UFwWFrg0ltney;|HABCjb2L zaek!78I9Li(IqozchybPQgS9Bxeju*Pr`v13#qDG$qfsR^BY9;VUTTFGeQpRAUp^2 zg89I>*XMauNF6UlM*@p0XE%yd;k-C8W$aiRWz%6#>4mI=Vw0!80r{P6y7b3S=Wn4! z>15|0V)_imUa4CQXt57HbBv8S65?7bDBx zU9P6HJpv^QBW5{&oRML)tc@nKVCe1pf|e}M$H<}u;D6zc!V~CsatSec$I3XW6mQ^# zx%6fq3x(oZsv#&L%S&RtjA(tL{bl*mk|e5%r`R2|)ib{nzmmzH@)dQAFk$Y{DfF^{ z8j)Xx$cw}(k5?DKIHAn_Bw~wb!U5|&Ra*a&<|R>=q*RMr8hHtkFi8WSyvr`TJ2xKg8|Y~k-DP95 zDv%@Z*Us8S3H)_srOon##o+ZR#^}3OLK@S6gS6?o`Eo++5Z-ZkGxemN<_frO%Tbn1 zI}NvBbC{``tK09Ktn8g*>gD-qR;Tn!uLBn7CZ}nlYs-rF)mt{Z-PF-$@%Idf3*~f} zf}RD0roFnF(Vub;9I}o9Yahn2O9WyQs9W&h&@T zZg8v4YpT@8nu;mchnh((7F0^77E^Z?7;dE&i}_z>Rf@DOy$9({FsB_7Li9(@?tU@n zFhw5zr{dG{(y`JDuC)Boj4E*50clJROnoO&WkR;jf4|+uvKN=fLmzolm_99CqU$Ah zaTojn3Hs%K)Q~m11q4AxfKcixuZCVGn8u z(ztS1K=u~Dq-w@$^AhL;RQo&q03NXR>0Xqs0VHDJmMeg?W>hPT)JG(t%b!6B8cz~r`Ihs=i7628cEHC=c?dejp8BP#v}o<3|84A zb-3a7UOa(~jHP?37iPM32hCeo6YH`Q3zYR?tZ zt9HIO6!`=@fm^OC;@<;}FXDDiv_{rj3{FOGB6Wsi)Wi=(oGJ1bl zc@B~#pYXNc6e#U~S1o?P^d(8LhOE6{~frchGXw=?q8<=agf95h1Qe zf0BsXhVGSsKAD1s$^zFGl)(QtgHt2+O`;;uM<<+Ihnd3lTD|C4+DY}ekg+k-pqeg< z$NgpMS2bh00D^Hm4+{!c1LxGSB%X zOGgK5q}W{Ek4Blw0YW*6%fr^GiBg=#iDiG3G!3ys*bF;EllYo0vchBL=I^8(9z)a8 z(rH`~g`V6fmRmQ7^F5qfcXgUm(U-Awh)V0R2S;7;f%o9`a)ZakY_cIo?t^F~<9*>R zm_IH`ud}Pn^i+|Tx`iDj84T0)cXs=5)c0MR^1T}K%~x3j#54Q=AE5uhqV8lBJ0TBmq$$^ z?i~y0ioZg{KEoj|o>Q8vJBMsYu`z5=DsvH;i@iXeuIq$j>2aFIh4{dhJLuMP2bK7( zz~Rc|6U(i_1LoF(%uXHQi^aKHZ{QzI!TOKDEp%m}q;yeQ`?~V)J8TBb_$GOgf z&j~p5Qq{JctZj?a zqlcCR`o-WM?mEr3V+hvgB2F^Cu^jE-!#o>HhHpxA=WBx7&!(p!=g)~%KBK%UO>F`m@HP>k(7r#wL!kjhxa3hgo}+(<9B?3pOBTw^9LS{aku_+3O2pC64C( zKe)U)rNky@PW4L&DqS1y*CiwAo>@bw^or-B;suY2Jy1=&^+O}-GR^$`PQn~BEippp zF*FT$GGl5cG=}s#OA%%RpA!+9UNWk`8gojv>AISOZ$tTR>2nvKN9V>zRIVB>Z|VFn z$w=R{A$`}_8eG3`Uz_;)n=j5+{1Vn{QCg}+>t|uPJI8QKhpRR7;q9uuB(;V@K_~9t zv0`zpSM&^0^2<1LQ+uzf2TI$fofvV=r%}%)TuN1)g|+9`zKCs3 zj#wFTH1W~%?nuVR>(2(ps6*{3?*TEXh!WDgk{K{Jv>A~7s`**F&J31&#zsZ~Uma;a z1`7UgM07%f@YfD&UummZj!pp_7h4o7HkP)53jVmX=o$Ob+@Y*0k~fm9zz? zb~8S6K^40sPe1Ao!r3$fDqF zs1t7jcuL&qb{EnkxS{ooxZpe_8HBdaw%mGmpKL87Hoc)yhCsYWlkoM1sk0d9uy}jY zJN4&r$DHzzTz~p4c6nLzl;5T~vmy-eYfT!HQa7o7DtEP>T2y}Q1p!vKS|Q1O(>lb% zZ<+IH(u0;4paQE$27wuEjCb;q8;i#)87Ot0It9-BMduUg> zbS6{U$FeQ&BRVqRxb%&0>taz0_WlpDuev|(=4ZCw;OUiL_K>KAz*b}c9p&Snuh(E7 zQ6*g2jZkTq?~&e-T3t+9=pQHw4$^MN@oU4o;7gCSK~~bEG9I!uMV}~RT%J`*_?)b+ z0yHrm*)QImg4D@~Z#?AJb9vOg4$@3ykQ}mY*7GyFzT)KJ!h9=&w!%2&845e+o568Cli4S|SJa9S)gOHIC7A}&c zCZf5fwNnis$#a7ZM>`mZbr)RG5BvnLUwCcp9lSagb>3dOdh+ZID$e`_Mw9v z0eAt3^``Kl1B9Y03iGIA`lG+nal|GNtJj4$>u>_CGjo$;DgwmkP~Y+OFq088wfZjW zVWbVnZaMLH!B{^cZ${F9f<5$iU%Us1Nv|5|kNp+V57|I7##COzmT@V(+{)N>s_K_hD|wuJZT~hde6v4mv*xvM z%r6;b-6dKx1_U{wt#haOVnLjlS!_l9ZKq30)AWRq;&H;lwk9;>FAv$fAcLta*oB?{ zU^{&#oBsH8jH&R3vuy^==Bp*OESyfz5WP9wY!1_VkH8RnnHGrQ}hSoch|6xZK9{;?K_2E&Tw+cX!kO+bUmN`ljnsy z?bx>&z8&p^%eneF^pMV0bnu1g3c40uJD<^6p831R#ifr+Zlmot_wNT7U1iggxuU1% z4%jBsX37O4)zziUEE_}6>I=bk8qV;jI1&m51qjr`e~y8g?P|9kPnmzIv?`!ZWIRRAWW-yLs?2q{PA zD>WA#{|CQikenzNtxRGe#b_6dGYWkt%uhCbg}rS5(u+X2IX{MO;4{631=$2=OmjH* zbWFE90)~Z>%;>uVdKriE7xU(4)_Wf{N}37{7Q0@7?hUN&*YqnS-XPXAE)0s#5| z2Fc*Y=ZhbsF`u+?;T&^tmj&0c!$U~N%GNX{vH8c_V)-}!kk@74-It%&WMDEoILI}H zGIe9IIO_-~Af=zWz9?e|YAIv5D!X07==^T}re0!yTz&DlqLZ}mzaR1${p~@~&B<-Z zP;cd7@87`IT<*p8B9ep`ewffryAd#>+MN;KqP6A74L*!*m!7nz!K$Zl{e9{V80s3# z)dS|7Rq#@m;2}prhDLF#(ee^@*0J74NUjL@?HyD;jDmYdope4utqg#dl%>>?i9@$? zZD?`(K$8g$Zaj*d zNUO14UbcL*)NZ5HT zlay9yEt9kG+~Y|DVQzdrlT)D4X?Kd0PTiH}PTA_=k@JZ{mOH&x0E;a5+~2J`GTlik zr1304=boHH2NyXq(&C+il(f}yH!?L^M4%U?!6F*gU{<)D;HzZFF^4iX%*6PUNd8ie znf+islbeIo7)~760FhQR%>(_tj=3Hyl9-o>sg-F zFZBODBH5|yKVS3c8wK21ci$H#_3_a$xGz08)g607-JPZY?RBPV^zsE3xu9@LGdOq! zF2Q8mtL>NX<@PK68@lB`_Rqm)Ij9|)r%R+!9;QTNzw$RIce1H#+$+5jmZG!m)&EjH zi^eWOD155z);(knEKxcMXw`~zx6irUh6*x({@@DlUsir-GnXm2-I~cWID2J01~8Y+ zx&Ked|EKZ%pAi2~{L9a$SN)SG=CU*{1S;nb z*th=)8AXc}1FyDgqXtZ?ZtV3 zO@l=PFDU_dXfU#n!shzfScTm(VP%3sBD91WGLlwWWU-<6broC&7|+YFc>sFPDYOl1 z0JUDDIdf!~k1(y4vpF-A)P6Wq)9JM7gKA1b_8g84w3f86;8#DH2#j~{sph(w$h&~< zQKXDW;Sd&GPxJw6ZU;;zcM&xiGch^_vP=0tf~ze>qppDTAnF0>TI~^Z%M3L1&BfDrhiJYF++9YCx)0UdtDY2O|?uZ}f)S0Phlkqx9Ib~x(T<(D- z^y4Q5u@_%*=zgpzen<_PZw*hE8WBmIoCR3PmnCImfMe z>}fd32fswBKo-~ixMIGQiH$YpMJkvL42Tq)Ty+)svfQt;OdFX|kM4Xso;PY)B8GR~ zClMPZ&%bl&^IG^9QCF2PN_{fOVVt8yLr0H%b|)fgEbPzP@XZ5PL%^-2UwUIp@rGHz ze+CJ|?wJ6;|5?2}i9pze+LEShDvA>$}v0*R%;20Oa1PwaS+j|lf&Tdr^@9)`LS zFpdIxnFS?CL4b;tgv!{6WTe`AdhmANrLxm~dbgF|AC6{J?q9^d-cxQMILnZJv(l%m zCgcpq;-q*~CzgWL6E`5aD-9sJF^xI}9bktKe`ECGD@lvCsxkuu)BT!EgrntTXB|qk z;SCEAlv$J=2^kKk3`Go6FX-O@+2wX>EXSdULarnu6{(QZhA-Wk4(SJqm}OXYF+U-k zB9A!^FLoIfR1@9grQ*+G{7?ijwx04`8GR&CcTL20zc|C-OhjW{+sML3e_+!S^b_pX zxpFc|HJV^_I0`QSwhVb%C>$yc&>yqzv`(%3C@+Fi6Z=iRTqn~Y{XDMN!0bx(SXW;Ac`7<)` z4N=LVd^bO zH7V4(M*#}=3N^6EZ&Y=oICL|Kpu~jZNMvxLBy)vKEm=c&Uz6_iTa1`B*t$Zo<@tL) zT&Y6aHl@AQcCQ`x&;xqT9<=wB|CuH8qq~Fa3cI}ak4ufRs~#0- zH7i|?Jyde6`Gbf%0XO6i)9*x5I{dK!*HfC4+_GJmQ;dU0A7#4ldid%hcrM`MEXYht zY;6Jxhk}_}{7WU=WCs&PY&5m7D%CEl(kf|i+|SxZPL8|0qOp@pdN8Y{wR&~WUoV0_ zH3dXN!{b+es-u}qa3b*pIjG6dXb7TcfDsTWmI>{zKZKC3#3nX~dSlq}M9Zuj^VRZ5a!T^rmRpzHMULGyeW6e$e}Y;(>kQ>EJQLQuaa#p%Yf zTH**$J?5VYxh=V*7C2tC;g^-CD(2Z;3pY|L%3HyJ`lE`iHP^$faYl>| z^_uKcZ~x#?x0^o+FhPE=$Av8sh&UaI#@_OYRZ?4x`tNJqxknwG!-lU(#d{0Au818^ z&UwXrIr>D4400RW;A^Q|$w{i#Us;2+_(X?6qWR|bcGa|TYOw!Xq$nfX<>J4I=!e&Y zQ7QxC>TWCCx*h=Rw#&h!vTay*QX*98zGWwmX@VCi-yKMv5#i z_WYQWpq$h2J}ZEaeU@waWw&5J&tUD{0{d|bTP|Tl%d2qkZk+NLpK)dFCe<6OX(ltF zB}5`b)5Wd1sUEJ5X?F^n9&%G7wK{>yh^}7jHZ@C&(f+x(Wtl7wDMq7pdQ-YRwSggJ zQBp`e27K;yXf11Q9C4t@q5fIDVWpMd!KV#`qz)j+v-L-@>-JN`=NO)#K=H?ircdgU z(oit=H7Nz6wI)fHF0zU79`_IHm(6yzr&G|XS?llJzMk$09Mc8+HO}nX_m7Qix7_6L z#!T(Glp^y6tt)``coY4cuR%MH8z8ile#!pd3bub*SB~U zC;9Zk^Hy`U2eFt%CEsD#zwA3sM+|YUJ?RL!uRO7$ps{Z~X9DrR@;95Nre4z+_;vB{ z`aT_=fA0P&d(#vZeW#Vx?cU(&=koUpwaB41cT35l1ggK1Gi|nBdTG2@u$R1h<%y&w z?Nbzp**SLFNq?IbpNrp=#)%tloqr{O>AV2Ose6*Wle$%4v3zMBViy;Mc9rg0A7TgD zliZyn>=kxbba}WJwQD=MOkX4Geyy9Ys?>MpC}ev)ncTSurwuwB4*QQObYMNdo~wXu zv8x|wij|g1byf@QB-0sQCKelKotcDo9K>8^AodV zn^ByKBT8u!$2j?+6!RE7qgnm_hi05~S)V)w$BeF6+WME{FDe`{S(Hach`Z~F;)@s- zu`!bXNM_R|@J-ECwjf$H{5ZOR1fz>Y^Qj44x3%kDq5YB4DU3 zvYs6hD7p;hRJs6Gxdk=DEM`^N4MkMBC8p&3P*xEkN$je5W>=Y!Mi3VfWi-jZbj-*2 zQkGbx0mLA#!Jy5y8rLO)>yvsDLUtnFLLDhDL1>%aJCJ#t_jF8H9=o`C{4KUJYCue~ z6Roi2$TpLTO%Y71u!X-9i!%g)vt++!*8w3>m{Ex#t4^)l)Q936>;3E+_6$H(Z7?-f zXLH%6qweJrR`p6>7*OA|^>Y$qr7Y8Xkz4S7)?@N#*5}Bi634|hQ65F+9A~q@ouVZuK+V>b)%5ZyRcpYVU!O@M2yTJ_C0x)dT?*+`m92zQnM6B4N` z21KbAuXBqku9|ACn%Yc&Z;WD9d7pLCp}6E5PXzP_fS!#vLxo{0t7!?LtD~i)qc5u# z3N9tXLRlr6N@E%}|LJfb@NF{-HbV5YDQ9OygM?)U?_?D>G1h7&)q++P3q!cHN(OdD-E2yVQV3#`9u^s2SpI?eOC(j5)@qoT zD-K}LyGM57;E&pD1|>cm-@r!>RK(OjpNfFein_wpO?9Ui;}5iYRf&%PuM zjh{(|q4Ak!AGasPAkfX3RwvJ}*W>4Ze=)ML>;3d`_#Pcz4%wR!REy6C0{uL7e1iXt z+t?++fTNv7Cj{LJ7nh3&C!?53HzX(t!M#ib6jqUetOT@x#>#Fs#5k>v@2mIM)*S*^ zaCCL&B-LW4_^CRJ)K!3^Ey&tiCnDJh?*);{V@pmHddmjG5q@Ey3nH=m9{$oPKRmTV z(yOY%zIZ5D<>~OO=j-tA+0MpT^qNKZ=J|P3lf~JO+0B2aU+359;pdsJ+atwVJPLL`-FbCyY@!yedbtfd*) z8F}4cPMH{z09#;FdBna|Mc4U`a?=EYWOdQKdZDomHBM<|Ps4bZ+6oeEYf3{)*xQp6 zkVzj3tC<_Nxs8<};+85lub6*7E=-rWc$&WhRv4w2#fk#G`WpZj(O6o3$wBDiLR>u; zJ2AN{=E#g6_wRI6RR5^Ei1iIlG6z-H0!bD!(LloOJ(iIio|DMGqrU=XaT{O?Bs=M^ z%ZRl?uYaBQKjf#0;6jQk`PZ;D$joh~n^axPFW??WxMa)h(n{s3x~MrVt0pR=5DA;L zV=F&xYLq1Oae%Er_aTGcY3xAN*emSp?ZdH#*V_^!j9BozP0OK`QxpBDH*L>P;*tk! zU;9<=)V=qqY=Zgjc!%4{-akB^gUu4y7Z&MKyzTXxk=HvT0?cjpx+&Ab5G@tK*oMjN zH65iACKhp;bXuz;RUELQNJX$t7#J$yn%_?fe5#FyS8Fq5ha=P4V<+r|f5nGO6KP^( z)g-tu9~S_VmN#?#P7bG~AcDfA7=vB|Q(_!6y3(Y_>JhIbt%?HnlRey^;BU%{O+gLP zWpqPW59zz_G=4O(Q)>}-Na|8EL?zRa=Ex0h5jE#-ZCnV z=8ONtA-Dy1OK^7$?v~&(xVw9B_uxKwaCaGk`w*PL-3jinJiq_hv-@IS?3F4}ZtzW*nz(j?xuOj#cFHA*_721JM*g`AxpWYl%wNx+rx1QL>;B2)SsgN$ zzc%*Bnr!wYW-OD+-Z{suN)-wPCt||fQ(!=h&Krn$aNSw_HS9I}kNutQdx%um=2atgmHzbD_B9h zH+ZthO&9-jYd&|zCbNA!^5^;5n6ny`l9>+Gl^PV-LT2BoNopT@!ZVD)k7*WRLSWaZ zP=0_(s=T4lvC@R(i+kIj`iin7)aOaDhNP6nx@bS!VHxHjD%;oIt z{{Y*|%}c6FdAI*hm#Vy65{8SK_&Y$4h(Nnv{m-YD`T4!^XUkD(B5+&6KjpIto#GaxAkI2b>mTUQYVZ(r<5oEa z;EyI1IUxAea6TlznosogVQYJHcQ@1T>3nc-xSLn>?Dghueunet(e-wx6GP^{Hk#+Z z2(w-2*~z6TA|8VU(Cc@<)%)}!Sb~B4|ROIu{v@F}#+EEm>L!dWHc)9(! zPLW(pWFhux6R!&Mb92cy25Facvm^mH1+w0ODX42|@4#BVOD@e3agEii_uzEj zhwBvIr8bf$9}NHQh&RJ$-}3u9=e=8a@~2>o-t@5g$zTi(l%m=Pu$JE;qsYx?@~3Ew zpBZKmJ-huEY&?sLeh=SIb#A%I$)aifCnI|HB>>l33F_CtZS>rpLkYkQko5_S@9(u# zh+%USXXxJ-(X%N5_y=Tt_=m{wpvrLiWP;&eA2Fm*^KpInz7K17zF+ae{_p?$F%17c zw?H$(sRMR_tXFlyL38-tRy`%l_}+&xLN`)mZ*Wp%WBq;pK@mM53BV?h^&c4D%SvYx zsM>TlNcyym?(ZDY(_gAPdlm|b#!B_Qi57~kWe-@f)viu9=v-Cr%jx5KU73sTK`2*!7_%A5A? zg(r=+v;j;2S@*&Ct`BPi<3Mna8*F`kHn#Nc3ca=3gH!DqA1k(CPFfj^+;x?@^Tily4cM zaMJ)8(?8Lejo7xjT1#kl*zy9{Q%H-+ z;aO=d#;7)WhNa|71qx_J*?y{cnm4u-HV6K8rxb|PB>YM|eV7VspGe)V1plVtwqtd) zOHBezE&Ld{z)EBvvjZH2tRIc8+dhWSk@j>f33l`Kc7WrjYS7p9dwQS#-Mz+yJmWhO z(|`EOoNiH(RV`6N(w=Xu8vv2#0-FOwR^@5YvFD3C>%(1Wp**twjo8j86=_xR4mN@k*}{VekyFg zMt|i@{KlC3mS5X5*@4+Da&hZjJMHWL<~wuH4B{>3tNGs*tk&G#^=jEl@oG*ZIgJ0X zcH3y-5qF|trS;{3X5uxIXQEis7DjIPy@zK{yJqG8L*&2F-5!`7*j@OB-Eky(N*9)7 zrY*TJghWKg#w3SWiay-IP8S`^ETzS~#-lMyhqBTVRQ+2Aky}HPS4P3BabaQp>A4nV zX0SuuX!hkdiRyT@&Hq0DcIAn#jBU4-d6Dd)w{S1h$AhXY%#F9z(Y}T^ETN}0J=KMZceaJy@B4)zkVvw=6H`R3Tk!CDn)NqF3GU0yrCU zkMGD@o034(k+{Als=%WT?i2e~m)R@>S>#rYW{S(l@oWrh_*CaFW`0(+5hD40K?tnG zoNXfjM_W!$%uVXJAQG>-DYqDMSa9@_sJLXyud1L_CJvd4vd}9nT)~5aVoa_vHXygv zUZBCz8&F4r26GLWT33C=2D7(RF|VTj#4z{?Pe+6Gsi<}^{O^<=#~+e$ycsi`C8t<4 zQkZOQWVZTHW*8<#Bu#F#1a1`TB``%Oo+|VBs&sCk@8J_88}Qn$Eq%%tQqg0taV^aT zTi}sY3BP;6{bXE4dLBS9Ytn2nS(;|Ah~nRfGnwtq#!NJ~{+lvz5iJ(qVdpAB7|KIXKX_K zs=!mXxdcX4Xt*SRfnk>8{EUMQTY)D|pc@8h)dT5SPPdn5H>Gf=pqB7h^Jg$uCzReZ z?Nc&ZObj$2AE3-hMY{Q)d4-9jgp2(UoWvW?+R*miNz^-`E9{NiX1lCe=KZKMf}X0+ z`IJu(8gMGpf0RJk?o2g&pGT#U$`wM2SVoXH<>ZwM*WT(1F!;gpS~WaEKHSPjQ&kjY z9`!VmW#TAa80-$fDW7EIk}N;GHe0vv{)6{9Z^@niHX=2lIo)R@uLLI&Y!b1{DM)=G@oJ32~%{_Hgxu82dYUzl_ArT9??feiSr zUibq@DMwCnYJJDS;S&B|W8{e%j*3UK5kBPVXFK$$T{qmS*7He(ZiTY}oL3Lvt z$6NN4WXWLgF1Xk^*)m98h6#^m;Pt z_5uH!08gj4Co#W@@TWJ5uJIj9LU7z3ulD9uRc=F9i5FN6>!>EAO{+HRiwGP{qd=<#gP6zK) z^)kGu;=*8RPd)XMv)IK)!eUyiZc=>+SEw;wJ|vj3E4VUt!l(TeOz@2j#wwJE3|Sk> z!E%u?+lbWRsd&@fo=RuFL_IrFqzWfI6YkfH-&(BrHa1C;74FXJG?fAQAXetnrhPa1 zSdxX|FiBy^BIS5oE5t?2KndS!SDCKHSJd9wt)(1f)#LI_FUE#chF*trn0gD1Oc&@V z)nCtsvxT3dVu^0QIfmp?8M{n@s);s9MF2OWr zD=8xH4mcIJK{%!l$EZn{pdJm2Qe!b}RcTAV|!Z5awPY9E4Hx9Uw0 zPU45^+cU+aeiY4F<`hl%i$%tNv?h>=aL}h%xD;I(G`&<*SXqyg7*Uzk)(Djrc57y> zhUiVUAkle@i9WM&>db|;$1`UEAG#WP)On8%{2YGO5bu^zdoS^NNq2er-)0l(?neh?*lerzE9) zG8gKL#~(B~m9}e5)@HAl8qZgQ{QXnE<2w_)Qf*p8B+eBZ#eIuZ3u_l|p=LE{i#7H9 zU50ZQ`SoM5o9rj=>0i1%>q90S+a zyo{LkcF%ymm{%5*k`}OeaiXm#$k;F4!9#e zb8n$N1taxbRF!dPx0URvnVI0+zM!b+8)WeEapMs3n0?cV6Ck+_z~95rX4Fi9hFJR5-a2hYGTF)&^pX|8sN{i z$ohp`v`B6fmD(qHDF>t0uf`2U&PxY8I&X>_^o+-Z5=OpDi z+5ehgB1N_f%4TdkH{DSVms{Vw6va@A6?j%0Xw5?HMp;$yuN7<#S$N7SOt)F^z&U<$d8I1tqqX!qI?ZSK*;tj*M>h0f>;(;k_0S5!tu6%KoC(%NrIBdbJ9{(IXjqKVp*&X^+&1yr z(A=1egPHB~Y{d9Twm-t!oK!O3`r!}~B?H6rUB|nj6;B+@3!>Hg9q`#o)=J$m@f`-5 z`F*@8iHF45w3@6VHKCy##1$Z1QYf@_Sj;J72kM`Y{_=j0k&j3F5%`rmqkzjI7&$dg zvA})|Y>~9#ed@z+Au0+OtvzXeuYZTRFfOB!c2lPcAj@9VC)9-UoOkMX zgh){JY`yJoGBl5Q1~mu`LMWCJMY4T(?eL?>-HHp%xcV26#Np#L8!dR7FaG8tXStUJ zr>)WEUANEt!-L8ds1gOii*=$ql1|?_7D(dV~R+gD&2m zam$*!)HK0N;&1w`s#GV>A$K*Ik5Xlr$arsQV7zcJ6d@QYOc0V% zoU+-J^=@e&cS#Sx*bJ0+efCOL6~X7e-2WTlGPXh+Q`K}Ic9N=nULPPeV`Y^&8xKK8(m1q&4q? zXB+>_AjzvH-Ij=RyJxjtC?;K(Mc8n&o=w!NTW6(Lv{PKqyggHx&pQ1BclATYv%u;{3>+e*Pbh1*C`6xt^ha=cC z4E4rv_P9m!i~I#KJNBL7?3>Pamx~>dx>k{lR9?*E)>?U=1S%4~ZFegMDuyvX#0Df( zv>H}A$0lJ_^u2^*#|8+ zWd~V4k5|Z_?*)4O>n_XjN88}K-xUo&?JS2Z4oMJP78RrgC=32$C4|rbH&ju?km{qNvg@+rJNB%p}hiT;7SiJN|h0)hjSe`68 z&uZw5w^dkofAWAtN8xtKE4O9Tnu&a*>H<&W^=Tvu6Mn;f8O@^9p(7aAW`|aDD>s&y zb(ceM>hjAS^H6R1q8s*uKe=AsOaUH_2)XW^)%Sg6jVGQazW;S4KUn4J^yny4^-q}A zI}hi{lJfRIJt@Ei()b1Xo9cE36+fKyu(06s@;f4woLYlJv6*Lw41XDF;}M!75I#PE)bqG|akAi4>?YD2_Kw^1{VTz=_eOYSqC19F)XS>ZB%9yu)!!Bo zNEv?ZRF5Ahf)yP=t}TO4UbDUxveSL-i2-P~qlZrrrgao0?RtH=+(SHp>kfF`+6FfO zdW5_zd;hRvB+R7$lJPq6|KIn@zSRD!2r77pRJP5(nA6ubexz*Sn2e8 zpx2S_GgTRV987Zd4*kF-?+;`@MY^8M0{$#ij$_oW=Mi0O1hA6>S2sA2$$aH&s#x>m zXCC`TpRcLe^RZRo?44cqmiQ^q%w-yT z)XM>T$AS&F!N-Ef&+y2n&GeOZG+rl@D?W`a>s8gfwkMOir<1y0*;@0es=u6g9*-uU zFIVH$&BL_lf;3TyN`QJxPP`SLs7XDFwb`TOul%ekM|(J0=%x+tqSLV+^jQ#8Jw*K zfaT%FPEVTHT5Ddl1Z>u9#8~OQ;cZ7Mg>-Zw+rcZ_-Lhx9**Ah`;QMNQ**R7XLc_wQ zJ*4gZ{LuojcdF8gZhaNSmbM0sZZS@+HXoKR&UUoqncr_lG}@X2d8coK#x>(S`o#^y z;asz)v>S^SnsHAoxkOIdrBwBmnHKgght7FwTOSV|_4NRsl>($m?O($gJ(Uw5h^|B| za>H|>4rtQ#=%Oo|1~tn-iN3>0%kp1WkP5 z9qm47OXBus^$5E=$$f8u4n)(Y>%+!Afmn0R9deX)#HAwpWlV|z1R>_F%){L zF6`1sd1s5h^3&X~8PikpuB3nem;In65pi83zfu}xDRdqEvoSllz-K!ERtvMt$^NR; zENsQ_UE|$aKjuEEs)-1XI!YkbaUF56w)aj$wNBrEw7S$5^jm2j-77Wn`%NX~d(r4u zTEdeJP#z?t+fd~#*kULt4b*hhLbD3(WUR7dVV_tgg?np1s~g#2Ge=eruPJ6XiO-87 zp*aEv<{}+#wBOWgF@~MKi=2$y!bVlxXsADW_JD$-CTsM^VM8WtBEB?FHXpSw^IGnA zTeqiDgf$KHn>8De5n*Qwt+8cWgcZ5=vsq5V-vlAjg}`~E5`*aA9v7tPwv7cYc(7Vx zpe55n{E=Zy_`$b!(TXT+F$gs%BuLO)<K^)GNQbFN<4&bTeJ`jRczGY1Jrn{1Hh1`UR3nAd;!pS|6;U6WZC z7!>jGJN6)4PJ9HACG?d&xz^Szw}tVwu%}`TR8T}>m{Rs~%?_rS82bgwT_hsYY*8%5 zzVR>zDTZJqVf>M9AaLJDA3tD*xp(`Uzy%)`LLEs0AEtKNSs|2nctYTgaXQgl9c5{$ zqblUqFTw{ejD=0sXa&j6jEb!IIv&T^cTO595X7B$;x$JbXgvGJBan31GA{~kyma6n zro=$RHzS>%9o_8ANW>$*b4kU=Ug89mia!k+M|NCiD)yh+7@#@9vRZ;!EQ(9$4nawL z^3i*Gz)@0(75Tv;q3=`z$l2r&Rs>7@=6Vqw<>QII&}K*yq4Mpk{+; ze{3-j#bAr2PhvZ`5D81x@_3dQ)EVs{TABU#G;oPqi>?~F@g?4W!X>%lPuVRFx3jW( zyB!F=!G`a6y3M(lY8NIx$~wt;sM=d-Cu=Eho3Ik`Js8T3B2ZhVBm}y8%cy|&CC%G} zjqJVz^RkUq1Q=46Z;0U~Js(5=n!FMq?;=nYaJ*LrxMo97u1zWSrV2Qj=`}yy=Rf^+ zWKJ*4;uDbGaKQhZci($bVd*c~aANW@@`xcmjU6N!8DkL_*^|;{$X?#T`WmII0XhoU ztq@E@OGFqZ!wD7q_!}u z*;=tR=?Cy**00QY+sm03Re*;zjcHQ`32kPl9bnrKp;8g+k-6Co7muLZ;j}f92H9@w zhn#{gqvC|g3BEc}Ak}S2@H!D1f86#xK^_Wdk2oH)+UQ1tslG_IdKYSj)y39)2FqM`r>293Y>lRQaMc3^45Svdz)O0HoUf@44pd z`)uWip;wlEP`hF1=Vh4}P{;bAgZRj4j{iXWexciR4mF4Fyqe_q?pQ&TMLES6y?x6rJz_R22MG2(01=@G|kX8UW< z7ugBv7Jouga;##e|EQ`t}-;>lbPx6avHbs{OkA71$PW;Tp| zPIvDL(hc&|@PV@vEGY{=thy0f1Ks(@SeqA|kidQz<94!0dtF;Ps?k$t2TN;o; zBMM@GntnPZ%sC$I{?@FnT>c*H*|DYnr=@LsHFQb9I{*sD@nrXCb9XEDuUX1eO~&qV z&5rU$jfC)Of5#>9T7`s_>*73kTfWp5*upDY+I_R{DIYCMPAgaHrFaPA4=BVcd-uxh zU8jIut<9Ms>*}1^J2ye8_TX*(R9BB9?c{b3D=k)=ys4(FZF)}RUC%kohbQhP^cSxA zqjoD%f$I#q7JlV?gOv=dRgyZtrk(sju*u9%kVwZP5&x5JEAGl#?hqzd?Tsgtp_HT{2^mVgQ>lx|Q;yQA-G|FCC5JsW zGUMoHw=?lhvxT3aTN=c3Mrtt%v>f|8Szu_68A3xSS(S(WS{iA>g05OCN@cvN^-~Kj z$I$QVt*6!fx$JjI2XxCa0?$!TW|LK=NcRbH91pgi3Cej>w`GLClF10CWr zWnUac&U;@?$clcoI$lGe!z` zb_50pZr<*pbL(%j!RX_NZR_DR8l+>v`k-^6O*hzMvPGBAemk#-95Sr z=KcHS{@F=(2w-~q0{@BFGSPs)PbzSx@7vq!OYUeG&mt`a3QW5l10F(rkjHks zq4*#={#DJSQuYDecARtd&jBK;!>dt0$II}wu;9UANXC@NMhcXFLr=+u|J2Md*wI01 zNxYJ)@!|63?rrrqX{;BHU@UPQjPK>CWIeJ5HXclbu^cAa;Gc+5oQqCU`;faDF^AEe zm=}ZRN=4vULIYLd{3rY%UwS5?ZlR2gJe=2?*&IAC$<6RRmqS@N0-BT#3#WLO<^N4( zgXBRZ!C~iq?u=?TRW0-L`OhbNM z1=3VmmcT#(DbWd57v$~5JVdh+Pnra>%$`#d=$3u@W{P{>bIFv%b&V=}zCT0B%wl+Q z!``SQXN$OLT_`sLDm#xWhK|n`Pih9uD(+%f^Ax2-D?}}YE}%(_GS0U*N7esL&eLIa zbxYf0L$5dUL zzWVV&TJ6Jo1lQH|QmR8XBL{kAC2yD}w{O1n zk+1gM46|^yt@eh+9zn2rt6fnDZTVZlFqiccp9dAwv+%B*jQDG?_z;?b){sadvd}a~ zUpjb9;zn15#XoHyi3$@QJWW=;9cawDtPQ}u`(9IGBHewrhEuxbpOxCx#bkuwV{8g* z@tVF6-{ka_#diBY)vi$Xa71tCtc zgN>-;Jo<+SX>rVfbWaAPRgIt!ffgoDflRw!Fpf5F!8DB0$M4pEu6xi(kt25`e9u#+ z5p}riL?o~CxrQ*a?g3>^K4LN_v|w*Fjzec2qEtU!HS8gNVy-L^P)bMN>t_QXT4iPTwk2R4$$4|`PT4r_g>ofgp@nyGy4j$s|jzCVn6 zyxW`|O~=6@_j`Hxr#xSRD|DCA)tF$oz4L3a%(unc#_#3o^6)l$r|8<#cmFcGvLE*4 z-}i=;VD9UZK-emlfCai;b%2ghg&4ZZGtIaJQT>}z+2rc zMHpiOTU^AI?hOYJpFxgSbZ~%=e>P$h(%xucPJHgB1Zw_V89$$EMEkqymQhM+D~sIJ zKrM6ji)B@a0AHN3>k3e;HQeJXNUH%H|LghEK~F)Pg*YHIv|gI!L$6p zm#ncaObH1F;z@5h=b~t5nlCm`6}UooWoy7pe^o2@Z(bpK=>RY|^D>XYue6;p^K#Pl z?M>Cpea3Pxw?m!0g-wzrh^zs%ABCx(8+g)&l)VH(dQ77{lhs)5lF26{p0cs|m*wx) zL?CUvexIo#Ob)~7lo91Oo3b1Px+%9`=HVTznKo0?h(gRbcDB3EamV7ao( zHtt7^w{7DyN=pcvQX~bkXT|d#GgHL`&R_5D09~lC+?~$8n);aoy5CK5{Cqqe@@3yum zd8Pn8YrQXSkLQEW_vE66BtM_7E=}HNNBd$T@{>z&ndW+^ma>2QL+iELxpsgsPy5Jj z+*LcSPPyIKk}q>+j7iiv2$jX5wndztg;dnLH;skBrph;L=!L<9DMwtF=6xr{BR5N}B4z;Zyd*D*06I<+Y0@OOWDw>dNa}uaBTjB}0>gWKJXtdLOX08x$ba)j zE)U0tc|jQo<4#z~1n&T-ulvd~5#b{i{dKWlJ4f0WJ3+_imn?ogifPJyw3=*$@IL_9`}4d+m%c4~mGmzwNn(L0Pg77R+h-lgoNS6fqENt1~y2u){?Qo~3(Do&%G z;Up3pMIsLS9oEQWJK(fkFiUEH_GRdP7h7ip`g<*`Qa~$`l86~0ai~zbZ=sfcg4XJx zD<#~L))D&F%wjfGw2pKa8@A~XLRgM52Bp34(p9Hmpn3em=X!)j{j^! z_DuF&U5tm<`E2jYU{?DeDJfMMOPMAjMlRVo^qOwv9YV>i#49glX9=&q-@qLNtv)+3Lhgk`2d~B8=r0aIUV^NLK`~m<6|h75>u@ERH}-BT zjcG#>bVwrX@@*Rc_0WQ-1^?wXCI$`Upf%z`Ti$dS(@Q%^&)_L*q*BxVsph+`6 z+gJ*7SZ-!rAlsZW))KrBNn^F&7iOZMAx^Ew#29yU*uzD%xSFR?>N1vhR%{h^>LkNv)p99v_7A9jIX7>H zUDGZ$N{(j%Gt%x?xYq_83w<#hNWq`uY7+GhH7t`$v;CHA&1*8M5d*OJvga|l;EW%w z*0K`H4HEDLdkCKPAzNktYM7K;mQ@}bA}!m`R=K!eH`MQe_+Adyp^Kj8_dZ(zLl((J zdwaV4yuB{})j&#ctFn)bzO|Z`N}#n5%|nmdd%BA?0bY*-t-247178A|(LfJMTu_@e z<0P(M1LDHyUI&UG-UU3pvK`f`Dzc1FOZbpTO0O_c>{gg`HO5HFVHsEIsOO+ zrAcrVSJ8748rttYEEbK~7rz&$B3U~2)?fR38;{4$IR8n&ox(r#{hz5ldz26!B)SO~ ztk8@;P~E2?y!x+B!r}%*Uf~Ka8aYt*&K`3*yNP-tKVujDF<=kFty`)UHlTd$a4v4s z8((KV$tP77X3|;n?^y0I(7|t`GHy;U*gw|=mwtNTIMTzPtlLXrx-k){OT6ikO*hmf zN39}a&sFBSAl(JcB1)4t3y}>6p5#s=V>CUt;XuPU`NQlA7qGy61)*ueb0&2vYp~(C z`#iP=+v|L;3O;0-1UeYmS~E91iX|{lqJ8+)$%tRm2l>p`VV42#lQVBI(`6AdZXJM?qYs_-jGT}Fei z4vr@vwWRMk-FLVQU*k7wku$&_jV4!x^LvIJvohy=K=-+B*G|<+t?SD2T}TG4!ra#J zB+jh6g=k6xQb8kM^BGUVAUEX#W*Ip6Y|t9*W@-E8@Vas*J;D({xW9FP?|3@icz+Qu znwK9S)cJC?{ZSStG&}EuvUC=bg_4eAEGDAx=qr1n-nM5NKtYY?umqUjP%K>T?88A< zHmwA8dNfRO)u8Re&6jUwjq-3hHBSqLgF@-_>9MJa97b@|8o zGA7pynl&^RyMy)Sah(EdYk>qjmrUbMN;ZOdmSS*1M%m#Popj+T1r$&S2tnrjbif)! zJBalAExFf*C2zMH!LRt9ySV!hHtUY+c*M9&qud`mQAdV;WwtbW;vJt55C)z?NLwOk9w$<`OnWB)FGNb z(J5``47TTOl$?4`^&GrjbR6qA?#I3H-7pzL7&2>www{vRyG&Hw0Z$US@Ku2NI4*LeX8>O@MvqvpQZXY`YJm>GQ1Fx+g_K(QPVcj&6cZhz6 zJ8#1WpPbBrw6R$0p>iy8aI!xkMk2vdhW-WrB4o8$Mx7J4@b zZihYc8c&!*w)p+9EKtvH&i?wK<jqrM7UzE zYD$>{?^V9$S&B@$!>oDiJajG$;SM@1$hH&rnI20U3VgPSd$mxDju<;qT^8wk6Gh=x%a=in2dLva1ohuN z2~>G-HW)*vX(~R!76F1AM|29C(q@tl0~0q`f$`wMc^QE~C^3K8wsUs86T%pRt%>~P zcv}jcb2O5H(Q?01hp~Fg>>BG%&YYleF`nHchV;(LvPw9Bc}%wezrW`at4{4ofBXsd ztS2nUFH$(d*o=S$8odwC3}lJ9+;gGpw2z>VvLip$o?^C$MNHceZj+<`C4>#-M9HCl z`2vOs5fVPyV%#9(V=zG`>Ta~Uh}5~Ap`ba2{bx-oU_C{&=$IvNmYsMhL^#%MPU5{aNGnUL0g(iDV(g1HLW6$52;WPU9~?e0<`josnwXue zPkGb@gD~#RD!0nlD1!V0#lBJlTBGxPas#rDu3uV> zq4rzzcH&iA^KMEfZ@&PHu)-}`*Dr(f^TU-|`648wz3(?$J6lJo{w4)QuZxzB%6I6s zQ)KIv?J2=iSX4%}WRx)1+^MNMLJkK=Nu4y}#bk!vw0k|7dRL^&@etJv-5~qY>oQ!A z(|7tX(!ty#qC*)h&)_uffn2ByhVu_>>Z~R4;w6xp?4<2x3uW1!3Y;%1xm`iLjDO<HtBYZS6KGQM5@l&< zA<=)eP>_>IS74_-+;8|rcX$Z1#+~PotpE#YgkF&2;7;2Z$i$eF8-)S=4XV#dE?KD| z2J$#94onic_J&A+j(s$@!BuLv{+3Bx)IXjNsXn>m%Ux?U zpo^C@`m}|nlwg;}xhz3FTuT1sfoew+Yw0TEojr~afT{FBl7zTpuzshNYv$1;O3dc# z$|8iW2CW=Egs`#3yeNL%=|AXEVa8!w>=$td4n|svWpnV>8CWb6K*-qoIN*QUpS}ki zu%%$gIX;j$xZgwFCCwhKgv03Le%cfkm`GOBj-`nye*HUB{yx@F9G(1oM$RF8$V|H) z_9grWOf%C7-w1xFV7hmwT6XaU0!ZMTYE_rk3aa{q0K zc8P>L#fhV=e&T5j23D3|jk^I8X(*$cyBSQRrMbCK4N6C$S)5)UOxMY+E;Qua#~$r+ zXEbH-m`S?FemPVCWK?s2xlO#pB|Ob;fPxt#cA63E#q%i`#HDY-u~^T9iR6BFVJz*l zNYi$%{r8IU>6{NOd@C}5vIM=609~KND4N6uHZUo|-iQ(-H07^9P5`D05DDwwAa1!Kl@ z(b~zt0My~(-Dj6OtSV0?CBJskToJ8 zAVBiT``lI&mt?EWLeqkRI(?l4uW!ehUJq&(f>WGDMkTS6B&I)oi^-uh{t3wm%?`_sbByTjtyZofet2u^>!AQG9Qz_g00`pwjD4~r)bRFc90%hAsb zlkhNCM0ZI_{B770uZRK(CSobiT6MS%Qyg!N|4X(-}%^T&Tw#Nc^B6 zbU4th9R?>3+puJiWn0aOJIA4x)H*vCl9+*tg{!9PFo!`~mq_U46K!v)lRZnoS30{m zs6wa9E4&mKSD0IU4m zZoZ#EWQMyeC7bnSyOZhT=~{^U5sQcOpWpnRtTDR%FWE@ELkJDGgf}p$B<*;-M`?f| zU0yhaWG3W98>;^`&`8`Q)qwv5k=G#j@T1OwpV5$EM@Y~ryXn;>YM7%7Y{l>CrAYtI z*n)5OfMKfXxH!-Yv=0bw{X7?`$GVWvf(?mBJB|DUDa;#0we2I&7f)ebJ%sD*3C2rp zXUQQX6_Y_sH-ZLY9uw!c=BF%4rt#;gwg*>*HoUdQ3+t57_Fy-xKQT{Ti(Zen6Y%tD zX|T*?=A~`HI+c)5El0_?y1^b>8VV6ml$JXa9pc7LofuB!AQ8A*TJvp1_>36hVWe=X8AXIN_p%0f+-PN^EGgmT@oEg%DyK09SDMLX4n3hiO zJ(HOeNuDMUvif)K9Kj-yYcmtm+ke!gp`7a#AOtQVloc4OsHKeO^<4^~v)5y@0b5k=Ly0(!pc6c4tYJRd#ET_ftfDkL32TZ(-S`M+$X2U?y z#?uDX1=`jQZEBn}cdWehoCJI4`dc=wc;;4xATPa8;*z;m+t(N1d7-?Wmpd`>6|_K1 z8X_quR?0Dhcm7`fF9n2 z`)b~@d{$-AULnEWClh^weTeDFA!>epuCVmf{{L3{N0@3#w(^BsC87FyR^s|K;^V!+ zF+sW3@GQUE?|SR_wqIpb9hoPQEl8|P@X$)_&j?N0%$$K}eV@EclDT48eRITXtAc%C z&H10_+A9aK86AEDJRMTM4eZm6S@MWLhajcrn$F^6ZP1xtzri<0(;o=|`PkXcA)t^H?tvQ=hA4=-v%^J|wM*pC%+EkGB^X87$>25cKN>43OF*ENit!-2tu zQBFBd4?^;}Zj^0{kGy1aK4k6e%-)gOwVtlf!QCa%o)BYm##(P#DtV@xEf(%Vn^5{s z3j-Qwxb~NXJx>k(HIX+L7whhBzt-OO%hR2*{#h;jT8w`OJJW!5!)~AZ6~BjBqyO!i z%iQh3H^e9O=;!qC1>Elc8}H=Jk8M;*-;cTf$X?x{*5}ig??V{7C(y({=!ME=O+YXf zQXqoX<7Kwg4U6cMo}M$l_hcXE6hW8cOrh^10i4JsZf5@>aaStBE2dlHE?|AC6lBiS7suH@*pRk zcO|J7+jq#mBJ)d2_A5V}NYtSv>=C29^Iq=5a2JQNqeGbP=6~syz#7cSY{TeUoPhBG4Ds7M)SqCKp;As`)19qz*k6%C7V`6&5mMc9`CU6Hec;& z>^IRbFCC7A=y^4m0=3KA9mR3pbgna_JA*8x7ln}lc2r{Pks$=m-=#QXmtSRs@wlFMo2TfFW}5uRSY z?|L`T5){Jdmqur;Yop+lP?;=7s6>m(jiLPUmgYE#%IvkwUFFxaKxop0{=`uUnDZ# z_tMz`OCN$0xuhfOv;4Zl`}`zbUkPulJks|^DX5SB z#SezCSummO1kscficxga>P)z|Mwkg89uivY&p8>j7t(RDzAj%RlN2#~iX8Ct z!A#Pt`4V)FPh&DS-StgoJH0SR#!WL;y>C!B>-PMwVcre!_q8#*yo2v=^0^cyYu@`b zuRL~+e$KOvF&th+t?@Pj_&Z@Sq*Ab_@1h@s@6*{Ovv#-oy2U6JxqIz zRg#G8Gs*G>G9uYZj5H%VwTR_tp#E&WDNdxfzaY8LBNlV?Z{TToUKwtV9LzjylX3UU zF->AwqcU&n&PFr*NlIg^O9+^rDNWTynIhjq_uuz%j$%9rl<9k0^oW@~5KnIq9d+rT z@E&^f9EuahArJIp^7=TJ;OrEcGx6Yb@eq7hj4(!c`oBbCkiMayX}5!p`#rv~&#KqE z09Eex+eYOQw{=ULPRkn6#-Al_+ZLqXLMp4)f4`$1YFnMEkp^qA9ap&>Taa|^AT(WC zktT{?onQ;a5tg}#2;9`Bh@HKa+GI)o^0$WKP(f^AxJox7OtWt#XybaFt;xW?4?c4Y zmz}4UQ!ZCrPzafzjb+szM=3_c>faj=UcZBr08?Jyd1Rq`iUg^|)1UWBSQxd(WSV$J!@Y^VQ7(tse8ooCpiK6Zs>q zEsz(@c4Ui4uoahINcL+>`LSWnzkifG{%$h)FYKyp=@wTHF4Lid`{i7|X2>jA!d1Fo zD?oBj6l8|W_L&?v&rfbQc`$`#bex=Y*priP0u3ZW%Y;fE7 z$;4kUj>Fd|$`xdN^=0&c=1#3x5yo`P=B3z}WzVGgtNh2cS1sF149QK9eeK^hisU){ zZwD9TFy~T_dw};Efry`wFCNL-$aFx8n0Pu0a41Od>Jqa2Rg$)jnzMRC3aeYdI*bZY zhk%MrP4x#ac-9D-jM;_I7y?3UgIl-jRd>0NG&MFk(v3r(BtAI3225|$?RtrL1Car- zzk6g1DawT17Tb98oo~#0&%!G+vQ|vUP$1kWGyGcV44ODNC<@N3^>p2QN9-gMve-#z z4Cb#eK)2P852ll!b^N5)uKpQ*22s~#KX2il3^Dg>TOQ+g9Q;27e5Te??Cd+fF=ALa2Hu9KCm_uT!wRc<*N z-3ko)WVN2hGXY-$V_zS~c|=1@0-)+V%Jm2theT{j$$vM=*B{q)y%*b{Wn7Q%9-@0; zY-3l%tpx?GpiYn+Mm`GrFbM7OG|`kVLx3Ub{e7=~iwIBB=9!Em8A<#L5=CXyUZqBT4~xwT|Ji!8J721t|b z*ylJjNiFDMG|ob(kSxkbx==(&mhYN`r(O%YModB5STctl7i7>HGo)1T5}Cn0Pk^1# z<{tADAj2YB@aQJapP21W6(XoZ1BOP@-dhzZ?Fq{}bg$Kdi!a0EE`Y zCkPjmZ{1m!SI+q5=w5uAI>!oIC6&Sp3nNJ#A|U{10o`TEhhxRD;4TPaQ?&`mjPK=e z3gajJ*w~!oj5-(FYhSn{TNsDNj}yZ_)}h6}veX%#4~_6j-n_I9A)E3xnomWcO06r@ z7^*&$upP}sq#t`U@Rd%qy7b1xShzzCtCK;TDV!`#C-Mv=-+^BJvC58Snx9Z~2ot&5 zd*}(xE|h^EAMtk_vs4n($_hQ~!TwiDK;D>$drQd<<=71S@KB&TWov@bus#;${l@g0 zU1mcNSgy#m$v*}~uQ(Sd+o`DDAfZ{+H)_ta*C#t$iW9!p!*)pTaB-#qxIZ{bE6=_o zF1nVYD=nn3fey;JnaE}7HafAd`BNH2MN4WG+U)2+hmEYdog;v2oY#<7-8#z%7u!Uo z#e*SN5AqYOiEv|N7!iu-$?tLtHkcRazpF5_707plql}2Y3+C}5LIY5t;MVJmtQsd> zOBch8#{-mO8`JhsJOS=DlMK`LOa6Ryul@ayk%jg)+q3>J40fAU+t{0NWJSTfRt_&m2?7{$cn0phd1352KAhlga3-3&V9%+KFcF z7WAkrE{zuMGwE57js$5W+AU$oYPv;N9U$sFdl9Plui!%KB$%=38nh$$2A2YacdQOK zEO;ob*{XIeNW)gXm@`&;qe?^RzQPM&q~{cl)oSKhe!O&2WUY_1lfB9nd5m@hp3@Ny z1A+MxNmih}2#Xpx_@GOGTOOAbMCX(V!?f*EdA;UpwQ_l2U;Dc?y_@R*d`)1u7x++1 zrtz1@YZ_08*W3Wi&isWME)m7A)a$(cpipLFr+1t@0yW zQP(EjD$mu5kJF^Gg6MI_k%#zEEeGLd+9w=VMRa&G!8cv$kazWkk>o~ksoaxRYu?~7 zmLq$DlbN<9uZ*z!O3b+$6qaJ)AI1UKFOHfB(t~T$@vKXYl+jum`(|vn226`Mszx+(sQ%ycmM zo;)G)_zgZ!ekR{`1_fo3)E@8H5)}he6cv$4ray#P-<8cT8!@5?!R@85_W;bVd5wdy z$TSR)+5)GQc@^NWUO{KM!cg=5xbG;InVdLgy-*$OJif}LZ7L`ilOn+^ILU8#Aof)! z`$g9dL|YnqZSD920_&8NLU_S5KPeaK%5)(^rkrST@W#Rzv8Z0E*z-JhE;cFGDuABq zJC!8L?@}1a?F2<}Ws>`b479Dpbp6M^u`uRemy@ zZS{wk+B7cZ3)vYxej-NlH@Yd4Jv?8yQD{T?KFd211 z%$SDBn8@p^ZjvssXBs1;wmm0#1Bm8Jjw!ghNzt*ymGv?;?jXK1A=nh67fj2SiOfR- z)4*!)x-_bfM_giRb&{j)ZhAq=qWXc<<4PW!Mp6{cOOVb?gT|&cFzdf{QnQ(7uHqiW z#v4txyd?MZmv#Lln%v|_Gu7y^fH$&?iUk7?={4$DDwoBIbpBh&1yhLhYxq{Y>r55y z`2Lq}Y~^)Tx-zMQ_X7*CMXjfqy1F}7_<%GHuVMD_J>8pT%ahoR9+MKvuHUO_aoz?p ztVNU&sc5n(@5sV~_@)TH7wGvggMk*4$M{Ejk3IV?u0;=6Y z(0_-hHVdL%koiZJ<@EFI8&*5&BFjOQE!ve=jbYU8lsO8+H*2i|ll?xEX_*dGE4X*|* zh>IRwNo0}t#bW3>66JI>{tHMD%Bk4f`kdPMNw#eBq3QBIDKv2`wv7SJpsI{yif-^~ z^}Beu$(dw@9DN3X@3RRyE2^FvEL3+l?Ab%gMW5}?4coynwHeQ8HFBGfy7eaW-W~tY$W9ZJ2(2hIBmqDqfANb zL`nDz77BjKk&M_A#nh84-CeSHp5>vLn5~WGqNJP>MJRA#S5>K%w|N;a9?@WKHtpFU zsmNal{gIFEm<=tBeytu(x3>=;hMEMMr+3r3$*+fw+exg;TD}?`gb`PM#tmKg@_E!7i#Y~MWkEoAqW0?;d<)?=DniuXJZ*6F=I z;IsQ)ZKFO%n&>A6qUSxkoYdoX_VW3oyOuA-uN$?@NGb*Em%~{2T@ur=O6>iQtl{1i zW%{Fwswd^?)O0#{V2UJeY{@|ud$hXATwj0HX1H>xmps>elnA_u=!hBqQi_+?%hiSF z_1(>RM9+TpfZpX;tP#DmQ~G3y-ux#`!-yQYe-b7UW!o*&n6KUSg)~?Ull~BCJwk#R z+XUWqn9MeSHscx2%Rrrb&Mz4wuhdFirF2_My+=n~n>36=NWoVqHiVL(s?|7^1k%cx z4A_vLOHAl5wC3Z{{yRHVbd(&F3$?U;NMk`say9NZ8-r00rMyBk+?@=}|*^bne@<0SedUoUZp`s_A5h$zUIO;K#vgj<=FP|CoT3I~F69J9;&T6!UxS(C;wnX|$^BBN3+bCObao~RaL;e=O#pJ3CFIamC& zh)e&cA2YP%hmN9^j;Tw6!Hy#E&Wz1D*<#dR22Q^!j00o%C~DT?OW4@1<~*oLBRg(G z;XD<}H!fviVtX>JxpR%8Zx?ao*qo0eS<`6u72m|9UdSD3}p%polp z6H|@3C0Wz2$XUYlW6y0Z|5h+$Qen1IrfD(!)Omv&u3;otlgpY?!{-LZ*N`EDO3X8f~(mSj)Iqb;1{?7`Dcy$Ld?-=|&!dzOG}TzR_O+I;5PI=&I>Q-3EV8 z%fwKJA#TkWLuJI{9eZq71AxmXfrxCTa|6d~mWK6s{_T+P1+ks&_49bf(#E zKZhUUTNs0Gi!byTy6V$vIm|5dUk&JxfYy(DEekHNg4%^DFJun3KZ1K zF%ow%){hhJ?~T|>Lpv3>Udad7V#4HnM6D&>l+!m2B0<{~!c+Y@ti~bbQ8{dT1;cZB zC(qxPNva3y5hk?albT=w%wcxrF>x+%HVB$1%5LZqRR;D3>Nxc*uK#EeaeGS8a(Eg$ zMHdK^`L|_!E5e*IuQh8s)UvtyxkOUO6e+tF`g7wv0Roh+ylb6}ZV?CJRz;{dZ4K^I zr5ZGd3v`5g3}s9&j23IOu}i4QlNQ^K{= zG!tD8E1?PWgv}W6(>Ho>X)7kInt4fUZ-RnfyGSv3$DKQiN?*e+$%m4_iejHFkeTx2 zwkjfR6+g4G)hS}9WX_rvXKiuOF1!$7gm5ujvw&tKtGQu^6=5Ct-DxGm* z=-Qv^KB0r%v`kIL)?1wam2UzunwA-qiJ;2vC?=JTY_@?}sSLOBNmXyS)JZc8v1XYy z{E_B+`6GPUrM_)yu$0v3M1Lax>9J-H3U4ow()KB6V~?v^oZSl&Hk6K@vrOLI2Zkyq zHB1-{x07o5ay+%XQ(g?7KXT_xT|BO!^j~s4F?F>WJ&##!u=dSJeU-3%gz;nOH2HX? zPnx@LNpu=%usAv3^&pk-(AW*w3L`vHXZmJmDZjp|7Ac4860o7WC}ci`+DH&2UGG-n z!T~2mOl}CXe`d;nYcwVmsxYWbsc!vc&FBiA*;2meiHCA`PaT$}Hf~Mr#bjjm1N6wXqc4mi?*sMQdL*Ya9y-e8<`!F~o_rRKLwD@BR@MI(9`xAkJIMyMvfC%kSDfY05qUx4Elezq@9v6;0 zfoW)CVPtXFuVVdqW*?z04}JNK1f-1$bk$lh+U`63RJ3#Lr&IJn9}a0+JNmu%@m-eD zROc?EemK?Sh!R$E?ZbJH_Md|ptn4zi>v33D+--r0E0_S;NW5R`xKBhKb;hK34{*PN zC+P{_X}qLD8~8b2IGhM&R(uqFdbU`Qb{WO-_Cj&1LUGV-{)pYz>}IC^O{R>$8a9xl zP1fTuSnZ;MgLiu!5dzYvFsD{D!+xLL#SHT7tWU*++0atp966MhE0pj?RcJ)9mgp%W zR6AssqzC{0_V>|wLu!d}OqIF-jKJLrp(kZFUSwEgzuZf{9yg6|d$~Tz3&{Aor<;21 zlh*gC+oxr%S-UuQ9hrNiLGVr_6R@4|$w(g+o}AbP7!tW4%rSZ6bDrO+NXs zOVw_O8E1bKBU_?p*aJtB-ifn#Y&%rr>oV)ji_HIfGcqj2SBEq?C^(k=7gH~*E=<+d zAQdXaI^7iIXZPP-LoVWeu32ze-E_iXn+h;~06lJwA=rcJsfujLeyTwt^;FUMTUAMp zUQ>t!@L6LW5wX{zWh8DtP-{MK;6Cy+7@PI--^-a4HXuGmp$@xQSKVcDGlsGr@lo`q zL&o__oI6xqh}B5}Y8>&Ja5xS!e%D98xU{%V4gA8VGFcx{1KbY`ex}@E(wZ!#q0b9) z9nh;+3=P5!=5Vywr&c1v!cDTv(?j!aSz(oRJugdjqF3y+Ik=rg{Lb>oWKdOg+UhGMzPUP1`pSu34&{+h*EG;-DY z#JYXeG#*L8ni0QK=$Uc`-8AC4;r&E9sqk#3k0)*f?zf{H4kqqDi1U)$Qhth7bEn0Q zar6h@biPit45$b4Ql+X_rIe0hIJK)5$1>r4rSqBTQaFiE;U80QIl+_toKJ=GQQW}^ z$k0o82QEYmC!S3-_HlF|8oBc1uSCJxDx7;7d_*;=QUCs87mY7uqjOd$&rfB0RbCQ^ z@$1<+tiqL_v7=LVRY)6ufJLz~0TTG!p|G8oQ2$m(TOd(wsgF+{D=ArbWk;~kjDa!w z@Kan6+~Y4|Kh>};r0H`pF&Z$JGLuNhpkGMQKywAOxP;~Mq-dFHBWiM6lGk9QoJrh>8C#Iaw?I(hO~{L<{6XdYE7Np7QGM99Hc||`IH*2Ay-bk1_?0L zWj@UA>YB+TCux8t&?y%9X4-W?U_w|d^>y+^6JtT-r+g!5A$q}_?Y6ly3toS>BXbuj z`bIsAS$)e6m1b6}CX$UcO^-63PqODf3X(GHh>N8mgeeOZHv>Smy^@bXlZMcwdW|N* zsW=+X(z`tTdCel$!>X$sb}(XRD@hJDEmL{w*aJCdtG_G zg)GRt_S!0@u00Mo0Xfw~*faBNfOD}rRAKpnQ=Sd;j>G_*8-;YT-W0_ex#I7f2@Tx= z_84nL@cGPq{y`1u>8%nsa&smKyY4nt*B*9pP9OA;{1F@ib@s!uZW(jF_df=WA0)E? zT@-#G&+?+@ah2yYP8AwsJC5c*tlUhgi;ID;rn{9Di<#z!aN&hj+No>g{tIodWg&v= zR*Sn_^v(oB6fANFNc8!fa!D$Z@|vrj@;mz`Tsf07k#J?o7Gf**ArCjv;F{)kpE$2~xl!Um5t9j9RRgS&hQ5aW$NMd2YZtsDkv^2Hkfm;-VTHblzrRw!n_0 z+x(#o>JSw2YNDwhrSXV*`^YPlcB73_&A@N2(8)?()#{k1!+}<4-Un-dwCJ5Im`mZM zCn8YqzZ44kH{VqB_WNSBeKaK&F|*acAOaWR3=VQWX&|dx?^OZxB!7Qx%nn~QJGvNV z%a%n}Z$4S@gSrLfb7CUKVTRh7+ZvNGXIF%F#Eqn2b>S|^B2F@wE;ZyPdfR8yriB8e%quxARMqV~&-KN=Asx`#vF8ZcBdS1Fvsn~GP)qun#9 z*g-^886jxBi<{`)lUKJ*_8>g3rASvf z4x^chNM>y5Xr!bHVK4gTkX?-lKwl@DkEO`|JW{QBx4$r!mrc_@8$0v{q zSua0Cp8=??o@oRbL^Y?m=H2@j*%-q`Ayd@F>tyu^4_ASLL`i35jljLEPulA%4E_YRcwy`u4t0JA@3~I)F>h{ z>93u;O(T8dL8G3(9;g~&Ao<$7c+Ieb_noYCKOpAKQc(H+1{kiuo4ZrScf14~`&_#w z%-S?4K2Aj&0Etw|Ynx^k(KRE7WD&IVM|{UQWc*n?(#||p7Do#gC0`g+4SExM0+cwO z6c93fIpqmb+YTmPJ*lZMshr&0#ad?l>D`X3LTIp#0(RzmH@6w-b;_a_&k&` z$v>_~33w>a5pI|~1lc`ki$reC<1;{BIT3Erj@#sUyxrY|};m?R8 zc+0L;ZS|IND{#-o+P&(j0XawSG=NY%!A=3o_~T+Ps9x}%Zn?5&iA=P+p+$N;@jYC^IUml|VwK>lRQ)S+whpUG;iFTZqkx|}|;WBP;{ zctqWf@MSYYuDz)yr!bF+$v!-ejJEJ$LBW*;MuM{vpzA7ltBogiz(`&1uqVm%t_SI+ z+Bj8(#-4Z-yP2A|*Yb^|TBGDE;i7>t7=}~oxBo?wb;U9$+I| zL_P4&5`B$&OKox4#ET92xT}ajT1ju=wx<)rHgg&5Ypw+ZMLn$fr9WUs9P{ zd5@tIA+f;FYwFUg-C?W_0qEqVaC9!fXseWd&gJRztZDDv*<%8kJ8TINKbA+EVNFE3 z;XZ>UjLquOHiD|6$pmTG%zB8p2Ijr=)n)e0${6sP(j}|2(@S2|{8wGUMY3+dMUu7| zW@u0E{P!0W_g-rxl;nx_`1EP!*p|D+TAkK6YipmMi zzKh5{X6ia)u9tWl%EYw~52S3hzaz_s$r@y}X9_e8^(nk4k7p?c?!awx)GQh+bgGc9 z7&Y6mPcFLJD~)l6v@?CPrJ!juls8ZI&|=nlAN}tf>7;9%l?!*x_ZimdwLr6gvr-3{Ee&q_6yhjVotfY`7pU`Ru7%iQWDv&a( zPN+&{-ICo~#n0WxXCvpu*P@?JL+`S-Uqko2+IiboF{olo(T~8>ttsF6t3 ze*Y3LzM*8zFwmS$x|p^jjmn|GItdkLhI0?pv(q74N~0T-m3T_or5YwNVO=raJz6X< zHDP+j2j`q_C6aLba-7fTM5!T>*Tu=?&IJL+N}m@)@d_JpPoMf|v`EjL-Cq?>?TM2v z@2I`3h*J>+M5-qLqq~0*ZbpgzTO3E~kLCEe#J|q36qfy0v+03;U534PGp=4Lp%pxR zl4-^9E1z}cUa=LOSJJ@lQ}kicyP5}BO3AuU4;9n?(PL|l>!-u3OFaQynhs%kDQAy| z6!L|U7Uyc5w}&&M0cZXTR9it=Ep{{S%k@kDipFW_A!|G>bk)m9akJ zyiHuU;`JJb+NzE2G&M|dt5l0>b4Q@{b}nD8uBRQoHGc+qG=2;D`9vZxUROO!{7^*W ztBG^j^MpgTQEIcNK~qi#663079v!1ZrJeycODEjjv@xl)o%7kAIu})aZHFXlC(2hs z!Dn4w+Vpm6Rni&61aYaavD;qL$^zF{@S>e9nLN`pQOGF>&Erws5I^LoFG?K?(&kSmrhwcC3Gxv0&rXr5I#!juX+pFKqM3|+a-6)y+VCzfdtIpHytMK#rfx{)Un2MdBxkReO8LT*50CD{s(h9$khv_Y zMCLAnvVKLK7G>{)q|r0^pxd`Yo1hPcd_hV*no4E?Xjr|Dy(B45=B~nCW1xn>kc&GKT)NI?1P}zM^V0^lO<3ou^$e zDYMgj@|p@w^Pg(pp`cf52kJ_fcr0yjB1Nbd+nnMs@|3=qK3S?!>6a}uU03<$Qq=tG zt@4(xPyZ|bj{Ro9q1db5=owrZa~BmVdz#Z3x`G+8-;cE~cyr z?0r)xt{xqQoE;Ebt!B9z{GW#JENzEl0?J;ewf$JH48iMEG+*-ty4L$|B4l{0P&fxH_3b0Jsoer7L)21y8?&zGT3oeKP9jcWJ$b|EXIWFuX`e_3 z-Ni40T_UVlC;l2{7(ZqjGx4U;agZnK=O=FkMzu(J<&3GUvWX02iOZ0U2Ri|E(BMxt zuS^8-=;MH0K1qJkx|tZ5%8+UO^e0?NupY%>wjc1Nb&GEr++N+PwA5pd}ets1PvY(iTSUsWR@oyNXj9SIYi%~A)?s}B{$?(OZ;bW*b z)z2d_NCiM}D?&Cv!mvQzV}BdU?Rgv`2bU3PaDSGhD076b3Z;VU{pvse$o{tkt-O$*7o<^#cP7G{e240W*A~=}&*f;4HNI z5gKUq1&P|4^q2xo?E4_{`JhTR2`cz+-A@7K%H!_30CWNJ`jrpiMh0b-p4tFlq1Va| zYXJVoM%b5;Lk+x2GY(@n0M>9)UVNTyuH5cdrQpjr9M60PeA*lrfNEUA^DCiyjAZjI z-}(m87<-W*YM(`|kmA}re9Bho2!Q1vkdf>`-oMS`rTuI!4J@I0Vn@H?M{2UP+fM$Q zzOR;&^EYIff%(j}CH%!lhr|(QaF4oy)$OIDi-J6~i745(syj;1>&z`FrB~UK1_r-E z)|nbR)#jPvl5Kx?=jvIX>UoO_$FP#Ef@F&$ja zWm(XoWNqF8sujYT>PUyB&X>#&DVr+~f=`FdcA%XRXSHAW87K$II3u>6d$cCs_M&}c z&Hpg(`dAW87fbX__Bj^$+zDmCA;kZ8M zw>syj+BfOCT+E7B*AtVe{HnP$QV=^866m0Jz}qY-K)RXlr1y8_Ekg?cElWImJaF!U zSmO!qy*HXdK+nS=`O~2Hg|U+;kjVHq)OqGG=H4zHUf;lMZ8A_XEdcm@6iNRfAy5Vk zm_#-;(`m<}?C+5toQZD~H~Qh&7=SxM|9RBdM^LU(`$rPkr534K!G*4WRdsuh~Sid#5iiz*gos2?Qm}2fe}Z;*Ed@*On^+xo{cn40Rsuq(MRaG;7zJS_}V2Gf>FmRRiece$vLzS0Cv%|A%B4 z{o|KG*E4Rh2?i3z{>re5eXuQ*-gmBtx;?F?OnP{_j4wL6@Ww(UXo9u<9S%(31?0%d zH52d_a=P=qUWS`cKp7LeMo?gItx=Gq2qIBnAZYTR_5!_g)^{ZYQNvB($EYPk=_gHM zbkB8YzXS7;B5R8BnffUqBj8ka(tgI%8_e^@Cl8@$j|ww{a7QR3BA-fSL0q#BfdwP= z@Y7T;2>vt0pd&cBnb;d;$l(RXawI;k(VJB;lL*sVa%shPMDwyvp}Qi^*1HJ_$-C^} zocjg^_9^Z_OR?n+Nh1d>|5qhhszjf5S-fE0e8p*_!R+euG}HPVQgK`Tc(oYXW7%1~_$-QCQENHiXdoMcmY&L-8G^CS5aAq) z{h3Nr`|w{=NeTaXU;L}$Mu3ILeqXL|PfvL`sF8p6_tApP=*j!>4qkj39cu)tri?Eq zOs{--ng7A(e7usPL7+G(WCIIN9t#igjpHOgR`K&slH>99H8(~Ro2Ge6yB6d<#aP6S z3igmg+;wbmqNA>aK&ALTxqZ~b{P}pd)yc3x=ZmJ_UgK*CEpl#RnV-HVfeZBA)8G0E z4+kDo!bNL{V%kPMrO*uTWqYDpv?Z>o;S(t!&;6k)Hya+^HsRbp#yCOKT@Wh0B$!sR zf+g^n>u=9@R;Un_x181olHEjfK5lQDuD+hnUN+Oi^0!v! zP15#6E%?fh4{g1{?9qS^`dM}SUw_?E=o~XZBc|+ZmjMf7DId?YC@mmAy@p#opepl# zDRWWx^AKI%WH3OSt|QLJ7tRbbpT;9+FAT`SE=tltmWcPsS<1O@=#{n7Cs58~#N#)` z>WLz5Adpk6#L~pstt=1MlBYh-AL}kK-h>b7QHLnNNcnnx z2Rwk3iDf|!N{Q5DNvoJNhUAxUqRfg$qb|2b6w>)A2MqR&*=&K^H!Xv*(MQNOf!^9d z;TQK4U>Nk(j!DeJx#RqIA0v%ba)=XJ0WFzH%rVj)`BBHza+Z^Zda13&ZDYyio>^!} zI*2)y>%OxRapsj-8RNeTse#qDHk>x;>Sd(gMwoeAT-Ia~4#ExK0pPT1- z!#qJ(f%=ci6{6D9!K8XLtF!`bL}#ne*2uH8GARkbCBCI6NGDqojq(5&9b`uT>veDCkUx-OX znz&n9Y42`+c>S+ICY5VqfHRG9c3zMJPrXRny~StZO*`8JSD*nHebcF(^;ztj35?=IVEp_#>5EPduc;Ph%+jQ^l*RPUEIr5-eo9#_`Za>rC=dl_S&c z;v9U`ezQ+~T%7#pf3h&VUf+D6y>93IG$5rxQCJ?-HrxvO?GPezxe)q=QME6OXt?s3 zaQojP$fxHE<1-+&Lj3~;cLYA*r9s~8zA(N}ezYYs@|2&GaR7*w=^tSuKai?4Lp_8) zDL*QhdE|y)vYoU~E2-;&=jO@H<&5jrGP}OrBvxC^YL$<7m-R&^ziAIa10zj&_pY$L zqKqyzwr7RC!Ie_Mwije*i0zkCab9D7fFhxU>$cr2jIPbG_jCQi@jKbQC4{^KqSBtE zL#-ldiHRN8@p{GvlR}FWq|)8mzO)XbxucWb5PSX~-Pp(N!yxrXfz|Q5+;_PSaQMeD z6W}v2_VB;udf-(AoF_dtGB>JAyXDV@R%S!#8sd$Ectuv*M-Jjwr<6MM@TJN(FaXko zh0oh<<7->N&#DzfclxRO)fb{%PYz0m0K9{g^P@k1QOd0^Y*8SMxgq~Y4(p=|GC+IP zYXFPV3=hcD0wRO>zqA`RVR_#N-%;I&=7eQQjB3}8g!_v*6#POTxBSXqNS%WpkFv9) z#?S18L{Kni08Y$$mN9NC#WnX&-Dq;o8BG>bI-Gez9*o1$O%;Q?9IxK=m73W#E{~Xx zYMKBO=>P#uz*-0mV8$;W`-6misk#UEkK9*5_OVEaXuypt=v|pu@=NpaeAzqjs#~dL z^OVXrpRG&ZVOAbe<5Se}_}kc^MgPStpZq?u-hzt}D@D&uP+eOwH*^l8@e}_NG_PsQ zLS#7dMS=w5w*YeB#22~*jd(sqf*c1j2E=~_&g(jRCRq^B0q<+6`VJ;XX^h=%q(lge z<{+eL^InLu5=rQTC5U!lN+tUiNKthzg5M>AJyW_R*xq83NEd4tNiherxjh!hNhO+2 zkh{pGUhpQJB$@^tSC>6e8dF`M&x8Cu2Y({wiW;>3yL!AOpx>CrGXINy^0(tMpPVJN zsg*7v*CEVTWu9@s!V<$!U9N3OU6Yuuz|p)v&j!)YAER=wxGcRkkR2>#Fz3qZp9~_|H@fRX{dA%)ej`|MnLqd$`ib+q z9iceX070@0Ya8vW;7E0g=)KPwFtP`A(EEeZ)^D@^KkalhZ^LpOCKp&|3}M89NGbzi zoPuvAFp8ioZ@tkNg6ZD*#C)vJ)V-^ucB%WVWKh)_PnnR`sTCGq0{6NyOcnSaW35Yn zC}!TP3ng(mbHTjHhqZ*H?ksAuEO)tBAOV@;3w2_F?2HXgn;bVkmz6=H<*ppDbwWp4{ zom-yPh8+*VUa{lCnj;kIt09s@Ge*1(tIYtCx_OBBi9eJ+dF&ll(dmOd;lyWIUdk6p z8|dt%JDxsAjp|NF6&t@UkAdJY0w&WG&ZC|3u$A}}v{%``-#N5#ytBs6^ao!cTD;=5 zInTm3LcXLh%`cs)-J`Tdu~$di;K0)p5(VIXH0qSN?84KWR|^AN%%*Ez7ll?t%Px-s-Q*>Rgi}3c{x%^IjaqMC zGZJl8<~8Sp(`JYWp(duP!;Y6JzSQK0HqJ z2|i-ncd7f@`ArB)xg;KOjWUz#0-Y2l{E!eh@wk}$DEz`FsOTQ~-DyeH+Er(#7BD?N zi?!TKZtV1bn!^~(tXh0siBA#b&~wkL$vL=Gx^JZ0PspFGr-0fz(f@p3;NDd^K--l( z{^Oum+Jpm;1AFR+ryE=_VUiif-}W8zbTQ`u?7Ld1=X%^Q{)9g%&polEM5JfaU;=06 z0qs6;E&P4LxM}C`v9T9B+Wd$q^^R7g{|LxQ-trh@BE zLHo+YGN2B=ch+AnsU?(=$xvDn?U?rQh*YQ&aEfUVnC9FLPMs!g?IO?-mQ3etQkHNB zYhpU4tfd2E#Hg-AQ-LdkL6Ro=*)HH27kvP6S9s`sI3sY}T3(0qK!N78J9-WWb8fV! zG2rtrpX`MIH2eCp+j^OgV`a%Nl85{c5XoWEgF(1`cl|8@+POLVYfv+17vQ^L^t2Ge z#rAf}<(gt(lS2abV{(Tvnt~86f(|#lUk(VtY_QoYpwxN{U0lwc4+h!qip9;^4BKZiHKyZ5_GXCF%{a@mDF2M9B0ApTEy3cJ$E-^ zW60NY`9AQ|;_m+pM+PVZf9#npuW!7t*M6m5w$iX`KjWg`;`Xhvp=0LaUOir+c0`lG zsQdK`C#kUNV`RTpIQD}FKkKT^!@yAUNSdB7*)(3|!YZwTFT%UPR#3BeL1o*WbFb;a)1*Cm#Yl1YjMb$wWsjJ1H z7zcrefF3Q3PlI|Vz-M2WO8rfTNU;h_#-KRe#f2*E7|-iv2I3j05wGM6|8-!#w(l? z1gJ21Y(Fx@aGtqjQC80@BTJoIzIHyEi7c=?fqn-xlH|;|EzRsa6nyq?Z>^sTKlG*D z10dc(j)rFe15VecUn3=gEngzGx5A1032qB+C%XhZH=6@>&y*}zubkVU9LCe$vR6hD z-Y=6r9@c%4hl>5Jg|C3v5h~E_K}7=H+Z<$N^x_J2!x>E0$GjXz>K|R8PlYj)C|Fk@ zIe`z(p=Cq(YY%%L@Fyb@F=sL_w>G&c5(4$b0*~?}g&s(IY7>xf+gt+jHF4c;4153i z77)PCe%N<Uf)0lJiPzt+RJC9EA8Foi^>c{K&}Qo9f6U~mscQwt zb5{dUGFg}O0rbple#mhJZJ&|weHV5%etqp0h9q+<-&n&}!Q1TZl_r|cfYBF}fz!d# zZ_vYy4Cwo~>cF>RK-c zW}&jt#~c!SgPuzps<(xp?SdDfzLiT9L7!q9?#y_}+kC!#y~diyp^cd8Dd~||uJ>IC ztTs=~jUYQ+LRIF9L19vEL~64~i#>svY6DwpMyfbQBcZ76IUb%1956!q9|K?a6LA(y z#~~C=2`KC@7!x~y*tzR#j<+lI?4zC8@O;v)bMQmgE|R5;2}9*>x%s7&KtK{_L zXb=>dox~LN7jmgBp`B82^d3FHqM7VcQZ*xDI$lFKM|>#%Zd-g9bfWNP{?(@pqWiku z7c3zAil`EB7uIy2wV>~?I$QgkJY4(SUpm}qBC+oiFhg5HYMl=~;HGFJ`D@EACUf)d z=wjUlDl6+ugK|9nDp0!y3BQ5_r}rB{pOofrqKtvLri%+mhq#0Gn+#5!6@Gy13;L@h zXzJ|R>k|&GmsDY%-i61)`@ZKd2csYBW}qy@k>M|r=Lo=UAMs(*N8dl)=N2$+4}cX! za)F%&>8n!&(J1Z8AiAlVl?ehqARfsE)yKubN2x0HUw0>emvEP#ORYBI*Mbi_p1Oim zfOO8>HnV-FrZf@dY5%ge{*$f&tdt_so*7_eHW0{lSC#od3}G%gg${PmJQ7AvO%->zUPO_Fp~uSSXrsV9LK& z{&-3M#7*v#c(00GpUkLrD%vtNs*##{17q4lx_q?lw&M<^`h)82&$B$(o;Gv(I%naxHVA{)2P9@co@!!_3p=3a{fDohC*{F4#;Iehn&YbUdFH$_1m z*mIza>zbjO4r%>FBX7*#A~26qJT^VVQaq5QI7srUs1Z4Y0{vO>5|D7$ zTn@q!bXq(v{9+%P6`%D-uAw^Ayf@y=xyq4g^@mY2AWEa3((L0de1Q+1X%y7?>+3V% z;+NM8hA;$8uM((^SjR33Rc)WCU2xmp%wyJSzM`8=VY;J=NB8M76{)RMiJV)e6oNge zUEfU2o|#m{xjUCioR0A2{r&UoRUDb6FQR=HVHM2VwRFl#?VllUOsx-~#c!;}wHUl_ zlys-2|3*&{x@?s6Hv#c=13BuIf4dE=*Yrsi% zO)3{meQ=&fTYizCC@z*LvGOTisiP}{g5?n~wt;6y3 zpIl3LF@WGS#B?`aGE-SpoIFDM#BrYh4|pZXo?A!cIl;~pKW5DolCn)fJ(KKZgyRjy zICNdl==0x2zDf(SJ>neRs1!9Ig&gIhES{2S-^0{m{S=#`&M3ssGpm?`tjEbo-|D#d z9FWx_U{_X4o++MT_l%1zfZ-_KZ^O(?Bay(>(PYr@9O8M z$qANa-AedwzF+qToTi*Zj^2+wnziWIUsIK7?ARC=tvDeG;VM2ivs1K~g(zYirPyvor$dhapd zsS9XI=W0~|lJ#naa#p=ej#%l3CfOJm zUG8qbC>PewrpzI8ZNYX{v_J0C#{QRWg7(25n&kiOneo5+!{Jl>_eXhJ+yAb_Auwif zU(RC~tv-u2Fxx2Upe&|3HT;1RHlp5E=dje7uz=H6rym4sXTs02GL3yRQ{}^$_BfOz z#o!SAYA@+^JR?EAK(=bk5?^YYGzX#VjWlqixh5PKt=fx~(1`NI^d{?)GtZgqN|k6% z9j7#xZRZHXC~0}BqjZti7s|>K#Vfy9cE!1WC!-E#-YK|4D6<9HzP~zBCq?cV>wKs7 z*jhn?L4be8n;1DnyszNioa@#KAbOvJ&JX7rz%93HuHszu$ ze`}~J#ccP)9?Vmu4gVK{^2470^``x)$^W0u{~qgU&Hu%L%IDzte1X++eN{cY563sv z%vRj~KvhP6E0(XdU*+QJS0^M>f+;ou)ixEYI1OT@5KU!v_~DUuO2unE%;^;SLl&+^d_3ZO zl;zBp1*_8$h)=A%{HgI(qtJ&B>UD5o?9)(t^&X=CDWh=TPhw5BDssiQZnX&cQciOF$KJvwpkA^QR6pYUwu zkMQha|9Q)lw&qr#UH5;6760$yXz+CZ`%xZh|G7qZohLlm230vJDPT4q9>ZI=`!u%Y zm>RxfzTgDtic+Z47tE?!ez(&#U!!ZCI>KgnUCX!(dc%x-xjnHRk-vN3Fh+?E>qsSg z^z!qeFv?t}jBHa&nLv;XuP{UX-TSimyZ665>5f1+joV>0M+G6t%*k=rnCTrh#!Ppb zCN(@USw~X*Vr#+}P>#b3K7?%skO)ztzGi@vFz?W|FcAL;=22c?x9_w9@Ih?je}<3ia9}wEP)S6W>OeSN4&2ZZsMy z{pRX0sX}eHN_mKv^nJH{#~U_4$>Vz32hAQq-kAEq2i2c+k(*wiViAznw^^)e3PeYs zJ$wNUOD{!I=$X^ol9so_Fus|prBPZRQimg$K)&MpSPtn6aLBk1D|E!X{+uxDR8%#F z2xXo2TQS;X*gS%(^{ZE5?3Ir!3fVJ$a=^ClGEMIY#5hgw)*0|NeGho@60fJW>y6Df6YJhGmBtEZfFmID^GM5|u}bN53Tvx5x5}cB z6w^}OzF4fyQA($RZ|gj++;BMUcE8-5ez{@(cmf61C~y@l*cCjqa16&dxf`) zyx7v%*+sHuJsb+k@pow)YLPA#KOR?M-9N^be1^NiSnmpXS|L{>hS#jPJ>)E2-X%J+ zo&q;RPseS)Ry98*on@7#FVjVeYdR%p8R_^)_cUrZx*kQ4b)xJ|<@(i;)vt=Xzf^QK zvMk{SMlri#PLv0pMYl|8Couba@@4V&!~_M zZ-DNbgX2Q7ARHHdz`2QiAn4h2@Hez&1Mv~y^akfqvMA$AYfOefyhGbMhVU|Mj2p|2@(p&VTX5^*>pRWv?B8D98+&5}3=Xtu4(WI$ZSKG54J$lAbqKjjH#7iZo zer#lOTKlGteZ#t{i*yBJxhut*qt$(NB&#%y7vh_U?7bS|_9Ptso}Z@jANkgOs~FZE z&i|)38JO{Zhr|9;{{KgLXpWV0c27&a;K3qz0~q9~6712L_(540@6!A(PGRU58R8eX z8<}5?Q=I6%blpra%I7dZ#W|NiX-hP!6{&c4T=<*5A0&|{jWv4YD@rj`u`1jmHj_`%K!E#56iI>$LTxpxAhEh8yU~| zk}^AJh!Wqq^{oNW?n+Rqdz$bh_RrNyO1r*jU+h!`ka2I(5PX5+!w9o1PqREC!b@rQ zqwaQQ^x9UvQp38HonqHxJx+3>WZ@Hn6s6rw-_z~e1zK%Tex9x}8h`J<`hNe!vsmMH zj;ODPa^M)u5QbWlR#lS`{3QzR#yyrcRNCd=s)@YJ<6lXfBe33JJC;^agfa?;-ApfQj@}ye&?Yv zoyR7Yn?Nd=@y`hm|18S{eW#~9nQ`NJqr~p4R&j;asKQyn1TIk6nen7z;wNB~?j%ntVNqNKSp1_))r-QsrJ}fc{Aff?(tJ8B zpk9DOdAHf}S*Q){ljh5D{Ju{wJ&)J@acEVh8%+=Zwm}cHr{AuOf^GkA?Xkgq1FqM9BC1&6b%764JO(R*)&6WyafRyi$W|C!86kY=V=_HoCbi|wLoO) z+ihksq$v65cscGjAEGQyw<~!RYnXywRz82w!w9(nL$peh0y*H)uQ#YQ*aAb0=IfXO zwn4t(1#GZ8HP>n}fM5gTCMDU zvh&K-2{Kp|@6tRh=>2hoLKN1)4pD}Z5G6rGZ>R_`ew6%^T2ty;%~2Q?_iB(rXw=pU z<`E2M_iBy9FxzWnxM{clMM%hpwEqqU(|#rY?_m5C|Km{}D&5>`d)xWmrV@iy5fV8l zO_Sje%LFwccfG5vwJuO@sdAXEB3x>GtfmV^+>3#)hL6D{4S?NshIw~*=$fdt$LtkE(RKLB90xUzSl%@2n z_m*Z9fTf$G1vC?!*(58K${U#iCzvED9b4Kld&|}qY?#RT)XQr_&D%V3j4LyuYeULj zRYsG&ZZwdJY#EpEU1O;LZaj=JoK;7$(yR%-W(<|ez!OI}`Y^_DW*x<{rgf28KkK7w zEz)+RVUwlnZmHSOm-X!n*^W57j(v5k@OVq7&Li)dHx+eu$$2 zQ}fcHNP?zZwx@lq?R{eBeRaS_aL!KBkjqn*eC{R)n0%0seLeVT7~x@q?CiTkkM*`?MP?| zxjFfKMaPj|I*nqqKp~((%_6)dngV){!Mi0&RCzYyN5=|f)ecKp?Q>S!R{&Q|*DP|b zo8Fj^X-roR+OxS)^Yux4S-=ef#X8Gkv_c7n@wa)p&I*82K+l_&EEE zG`uk;$TBMSj=k6yim~F(vW&c;$?Zs|7IG>qK-w+7vY>7B#ngd84-Bet_xHz--g5r- z>W5uhLlm=3KSypf0{!09iCd7aW>LaiIhZ*Y#<62z3qGwbm;DL~aUo#Uc~0Ypz|=booFOJcy=8IWQeSczt} zrNO>SV$fhs40bJw!F^Z7z_k)IDaAuFr4m}kFuT(*@)h3f{vp>8T;p^F zaTLHf-qKdi&#vBHzPf$;^~L4Ow>Ph@f4n$!lX*Ve;}#`RjXXY^HH1hp+%yD0Z(9&JR7a2627pmin%HAx{)r=Y|IspjxvkyB;P z%rY6*5jX^QQ4(HIBS0CxMK7a*I;>n2eF6Ht!H7^xNh7ULv>>gb*Dsj7@1P=FyU@|k zY7ysO_s2Qg8{3`Ku;dsLqKhbTqTrb%vKpATUZ7O>noE={>7XV@^4A(=F|gEN2x?{m zq3?CtVA4R1Raai_R3J5q0z9(cyb_LsU-72&ZnSI(hM^~+RCQL{Hm=y01?9nJMojc8 z5dNvrDvQz8kLR8hRp4RjpX+6tpt?Ss@V>j+0dAQV_zL2s9+KNH5WYhBDxwJ&iyI2d z0Z1?E?W$X$#sY)dMoKiD<@egB`n+w*t9`Rp+#urZ<)KCuHgHdZ?jvqVB~gyDz# zUC(Ul|0hqvyKjl4nUzb--@;YBJKzrg-{Ej-#(y4p_hx}m|D+kvW6*+H2U&V0<%#|i*}M&wXMwyYAY!# z34--K!CKEVRu%DR*IZ|n9aG+8#ih#2f9eFd_PW*~d!wno97^TVlcGHuUE&HX!`*$Y z;nSys4i9f^4DkT~(F!j3{cqlL7-vy}F35X7M_F1#IL)`<)2CBMAq-_!VQory1pak$ zR{T(){1o))i_#!{%A|7o7RGV$eQc`uRDv9Zn5;l?@l29M8Prze>v0C^B~Q06ksyr zDkb&(zx?Ni57k5rFbv7(O(v2veG|nvZ8ELUkrzAygco&F7c{0LZ|SeZGDL^8WgmhdRC&*`nxZMr5C zpOAiDesi-KfwS}1#s8+AWJAe9Vv!yA_BnXA%&0}nT;K|}Wbtu2@aYrF!;r0fMv+)z zg+fGhF#6!ex(emfr+WN%G%R~Z)&P@gSWiw>o7QKaV!i;`mfvIvgUdIG#QapBU6<)h zr<2Z!(%LkW!)mSCM*Tob$3#CD>zV$MzbFAzN?5Re7+LAx@!3QEtK`sIl1D>Q3#^MyxFQ;OmfR{1l+lR#-uofFzn7B zLbq=zmz0+#PwCZZ;q_n&D2GNk2PN8%UI)X)ksbhuzQ0<>@l_f}!B!K8Se;CMEM)>s zrr>gcMM&U8O<2?lD(}gD5~4|3(}izKgp4|tDOI~+q zE6yNP1r;S5CEcbfdGWB^=3wD07GR!PhNWfO^sjI7bkz(4QnFOjKB&RTdB&-~q3t!A zm(}R*m+#BEN~WH&M;Z*KLYsZ$k4S~%s!LF}R#gv8c*Q`ZvNI4@-|s?PE!!4xt?q8b zjdy%nKMImp61?L|b(?RTwop*Ap`HQyB2l~sHS-Do#QQ6LsSbnMa?*-hR<;4b7=tR$ z;=v@mD;Djj$WRc?x3s}713|Pylx(6rO;%(?gu|FEQ>6T1r`;&oSk$RIvaMLA0Zo08 zE)&o0j1O`XKHF3jCjGQdA12)Zm7`zRQI103*}7M-fKK#yES-ZD%nDHhKqa)4I1;q@ zWhnZWGKFkHo>hx0$ggO6S=P;tfxekOfv0Hp^ev)|)C+;59irIEHn4K<*o{ zT_(GB8+)symSzpOH((W_nY6g_g6Gyhw2bDF3C$w!J<~RyWiU1FQHNc*E%~GykljkU z@dG6r!8NKUG5n)$ngyJcE9AHX@fB>ds415oAa~RuYic>5d!Mkn#@zyNm8)0 zJI;S6y=wfY$>1se>!Uo({&#S@q~S4`IWNLdn$+0;{DVdYz$^{b_%E6`EKO}J1uLa6 z=DS*JOx0Dl8ltd<+1cV5`VO;;#ZjL&*W4)O@+;Px$)l74jA2oT;MsR4HKSN$WK|qHOm*eB2m6Ux$SF#U>+`AQYWD#UzuGsV{K*bgZ^YG>gr|urbqe!y19R*mhXJ}m zc|>VNnuN5HQsUc60mu3$NP(p}XLKsvAz( z7!M9w1zOS1&4GCVAiF_leo&y>RAj#Lvltu-dxQ?)h$@zD1{745Sj`GEj`AEULqB8+ zLn=nV*s(&a1>Ea|J055g>_7Yr)>^XaFfS+4`nmmd+Q96Z)K=QHsaW&3C7&qUY0Tr# z;s_RuSSvs8FB>Ikh-5OAPoECd-}i?O=TzvWdsqB@f2cUk(l}jgZ?YW0@H|ZloWqE_ z$v8hgM7uG{%YX>V&z7*Cl=wfvvzPv#<5n?Xcj*89>8O(banO6x{~zU{hRrK_olPqI zBF}-Q@HbHRspVHm(IGF!#`-q;@waqBe7&7YA#~4et-))|%{x(plPzXY$UWIY7E&m2w#O zp*(9V0>6d*xBrj_Ugx z+lSk8TArPZ@VBSn_WY`Hf>VAah*uG+-o|tT)!6a_WnABf{?pTvhs*yxoJ>vs&*5hNj9!CG^i~^QvFiH~;r;8|PM)mp8nY?e4<)|G`uc#;dgU_qW9JeY= zaf#b2o8vcq)fQC-q}1c~0KG8h8&zc~hDA}L%Zin_9kK&D{*_se8}-N&VbKjdj*hIG z_!%AD+ik}3T2ZPa(=u@8K#N>*c1Zr#t}n5PRmmSKRN<~hb82hiv*#)5LJw3bayv6! zOqy3IZ<5{HH&Z~dZ$*Xzn+wE1?RHF>U&W;q}rS- z;)$g-IR;dm;T^D6-r1Y>(6ileZA(c&rDuaMeu-kZm1b;Z8p$^HErme+unO=*vPby2ehF_3sUVX1X=sgsFYDLu{x=*#CSO{=bL(r~2PCk^*ObPkET!Z-(x&fMg5VPerqfM&O9$pr!7<6ZypX>wdJ!|Zz%<;NgU<1!P6I| zmfEG8khXMW8Whm4Y9I@FO^8K=U=696;VdnQ0AK=&BPpd~lV#;g2sNPn3N#&kD(7g? z+zu0@g77-t5wistw=9htmZd{A3&y9Rq+qSxt5k1Y`a2Ft6d2+X1>kOG>{nYTtOI$P z!38yBvx4T^9Z+4w)nx1+b|+udk{P;>G&h0f2=5MW!dJs4z|!qon;IcwYyw<~aHrL> z6{xNxy0K`{a$i*z4f*a|IHFBc7N@nG>!$j3*EH2k)YIw2!#sQQ{}u+I9sGYZo|^uD z!||y9#Qz`Tq4uBM{J)VcNS-Sj_G>{9RZi~~0Hj7$zIK?pRVrDMZIiRBa2SJEfy!QGugmK?%K1=DJ^jv-lm{79h*f9OVEeKrbH6WgwjbVHy41 zMDs;mlRI*5cfSH}@Dk2q?qbyWT}f~tTkQ&aJI~Eiz#oOfr?62+i7_K$bPf+ zS(1MRvein=hKAK*e_!sZt4p5Mb;Ehf_h~5WDX&heQ4)3mB%>_V0Q%!pS&kMzorzmC zuHBeMs7djYwU!APy}TGIm0Z3)3{EOP*Y-}7x|P8Z0ZofvGf=yG!p;#i0wbK})WS>} zxnTzjHZLdJWngP&`3edwwY){LXlA*4a3kJ5o`&+j>MGoQ%M(st@O;y|G=UxR|9IRt z<^S=h_Z0uCK z9wO)zZ2AXxQ4*d4b_wZVg)j^uhJ;SCEJDiBrXd1~EJK!?2#jg*_JbUS1?yEf%W|}d z(lzswO4GY_2E0w*10F-b=wFe+pzI_C*4gQKEL`sL>Te7WiHR!)b*-h`Um%?-x?{h>fPyX4N1*7vHT)=P-t3>FB8`LFbHoySR9 z6z#D5-$fCx(h$AiVGnw&*lBGE&gv>yl(lUyvo1oRgb-`>8?w{c-Fd)%a#ji2D z;zh^UvIZVzlt^2h)t1bq1qt@y5fI?OZ7A?hpAiWrBEQMtuWNMh!5TH6Lz44(B?;1@ zLLwMMNuqXxx#mPdf>NkPQ(*o&kAX*5B>~ZDLGIB8S^1CA4%xYub{cHjJsWd$?7I0l*IqjC(v24;{!IKpFaI32vbnR2xVXZ$d3ehwwSvY^UD-p<)}aj{~cX&)g;6vB|o0i|9i}@6x)o?<<1N72@ZQ@nD96lN#MS?L%izv_idOe950tn-)a#Dcx_cW9o8s;^AN~e?*=b6wrHKz?NNfVpWlJ;$-M&;FZonGY(-aj) z>DiuEH5;%@1tqsy3s5c1YUcFp*HTmC+QYQwGO>|0@fn+R8QMNivvzaa?~a7F?w7+3 z_gT04zoSL&ai6{PzZ`{8Q{}J0{r}#u;{Va_J?Vds^8CK^Kf18)qxw+*R;`bL{;d=~ z+WP%e9_4Zo>Od!II1NwW8CsFnO`Z|q5W`jb8l z<-awK;-dSON5_m>g@4)^|9>*5#Q*C*#eaI7hu;6+M5|MF2PBFSA^I;?WLSbFI%Su^ zXe7IXYlPQ%0w5^TIR;4@qB9XWwagoEV2Qb}EE`g*@Cg7JM(GZ1J>Y%w=8adzM>?c2 z^1QFlu08Vq|M7T)B$pKFXrV(x=%YExa}>T@=TWk_VNvj-WO1=bQu+GTdlancHSz-h zI{bnjN&+NKW>*jg%UAES9I-Il>WQsL%I0eUpvjYFM3heRQ*e1#yl=z9^Pvn34qT#kE{h!MO;m3K8G`VAuRvT}qiw1e!kSSHUje9G6cX2*=z3`bmDSLo zTH+|$C}5U`V*I=0?*vEf=Oar)gB}LyDoYcTU^y4)JfDX+9Cfm(#m1v5xE>Q+l5N%` zyPR3MxXW~Rf29pCAH^d@pYQiT<;JqS?YzqHRvEM-v#6BJVV3!K>lw-ugi+x~X;)S{ zWw$NM0j@M>jm>4x(OR7p6C<9jfQRO=rOb3RoCte_MmGsP@9}nHdj{LF@4AQEbCnddjW*oLzQs z#hPrenl1HUyXkR64c5{FNE!++d^kZv+0wh@jK|jh+Uft)TeFq!|NmM&%3hbPh{&V-Y!BIJDq7eJtWC}H`9&iK^;Vlr8Ipm5sEKfR%nqjJp?Sl`N zDjMz{APYVZ!aCZ~e=fH@EdB3|hi3f$!C?Fp|Lswp7WDsbQiucvhDk`2F18??is=a?tLy-kUF;EReRtkflmQxyS$wV2?_y>w4%NC_Zf>S?Ai7;K`Y^^36kq$ML@>1bEM85*B z|8W*?c$U!?62LC`f6}YOf9?&R7)UR-{A3a-mufe>L7U=)JG48e|1_3tjzcO9H|*OX>sn1mhPN{6)4QA(=5zrPQn z^z=O1yoX76@C8T^&*5~K z5&<;8)& zh;WzwpP_%?&;FHn>Ho!x<)TaeCw>;2q+0@-!QgJ4QQlV^eB~GKvV*Vu8N56A%Ev46 zcbZ3wgRlPIgD=33FsE0kE?&MW4*V=n|A_*8;71{XT~<6#|9RkViXaV9_m4n8o%{d% zyR*x0U%h_wt-lKI*+%{TANPlYk-7hSPx*fy=lKGhFJZDkak}`gS^n39gM6dw>0}F8u4k7hik}n_R0ea@RcrQq z-`5}=fx|&>(C_pIo&NCXfV4%hBRlrsD}J>UgzU_h-BFD}k|v!M{AZej!=JzCkB80B ziHc&4iY_UCbadeAbI;Z1-oAbApBR1aseK;o*XRCmyFT}i-F@z#IQrZ_*}KojdY}6z z);@m|y(c~9tOXS53V|@1(@Pkb#t{MQJpM~T)0Bv)wc?_%vpdJG?lc=SqdOQCxHI&J z{?zEwvD&4+YZ}XW;}c4!uQzQseZ6VT^i5s;ZPtiw`X)wSr%GRY$Hw&Ge9KiD2ns~+ zOCXS=B;C-9<#|f@EE#|@iX_fqlsG#yadl|2cZbGChbGnzxhIdz+UU65rW+mCZMw0m zljFTRIWjsqRy#Ru*vV%n{J#@y)?kAczr6))@=p z5YdfG{uF^tK?WBHKroB&!B=3mUS+($2Va34;XGO_P|jZwtpLFSIj3OKY(vXVO(wKc zc3`8H3wLx<2W;39*suoJpdGaz4W@O#T4FZPFynKj(Qmp6LzER%DI&{mu?%uL^GW*7 zcdmJtc-Y@dJd~SzU~FzxM6~Ro2V7YXGAb?svcH!ADMzJmjEX8m_J&TvTx2?vPXc8#?f9w)|~2 z3mxB~im%gRp|8#1akJ496EZv=)tD$;7K**~2E#sK?I52JPS8zP9Izm(kR86G5CmzS zqX5TS-urfv_VBn)(sr@eeS2?Mr21;_oyHk+dYkd~vV%Q$2VL^Rp7y6>b9#H$4t|3m zCjGluWieWzgd1auXqCm$JPN4!z5w$)U4gIJ*(2-vv>g*3PMtdOv14wJ_nq5geQuBS zx$Re|ZjlnfBYnqo9_9%VB?}NGpg{R13WydI*Vvwp9g}yw@8nJO$vf63uWwFXi9O4f zD$(U0`-DyKo)kWxzLtb(>Lg54$MjA2oxZ6)ebf5s<0OYI+f`Ixct>;Fmx+YI5+-5H zCzP`kItG(=qTg`h6#b@-1u)%r0Zja{J_hy$Ajy-ej~i2SF zT<~FOxw9wEojq~LQ}w6TpCfrrKT)TXNaY)p(B8!6-w7E3HCb#?@$hk zZGq9MaP`A33{CbGh91ndB^fb{a^hA@M`VFlW!(lsX#c()rchF9SC;L+2iB5$l8Wk=(s8iv1 zOC8I2019?|!!mORF^pEy%aHEEY!m#2lbm5oZZvdqqltqOPxht6V_gZKXp~qP2Zh`U zeMKB^#c=CVTgDERdc3bnJ=Rs~v8Gb@N0oI+t-fHL0eU;Y-@;YQrlh4RIi#wjYn``L z(T7Y$mzd%Ti?ffV{rqU`?|FPQ)|v3wpQvM55uwS{vjC}QS;qR^Ybjy$oD#;^!Ai&b zveL26O2-;2?KiZ&40|nCNv~#=3{Kin!@)_#b~}&Wi?aux8c$eR=He731%}iq(lx|( zEesZ&xJI~e(RUq(LG8TnXaF#^E%^3_3vs#~r(2>rKi6bxE^4b; z0oh<2w<8LJ;~Ju1XZquPnf_R3`eTjhTLy!WJQ#*FIuMKjj3ZbSi1B@DLO@`d7MS`5 zs$;{(p&e5g96Rl{V+Ye8@5}T@<~a1M;~;i!lwj(?&Fv=W>c?|7{p8p7yDNQQ)Pca; z3>ADhT2jAbrz|*f4995S;TRgeOrss+aTbPR`nlPGMp1$VfZ%ls!>?fslK|!5jEoEK zemfCx;I@+-_ zjV(27xt@k~>&Y(V4)5!m)iXLeQajo+wiOF+#VogkTWXiwskF`<3l-^?au3CoFiilv zs7^Y?1o*GCiGAOLyYF@I4%%&&W2s! zCm;5njlMA(19djcv*`0Q+X6j&f?qiY#VH7uQ5>@TM-Dsk(B(Td+|zf8)-*R>-`*K6 zn-PX41CEGI#rRvLQ$$*2vqraMlHw&jMk&A|+Mt9TCG}e#qx9X!C_|SQ)o@QQDpK>r z7@nRwJX2$?|F3m{L6)bRC`5qYJY}5^ma8-ba~QGXG`PlThVoU!V#>3T7`M}C`eUa? zGjup`4fl268v2F+d!i0Q)m}|ByA8|SOnf7qZE5lEyDk1hhh=oQuVr-T8#0?Jvbpc=7<{v({k-pX z#Tq*7lEZ!Nl0)4tIrLRgt#{%?!zC8&EfpC;(XbgBE_q;oaX?37&FMn)a`$wRyQhfU^_bX2-rjy9FSkqdb;+ey%Dn`a zV<#?l!L_%q;M&s#*Ip^O5;P`GH0*+FZ(qT+rwgvVQgE$D!!Azt_7x|4=A=xTp<$PU zdi%;jJzWm!m2wb4!=+919CA=^KRHOQ(~*wLuo*5cIoS&!#T6JKdY@P7Ss@HQBDk%gLsqowPfDK5-pCPhISM zx;HzY8ti;(vh%*YRyZiU!)g|{AELc>vcL;=O@)t}G3=X#lAAxj@K|1H*e4JgfQG)5-Ld{ecYNn=8 zQ|S?@A0v!tBshAtah*DZoP%Ix;>sYBkG?kn$1b$MrM$UBxvV+R$REHOQIT=?1qqv^ha z(Nq_VriNfd@wKC2vw+d}`=T+@(HPea8>c-mNm5L&3%!mC%vLzPe!_mTZA_?9mZt$K z$Wo{7Q&B~k`81ooLaWX9>fGUHU28K;KK*w8q5(#}2Lgn0*OCgm(j zYA;K(lXy0m?ffxLm^%h-?P8VX>4thZ(Z3J~6E?AAi}1+1)MdEXCK$et`0Tav_B(Mo z`%N99_HR+nc^#>eJq zDJQMrI*X%#EFD3KL}+1p70;09T*K!QOZJya^x@NFlAgIpzb74`_p(?OW9ZU#PDD@T zEw6u#=8#>s`-&fJ^W0-G+!F4OQ^7E0upze13L+R3QHTQ42{s?C+(S;r4)2huL&ur! ztK&>{9cOCjIMu;i!VRK~lt@C5x>a65yp(ZT7=N8dF%o&f=w)%qo#|k-qXgrjH8w`R zPR@$UG@*feajMWD)7=$|iADm#kKdDakw;Ekfk!xk&R*|7;U{LN9TToc2v}$QCOM3$c|r5%3K6}8Ok=>n0Iy*j zZ^i)rB8^r$~4~+bO{qeXrc#8k}7|$2r zf?rjj`J4~FStraFFOFt8%(qmUxXst-oO`kDDsU6gt1ci;sZoXqBIQ?bmSs#`;J@c7 zl?EUvqE!^bT!emp4)8K6WE<~bLE}+V_Lw7jv0??I1fv9!=7O}qV21EJgjj}9ww9U2 zh=@m=@#1_7V6cqPhM>4eVN7tGAwq~=UjMgG=oh$VdC&>LDh`yaho|6|zrN`E{fXb} z^nRg5Un&&*;NT;;F4F^iq!~!TNAM%ci9`-Q9(?R5&qwVa@)w18A+My-e$Zh$IG|y- zqXIzi9g0`rH6IpsL$l0VaQofG4LJYq?D`g5+-RaMvMQ1cSvo3Q>4ZV;l~{Q0NoE^5u|xomJZnqf3fJ|AB(Ho?|!<)IjKaN1Q7g8nL`^klAw3pV40=`Iy&fd zItOQQ46dWa5*I|QL-_`UpaX98rOh35|6tt5N&lB9UUj%ae@`Y*PyeTc@*DJj+Ut#; z=>KCpgoZI+UqV?rEG5gqfwHcn0%Uo#f_W5gSyBK(gsD)srR)Fl?1uXUlkM#ve3!mM z8?-0Mi%F4nx=Ja1lAWK_iE&1RgVPro{gEfsjL?A>fsuPJWKD8KIU5xVYDiI@CpV?yUtlG({&s&OG1PTYJ9mvTc5F+GB`s36EI_^5kBBp6D>}` zlaTTmBFy|FrHsPBLua7O7(rGBj7j}YniM`MN;nRK&ukOx9EE`9tzoNyB2+f&2WiNN zaBjA*+8;G6gd8F9AfrK}R1;tw4vis2Z4^O(ih`wt@WBOcfZ#W2&g_CwGEbjN9*V)w zWT}N|z&WQ#+oR~dloh4xyhCZOMus~a^9~=d?iUKeNA^+inJFv;AHgh5$w>S%hjD?( zGJ3_WWa}iU_P<;g5zn)phR!B7wna*>s&CblMPLK-h_uPhebnaYf^~v_9Tfy}%>Mc1 z=YNm}2qP{57IaTUC}g1CMR80fi7Agb821r1aV=RNx0Oi)MU0sf61Ocrfq_1ItCL;?x_Mw9kQZqC```{;UxO;FIq}%_t31&7uGoEN2_NL&R1E%raJ4 z@Or+VSLr&z8C;58N>vGk60o!K?@1}OHwnVUGEFO+au1FnL6z(R=joa(Z2CGum<)pq zG!o$@-M&|8*pQW2@NPxZC5F2Qx&nPaaxPmkX}Jpdfhf6bt0f(m^%_#~EKgS$M)3nI z6$wgNDpI(J(*+YUi)BP(>{B^6PVb`j%S1HPYMDsvb}bVH`hLqqwq!0774icu6WLbF zWg_dfTqZu9M-y+dJTi!v1)I|ay&*`NVf4uX=q|EwF#_s`>(>O(Yg(eLy2+BptJDz0 zQa*b-<6;%J=Z#$EIBf|?K1?wiDIO$NRRIT@02jW=bktf^-jI+CQG`au2+5{ znw)p)5m?@HFG&GW7p~|j^APnh`zXQC6@SGQM#!V9M*l+00YVHLTUqqzl?f3-|0GM` z$E!=<-5p<^1Lc&>I$2yEw0Qe?a|Rt*gIP+T6q|T zL~3OVV20*oP2ilC#3^f??JS6wK3$xpE!EhAWVi9C85MNxM5jGrpgvsfXadZO2 zw!0(AQG#m7X12{V#!Rcf+ zJvj*jcyclhPI}=8&BoKoc-|ilCeu;xcs@NDk4OC(3MSLud_EWi0U91RKuatnBCHXe zrFJdxLWjlCjulnD_Fz*Pkh0iOv@)7D*9>-U>E^7+TVWO*`yD!Q-PhaEk~c^bzk-!YUmrLE!?)kl>OlnQVzD3<{`yCU9D zfp9m3Xq6@f!e)zZ>l*hu<-HT-&HBz^vKMU9t1^wlJ{`&t^(7`K5mDhI_@z(UxLnf! zv*{d!sECO2m!)A*t-OhfC{4bL3PJ#1M=NUV=75IO$jsp1(2F0eG+46YAZFzam?`yn z_<=gf`5DY{#7MkC_L3+T1EF*hT&q=qQnjvyVx2FL3wk-42JjVp4|vTw;Ohi#U=-7p zu}>3PeZ3(f++noXy5Q;y5v;RC4nqWFHKM$~lx-K!iAWrULPsD1>9t5Kb;xP<5j9e2 zSTZBP4WEP?WCipld5L0#QMGyr+6OP`5+xu+@_D?BipmbMNZYa(o}=?lky{DRTkeoF z*H#s6pDOp~FoUxwj&OvGE$qQC^iF^N$8#^t(~SH@H}!dWSV~XI$$Hgw2|rL_rfW=e zJ)y{b`@;p<*80ghL5F!t>crvae`s7%2_#F)*;wTd94|i2Fj2`0X&mviKamKhM^i2n zb)Jm<4>w;+pG}49(xYZK!)2cpKC6bjrJYL()(vBbi8{$7k%A31pGoiZXZF!M^=K4M z@3}`8pLgo@y-)vm?iC2;!4eg6Uc|v0czJn4W`%U8crIm1;c~@dda`D~3T{D;iZtFJ zkQ8y6-mNoX*-sO8l|iv;6bP>~zIwx?un3}juf7ys1~>)YdAu$#%D;*70(&5uQ!~q@ zJVpSNOVe$n75yo~%kNl8TP?z(7$%HKasB#rl-w0=5unT2Kf4Uf!clQ6gWJAaW)f

m%Mro0aH$7$tVReQ;Y5nr`To zB|$4r!PybG{hw3t!|gfv`UqT|-Q4{2@)Z2#!w2AB^N{k?$M4gpzku_y0DVxh`6f?S z{1*VeFXn>2udsLV@ivQHaso;=)Cq;xx0YGN=?upHd>zMRb4anghFzcpM>(P%}n;y0{{xb5!uE3_HB}4o<1%1mU1VG3dOD@RI)7 zfei2Nk?g71yq0nPsdSiEOO_YH7p0moNS^~oo$cYG7QN8$HT7{=%w%u!)cLnP5og%kyotyH>Kq%N;&Z=#h>C`Z$T zHLoHnx2zW|VU%=cu!sVW?q4dPq;rNHufWeAaSqWux>LX09T${D6&VbW*z0hO(-p)~ zK)q?ssX$XuiAL&t%#chy2NY=Z5>}R>BxI18Z#ZqVY^9Js2eKyn2(F|**2Oh} zU%6Ng3zQLFijFiy2zKe3dYz;Nmq1pcU6h2Kb-`^V+DKDc@^kMW^bcJwri-b zB*lP`XyIr7*B7Ag_eY&xlZJ%`<)S8-HL*Q0ek6AxJZn zGB&!N6Y*!quvZ#lKG|CfGx(ke1++Gku2?xiwb}7nl&}lcm_iN{&=&xnD?$gwIZfhi`I**&`5g)Y6prIt3;H;&E{T#4-@d+)+*c04*C}3d zSH4S;2Ahd>guw6^65@)CAU;~twYsxfW*6sgsqE?;Gs2BMy^X>4dx6VU(|;ge}lC4^h6`8$6EYDA)$3FUF@|D#BG+QVcO!4aTv6$d>02*TiQf@_+SQ zh!^tLxlNx6bQ29-(J%oB7F+I~Ma3zyHNZRSXYs@J>l;#ZT_DAWi*(@S*K81kpIPmp zR_Vm%KGM=vh3qT;RwtBq7nujnGe;_zzR8;8Tuu!q8F z&<{t$ISTv7;VkU;r_)PoQ9L**=R7Hodl!f*|66PE3qXs8|4g*5AEke(t`oEv%Xf1=`z<~qo|Ww|n-iweGGME|AxUj((c>HIBT zqPMK#Uw?TntyDM#f9d>%pL!H3^w}Eg^Qqh+a1PxA%lWKHXKOivA$5eatV*%nqq*9t ziW?{(Fgiq7ceYYQ|1ws>$;rvLk@P}_Y+};6OaLM}lcQhPsKByE%AUZx`lcm%vMH&& zEmlAeZX{t}%&GO0EQHQ4&q26N;3^8(&CVi96P~0-xGHHCWbT_^o@>4;vNFmoCLTV8 zDx~87WADnE+s2XqyFUese)x~8bkVvf)ql1s*JP$Do>AG(?$gu?Bp@4WiewR#vYJf3 z`xY7p!2{G`$K%aL4~Zp$-HjXF=>B!GCL$jWi5L;YAf%<7%*uRo6NAZ}VCM&e^##l% zK{Vb(5m(acxp??i%85ZF6@;s+E3AeZ*qeV7*e2vhsVRm@{4a(207~?-w301*at!h_ z19I3V=z>Xt#!O8BZMDF~l-7t;TsZ+aD2s&kyWeyhs!QMc3Jk?-x4!ct5obsK`SYUV zq}#CLkae2x-qNfiwaZT7snRK6wfH_F?iQNmT%%N(-E8~QJNY5jrBsscU+y?i~HW<(-+CcvB)Sd-EbDbF8Jd)cUKEgy~m?J;C4`k=gT@^y+cHC5i zZLW7+K#lCLcU}GT%kPzKTCx>%+fRTMQNDpgRHa7tBef{ldYqOGdC*z9!uKm5-`G9M zz%bWrsnqVQN}W?oxMt2@)c}Ddm~{52y#sh*n$`CXA#HC>Fx@m7`_$#TERiRUdqvhs zwsVW|hMatzu9)+~^{cCHfWilYh52&Fas{5b8-#}mJ!zP*8@8sfs;ox8t5Du*k|)+i6}-Hr#=Y54MUm#gU*`In>daEwAU8V-GLG8u-$$=IKb5yr#eeyOyVL`D;s zO>LgEvSbnv>mg^spH{lE+dagNoFn!C8=9C#5K*G{LgV*{Zb?iS>vAQE!e4-|w@JG~ zG-Y^(FFjSDEO`6rjH06XpcueE#z`)1UHYo4);D?p+gj+FU_=iYoSM?pj!sRsHarW4 z2aV67ruIg7-Vs``ec~ZnZnGyFqgAqvRrxBTR4%TzCc2T2_l!_UD-rDFQTqta}tCmWMxq79XJ^6>}|lI;ge4UE}xtTYLoc&IGnXx5IDB@V|N zDCLX$7}lB8kCK=l|1$7BG8qo= zcuIVK7>s5E6b{1il&nVk1XAb7EI`(As|+EI4A{L+A`#zWe1A=2tio+MtzK9>Yu9e; z`liXIiJs*32(oR`%4e^aJ3wxFw_@@8NsyeC`MU(Fb=%`jH-45QC*$vZ;J9kHe!C>unTw&32=dS;rx?ei3bZ0e6dgXHC!4-ACd@-$oil_30Wlmo} z9WhI&lMq!xE|ScqS=J-*^#-8dbu?gtx_zxR^G8PX86r*6O(fPESzd=m%1sjXK*6!+ zye1BUkVh~}=8&+%!1>`j6N$rYm*&DQCwJD4%xJ!eumb^w;D)fJjLJxL6z_rr?*wzz zi^grg1nOMTNbaF6=$^~ZE+kV}WOPd-a!1~=5JfNo-8oF%j%$MM@Sd%s_jKG;y^r;4 z>Q?hQN%Ehx30L6*o2gI5Z^ziY8iLpFbb3 zKfqI%*9QDlTcvW8-I09X$So3}809N!G^VQ+$x6!;Gyo(k&P7%d1xp1_Kw(@K1eXwx zp#Z+6x@e9swLD4hpIg6EF()%o;`iz=^}`aj$w4(q;r*wo0WQz9J9gzbs1E$>u64 zvFg}dy1V|s7uP^8t{0usTHA3ny-u;_8e+UsC;3+0v*FlZe*a{^TRrRTq$L)i)o+Xv z$QjN1+?dFUVBtlkbeIMf7F_zG`Av1Cmzm!kl|Hn*jj^w6uG6 zB@=e-Z#g&i|H8+b|63W`9-I7oZ~pJWU^E?6@_$c8-uQd|@8|e*yWO*Uipl)Uak@^P zgplz5?7Xm9a#d$b$)~fk|Bq<=;M`|q^`qOIs=xnFz5~#(pJ#Nt>xGQDpwIm1=H%ab zAHHWK`q5?iE+Xunklc0pe}e?uMJ90m_5A$Yxd~Cs7nMzvv$M0avp=0*6X%Mu(rV8) zlTC~j&N5#x=iPmuKY?R`tfn}=CAqlwH6Jxf^H=xV_s{pw_s{pwV?X~100960{?cox H0J;bOc+r2S literal 0 HcmV?d00001 diff --git a/stable/paperless-ng/1.0.0/charts/redis-1.0.36.tgz b/stable/paperless-ng/1.0.0/charts/redis-1.0.36.tgz new file mode 100644 index 0000000000000000000000000000000000000000..eb519c54dcdbc440a792d62aeb4e64237544db9c GIT binary patch literal 65073 zcmagFb8u$C67U^6Pi))Rjq^ks+qP{x+1TFLw#|)`jcwbu-rW1Xx9a=vJ5@7vx=+>g zIj3f7x_{k66bXY4@}KLA287N)T#?yGT!vlRgNx0OMU~lDiOoV&iHluMRh3;v&Dzqy z*4RT?!H!ql#M%bryz9($O|+i5-S3X3_RlyW5Dj@Fy2CXyihi`&dL_Z-j)G;_f)$sX z6j{JNzB1~r>JInlVKUJh9?>5{+#f*Ly*n+ z)f9{b0z#cI@JR&1{PiU-{Lk+f>_0dGn9}VY5MgnZ&q(k!V$)BwP!zx?eC5W{`*wE% zlB*6=U;IVe&ZYleK5;Sm3c}7bylCIc=jIIw(NOml`u57#h8sEk59-;-{bOrXIY7awY$sTR_c|(NCaw|y>Kp>P^zD`Fws#S*Jg)&`MN6>tG4)iL?%h>8tjZ3 z(oBVr56roATz(?RsI3B~GScG*t_wrgVMibb zrB<>&MaFSw&Syll7oO0ug$9N22y>^_0kKe1b<5*{D9@(`k=%XD`rL1MFFeYTh_cs$ z+m5)aiOA>l`!s>QKljlW8y|M z7vG>(xVSb?=`dJblJ0u`u-VI5VLCNH91}LL-Ac@ zF2|kl*9df8DP!tUs9Gmk>ZdFy>d~J3xmoigsZEcSjG?UqP+2p19lQJ;XO;npTaK@8 zV=xIG)Sq2r_a7(5 z35ti6o!*(3(1!lGy@HRf$bv*QBHe6!{Q8?(#M-eUN^wx*tLNwaiO~L(609q}%*(8t z9xg5*HQ4$3jD4t!^A1o#&w{9g$_%SxebVoN3h5Mjwrx;Bxxuz%Y5sAeTi@^28^m(;*)qa|l8m7g6PBa)=O?-+{Z%h}q~;aA&XKb^xhQu6a{9aYD5OjR1}D0R<8OE___9Dzz55%C=? z*tNVqxb9F!^2xjrf%D#m{O|8h0#$xrZ@;P!DMXF7XTyFLjNOY<3v+e?g7K4YyUlK4 zD~zCwcf5wX^B56@_*Smj-_%G=3YL#P3g6`2IiEw`%(`LDGZiOuW88q^c+#=k4j~bD zbjPx*%0@e_nIT{-oW^s5*o{hpS}bXh$+n@|`wl(i{2zTQm~Kad>s16XiFQIcsB7&~ z-SC`Oi&>=nS-X@D*dB=<^H@gz{JF-8V@6F_aDIZZT-tbmzOfJ)!#*$zxg^b^DTXG5 zrLQv$Ui!Z9QSe_FopYI{8a3(+U82sYW+tLuwx1keAH2jA6PbM-rat)VI6aE=dG$G* z$Ym#eq7R`1XVkB4-0n%J_5=4&&Jp^5ghH_-TN`%Fg`{2%o)Y}{@SxK&jPQZ?%8&Bu z&&bDpIaF+j1H@I6L)T$SRywm@Dr5Z+Msug8(5u!hU1 zI)ZpBbJueCXXfuB_*3O!t}T;cHRFfOybjX^xeguWZ>}{HKMK;!jED|zLL^0QMN{JU zIBG;9o--lVVj{(BBEJ_tE8JOX1>uBbzoW0oA~;|5^U*M}$;SSm?cFCPw1|*MFg}7q z+21TC-owoi>iu&^&)YnF4iUCl4n3dS5kI}b9-wAf=PWxBJ9{I zyF6jo5$Y++Q!~~!3Wnk-st$2){HKfVve!v{&%md3k4fa`EXxTaw6aF_r{XocS;baI zK)Sc$mt4|WieNFM-8@?3zc2WKmp6V1(XOu}UB1Atce7rIzL>;iUcdJlqCEZ&v(NXE z&cvLEbs75rj3YhNgO@iVkpz9e&#OJ9cDK+#t2H*awh!%F03~Z*TTheyeIzM-BfTh@1XR|3n{)Pyb0uSC`YF3QCyP# z9I>cY0J^owd6&1nx9Bfd>u*a(e!Q5)xV2^3jmee}TyA|GejfR8zRo-aP(O%Y5E1z- zcXYZxn&&wbD+YHTh1}1yApInusHd8bB#S}fihsj&{QB1|N0r3+c#jveH;hl_avrR3 zW0mvfdKg9b9*25Ke+`_u$Of^2f5mVQ161HzX$gYtJ>qNw$RR0iPs_V7+(He9y z0eOA=+6(46k8~YXD}NA5%R{Z_B=fGs1kk9zKfx@W@qKXEMxYSb9Rh zF&qz>L zFvfcgZn;8KmPUB_<;%G*t9=x6rwx@BH}Jx`jlWjZ-+R6N-tVyw>3ogYGQ|nw*5o&t z=86mmAp@c=`zhT*3++7#=zmT0V8;gS^S|WmMAMBUyx5TUma`?dV8H>UqC z1zv^B3=nxg`9W>jt8vzLaqhSSOnKMW)qj4=o6&hp z>0Y!ia{v)^U@uZC?3@zY);Ax67){grbNqlnGf%MSn&K&s~$JU7e?WDcPo6tj(y% zxTuibZN4)r;2P@0o07Aw*X8eZea9h>X+UOp&KzYyO@2YdSBY1n%%WR%=014qUUaaR z<<7x6^I!-rru&ydT!RO}>uaD-F4}$9={^L?P1>g%FI1fcPOn*}9J6>x# zJ^_#%O#S6CUOSU&Hp~j_v9|d&)&wcFh&dmH=8R7@JGKWA>;Pu-z_}u5so4=c-?$1& z+U4mle#I?N#VSyU1zpOB5cea)y2q2zOp$+lXj$5EVyJXJR-ppNsKKHVyFin$pxHZW zA+nSm&3+EF-0=fsp${Zd4{Ic$qJ;10>jj>X5h>!xn%% zrv^7^*+Fwsg3Swo*akDeoXr0H+r5fe$rsFwjjWtiKn1K z2d(I!SP7jyU{EI0)n!-&w0Q%)Wj*2TU)WAHrLv_fkC{>xR=i3UM-jnX5_(fQPe}Y| zzCSm5DC_W+qZ9RN{SJrHPt$%ZtWdp3{H9D;WfnA=`sAeipxOIezB+zc40iU4aGdeU z(^LrSxsJ^XW-fp(vOH>0U0|7vT_{R-u>nC(X&t7#nic4uDoEuH}PtP|KlVtj5Wg7o-DBSYRi|$wwmf+wMyX>W0RD>rCLQ zvpeN3h7HM>E3tuBDro7eH9;mXV3wjoh27gm$`_dat+s@sufUOKoK-(#F4b>!ts)O% zlLS96XZ>403sOWn!A2SY>&7D~EV%EmlO?4HX!CBiGUhy|?KjY9{Z$8gVDhK>k~mDW zVPzaCpj6@kI!|<{xB4d_*#tjm(4c@zhkmK?{cpy!x%6I~m#0UgTMNq9U@Sdq4a?fuu@vV}map;avCk|d}SOz0AN zpb^{rLRfIMVjewu(!sonT-Us84n~ouPqS#YGX|B3g(5m-?U0aqSqIg!6-+e>WmZj# zB!tu$Y_)E5NJ{S90`i&8s7s2jj!opPiNL{jwmiO!jQ$pUfr3E)R;IAz5J}ddtih;K zt(7dpkn{0H=6HVVz^Hb?t{VoI38ddkJ0>Bq+;B=1TPC?{B1$Z3BJD$Q7@{3xv5@F% z020TqiDIt+aJ&rBEb)qXa{@DCStu+s;~B3w05-JldHOh6T-dh1W~%T@vt22s92Hpc zF{PNoAgs@D zOzX0=n}+Z^tBQ0;w+^#^*l8fBrE@+bEsDB6l}NO?>u+5{D(RD$PC*`lb|=jkWYt(? zWhcbxcq@O@C6GI9BVCy+G+l)95b;)fpP_CYcAsU|x#IQgoEy#Qgd6{$o649kgD#ji zs+w$k8>;7uU+*Pg2W`(xrS~simq&LpkIO7$$$eRcX?L?9BficwqYbL=GpWVDcmwI# z!llNLpfyAjjHhI^u3mgoGvgwOi)$VyxsnxMy(Z1Dew5KAu*HDe9xc1pBvxaO$K%cX z9gJ~m>Hol7+vlDj8H_euE9?k7wJz*~==k9pw1nVa6#Rk*CWjU$?~i&_$a{TWxgWSb z)-Y*8Lv?%qJFtNDCKN-=AsLqGA#9C=xrmq3{C`S(yDr(tM*iFWo$t<(PgLb)aq*c+Tub0Qr!9*Gze zMbl3?}t9MaU$u@D& zA;0JGiT#0ny>3CP3ZKOkHd(866(^@IG;2f6vri9%DcB*N==w80F=cmd)d9Hc2c5c@ z66dZJ+J!uH`sl(K5^3-#DxGo)v4tv6nNF9_0NDRvsp$RICt)l z`p*eJ)uP5iPAKMN&2=P=FkGYj2qKVI;x)rpMLIq8K=C{DQiGE?U+JjW(Z8M@yT9gS z5ys{naO!s#RLUUxqX3MG8+S;;=7<6SW%|VI#T$$x(IPYm#qjHP&^ze&*8mnt)0w7V zW~9su)DaWW9p2de_bMAaFY8qooYE@ktJoS?m0pRP%bfXT$7xpzsOk zKt~JPvH2!ofgdKa;o+l1__^?f#NU2lRP;o3N>f>Yl6tc;?Sa+_+EV~!#Nc374mIYB ztJEi3RX2+Y3+4lSccCu=ABJNE(jCJ2I@P2rT2jwnJyeY1pGLqIkj~UruMlx*ZP*3ZI`ZApf2keMoN^)}_FV4Zyv~p$}0AyAc}vE<%B- zN#!bcJdPsA(u_3LmKriBebH~l-Ev+AbWRuV;uYm+QvKI|ob>gfw*ZUy`Nzzk3FV39 z*-d0=q3sz9L`kR}BJGfsrX@&4NBQ7V52WIFJ0>L9^Zr#Z)m3-2MOE@gQv@QNI&iC*;ghP^NRw>4DAIw+aUyfo*b`J07w>$&&?A9cmZL!cv~t#*nnNv-Cb2SY*&T z8{TrV1Ov9SbR@8PwhS~RT-_pCT|b}qQk2m&;@91~8i!8YF)ck2%piG94Kc_W2{scX9Cq0Wh7)oTamw)coiaj6~T;m(C%IaLSsCDXE?hbE{o zmg4j$Si)kcr^{HEsS9Ex*E|F<_bQBhDaUQjaf>P)5==I{{tJ*(+5HJ#v)G~0Ij*cq zonKx9K~s9V;IFa}96}j$o$#Ows$R06bcSpa=9zMibtCc7(=*6wjCr6cDNsG~MMk5~ z_tg@H-t_dfIedh7NzLZ}#UjZ%dmY>B%v5M{Xlt)ug7JcS89K3DF|N?@2jI5Cd$%n?0LuRAMwIVO+(3^kib@Lw%?UtnV8Tx@6`b4wQre}(m z0dR6YB}3N%XZ{u}-SZ`ZNyl@{gRyFv$%(uY*Bp|dsJv(0*K;Dld4#(6q#rb;!?Yze zW+g1!!^#-%S+XtIzLv^ZiF^K`KhzV~>FSs60b__tD!}m~7%{ zj%>xsqJlOzbAwPlOBInkH@wrliK}IJwHm7=z^`5*@xn2i9rmno>2S3&u>F;VMZ_{l>83$3 z;UEViq<6PuRT+lvJaAAhW3-~41e0H?G9uzKV+9ApUy43IuVnfCC|RjZ#5|01a5ZMtelFcqm|PJhQ+TNZQ3*m;~@d!w39|%B_;ZI ziI48N8-d|o8&k~nZSIe0Z@*}PNU!w=Y0vhE-z7QTu|2or()hgMdejC-256pVsc&JT z217d&JjzTYbW(zHJRFTO>8aZESiX!$X%mK_>lM}zTTVxh18&qukn44!6T{0A%UZQr ziLIJEg*o9DmyX;Zxf)jQ4k=2;8cA9VyXOIUgFkhdiEW$YW%(l`QnGmAyso#9r1IS< za}#?Wy-g__GO~oh_f9cVcFnx#6fxHp%72)+ihDt(jV{cGjXF1ZKD5%4(V6T>rl~Qk zMS$aa86?H)re=u-O7g!koFHf!x18WZ{+Ge9tK)kq#!+I?$hhu)oT9Nvh z88%BwZWyCui>|0mPT)Ot(Pjbmd7fs=I>hMa*)$c;DnOU}oDR=3{DZme^XkIAH0_wD zYqe%~LI&SV3WZ))^k+LXjdb)Sv(Uv>oT<1*KTZbq_?;2{s_`aej#=V2!(L)^-PB*8 zZJ=|@u%O52V_rK6UriWXZ_<#V1farR-%SBW|6P6?=8^nlq473Im{d7R1cL7yJBw8u7A6XFWBov%tM@3FfEvibXJ7sfHaF! zv?13&tLRr@Og5Vn81@O{5?mFYdFPl-dsZ%~a}CtXJoW*pJOj=OKQg(sZz-KP8kE>b zzqsbeC|$8BaW{_^DUL|XX_XUb4m1*NXs~?sx0V3}3^Po!B{HqyX0~E&rMFstYCy{c zCoLuT#)MiEAJ-AK8>V9jhC8xkcMZhtU;p+bzji_RX9(J}#7(h0)pcNX->w@oT3Il% zuV%ltA$PD4g>3HLPvJ*HvMX}iY+N9)> zycvHrAHqG1emxoZ7oo}zg*mOq0rO~dL7nic_75jF^*-P7tG&R1e&uSsI$cN|3xU|H zAe-0O&PMzC=8Z$OKO5_(CKH&K@%XHse&`I2Dnj0Jn3NV9*>GJyuBR{K8M~`6mDJz} zX;!E$I{lFBd}62Wwb-C$2?ofVnl47-V~B^q++b&sc2JE)eJLx|QX_MH~h^15%CT4BZg?ypSXOo0G>G&LZy-=9bFwrHQpiML;>`G^>-Wy5hF|pP^8h zIj8<9Jxb2#uZgD03uAvx+^>oe)TE<5zj*pcpZ6;tZ})7XC=J1;eF$MfgA+xlt#OEt zQA9*rYfm8d`}XoB8wa5D!Mubr7=fc&rp!Ck1D(Vs+ zH-;wKwUz$&3_Y4~cFIMjehRR_;9PizRfq;adKtt^Ix46OH+a^7)#>J*u$cp>C*v8Z zN7~Pk8}-v&HF!B0oB8#qlwMBxa>Uh@XN}6oP_KG6Rk|HbQFsYlV2TE+}caVk;^H^s9bTyu1y-UV% z@0OEUJbm6rd>oso$6(YzVXbj8|C4P z7s$i64&>k0yXfMPp0lm1QEEA3mH2zxjB^8PaUR*Vw|5^pBGr@XN283tz>MRx`VLK! z(-xBW44w_lU8?&fB>A0H#^!9C!>Ty37vd`kC{(@{p?wa5+jNzAjUSF7JAZF=NaBZi z9yW%=3>)G&ME=6uE5zEBQMW9qlOa%Q1=xWgn>AKia$Oj5$Dhy@W8x9!pVu@jn~Yio z3@DpMc-%gW^#>M=r9^XZX)Wa=rZP4jK$3Sbjy8QX?pyCu=oM;QYfl}RWr^wP0!H#U zqf7x2_6vYvhy528x|+L3z@01n)h6Z;md7~b#&k%vPhi#z$#XW>M!0vjH8pxSta*O; zcY^BRq7yWTfP+O?=DTGqk8?fA3aOCsNUGVVNK9MT?bd=n@foIJA>!7ri#-oD$S?w& z8eHnoyd**3>%@h65)WBS`&Jl_g(qqAegEG_oEi%)KPG-%DG2V*TrV?7kGLX9NSvW`N_U}kr%eK z^JUb1``lcj^fS6Y{RKlhVdT7V#}&b_PHw;!nPigKEo0Zm8%KT~yK7uMQ3+Z$)&8r< zwK+D5uKFERXdFszWi2DIi>BC)i#;aq%B!xp7fA5{eKy9ezSd&%s`TKJNz40omWjG6 z<30I=pRvq3-jJ21Gyc>iyoU?vu1H{!gb%kjIc&gr#(quukF}8oGN-?LyAOx=eB8z; zR@OX72H$|NqZ+H|-8k7KYDzp6XLk8!I5nqCzVqUy+l+CeG2^u0jByd~%J8G6E0V(& z>R#))V!aOr{i8(s8n|h5+Rwv%TE$i*HG zcfdEKi~aHSb@hd1YP+zn?1OUZMfjP(&V+E-y%4!PXz-IG>rXgMKnxJ`cky@g9rhK? z@$1pyA9fA?v&M!vxH{>Zwfl)ytBwi2V5bRzXQ#Prw>tID!`0e0;-V;M z4{|Vfay!P$)A=uEZB>J*1>u zRviTIkCzU=5*>pjZ7_3;CmhmfD5>!wmNPBVFat(2De<1#$ze>E=-A0G$>3OS02Jwg(Wh0yz6wn=vkqTtxJF`7C|7S>;*b`G6%u@nM(nj?-Ji8T{ zLx1hC(=a1GveDL~H3-CYa5r-&8f&QYa~Ww!Uq?k%VR(C7nVB;?*R!XN5E_9deX@A9 zE26Q}<80p#0Z_T3%VV-jiL%=*+ul}1QaOu@KFU=_xu+Gbcw9p0j*0nxGoB<&BA3p1 zA{1QJ-4fDexLW- zhrvNQXM5jzxBJ(VvRBiu`x6y|zd4ZsZ`lcBOLjTgJU(~N#~T@m1r;q*HIuqLUVfC4 zDNIN?UB2&+-fv3v2?47#;nB;{hRt*(^~(>W8PoEuJbr^?@(V8kAuE+WS=nvrJI8v2 z{WD8OoSswmo*{EAnM_GL=G&1*oVeDD6X{WSJ;t%BZQXT$@Zh^ugOZog}>8Xb7lw-Gg zG8u;vm*W-Bg`9`qKRj-^{^=J1{ET)5qLWRQ-`TM5Y^i^bFdm}aWr@x=?=rKG?s<*~ zJ!FZl{wL^u3%CCh_`ZdQ|F7`8Np$y_y7jgpL-h84$4g87t44hGcK!69p-PUpo<^Ns zVV?gd;1tY4_daQt9C7n5wdqyQ4fj4lckv(NJruG3o9>DB1pO|?!DV;lf(b#MoV_dA zdOUftn!7XVNe~eniDcu|r8FBT5Q_*ZG#t>^8qq}cK79cYpq_hH%hdLV-1;eM z45x%7A&5~|4cg<&Wa7wJ6_iu_EF?EU8kMhFc8~^=$6yWp3OUPs1*1)du!O6t9BZVN zLaz;292}kOrj5;=cLPp)lCF201*uTnDsuWgTtfPJ-=E$x^tgHU3YCu3UaOkAtf{8U zPb{mlSNTAM^*bEYEqauasH6dxZjrAQmz1*32aVGUm~R6lWU0u~|1@Cc(o3~d@(k^y z%6W1RqTt*i-tE|%q^#VJ=z-ZN!&!BYL0{- z`JyD8r1N}Qx|7u9#aH0Cs|%tqu>0A*oljslCaR>ntFj{$XgGjk1_DB}y&P?3022Zo zRe{YIT#T10%>a_RDJqHh^ff7=&R> zuM&V`5SGo^KYRC^3!z+Ru|0VZOu=i!j|#Ub1#RULkDAjqsIgUME}esT@VVI4CDJw^ zNX3w-_+sPwf3wU6z#5os7)Tu*=x#`3oO4zOEeVY?)A1=})*hs@y9{^=cNBns=eR}J zKI>CT-UX#xa|UY;A$P4z)uR-&)aF&aq=DCQFMml~--)+KOuR#^j~pKqguJb?&`nGM zh~}_845t+daSRz+#*_LLMU2yJ;H~7~o z9ESyM#Yw4(!o`dnOg@R2o;jsxqCFLgEpZjy5OGcb%+YI3AFeUL2(uIEgx`Y-uEbZZ z_z6y6Dh5;#-r0H3VTqAF

Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-paperless-ng' of Deployment 'RELEASE-NAME-paperless-ng' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-paperless-ng' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-paperless-ng' of Deployment 'RELEASE-NAME-paperless-ng' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-paperless-ng' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-paperless-ng' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-paperless-ng' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'RELEASE-NAME-paperless-ng' of Deployment 'RELEASE-NAME-paperless-ng' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'autopermissions' of Deployment 'RELEASE-NAME-paperless-ng' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM |
Expand... A program inside the container can bypass Seccomp protection policies.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-paperless-ng' should specify a seccomp profile
|
Expand...https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/
https://avd.aquasec.com/appshield/ksv019
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-paperless-ng' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-paperless-ng' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-paperless-ng' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-paperless-ng' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:017e4d5af2d17c98b8c779a943d8152f75a824535aca43381663c365895add33 + tccr.io/truecharts/paperless-ng:v1.5.0@sha256:aef66d1bd436e237d0f6eb87dc5c0efe437b9ebcb4f20383dc36c165308df755 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:017e4d5af2d17c98b8c779a943d8152f75a824535aca43381663c365895add33 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/redis:v6.2.6@sha256:100253084d6dc4a542a19e77c7c181e9013042788c83673e9f40a24b629a5147 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:017e4d5af2d17c98b8c779a943d8152f75a824535aca43381663c365895add33 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/paperless-ng:v1.5.0@sha256:aef66d1bd436e237d0f6eb87dc5c0efe437b9ebcb4f20383dc36c165308df755 (debian 11.0) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| ghostscript | CVE-2021-3781 | CRITICAL | 9.53.3~dfsg-7 | 9.53.3~dfsg-7+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781
https://ghostscript.com/CVE-2021-3781.html
https://ubuntu.com/security/notices/USN-5075-1
| +| imagemagick | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| imagemagick | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| imagemagick | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| imagemagick | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| imagemagick | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| imagemagick | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| imagemagick | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| imagemagick | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| imagemagick | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| imagemagick | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| imagemagick-6-common | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| imagemagick-6-common | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6-common | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6-common | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| imagemagick-6-common | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| imagemagick-6-common | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| imagemagick-6-common | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| imagemagick-6-common | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| imagemagick-6-common | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| imagemagick-6-common | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| imagemagick-6-common | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| imagemagick-6-common | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| imagemagick-6.q16 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| imagemagick-6.q16 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6.q16 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6.q16 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| imagemagick-6.q16 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| imagemagick-6.q16 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| imagemagick-6.q16 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| imagemagick-6.q16 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| imagemagick-6.q16 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| imagemagick-6.q16 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| imagemagick-6.q16 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| imagemagick-6.q16 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libaom0 | CVE-2021-30473 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578
https://bugs.chromium.org/p/aomedia/issues/detail?id=2998
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2021-30474 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/6e31957b6dc62dbc7d1bb70cd84902dd14c4bf2e
https://bugs.chromium.org/p/aomedia/issues/detail?id=3000
| +| libaom0 | CVE-2021-30475 | CRITICAL | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/12adc723acf02633595a4d8da8345742729f46c0
https://bugs.chromium.org/p/aomedia/issues/detail?id=2999
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2020-36131 | HIGH | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
| +| libaom0 | CVE-2020-36133 | HIGH | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
| +| libaom0 | CVE-2020-36130 | MEDIUM | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
| +| libaom0 | CVE-2020-36135 | MEDIUM | 1.0.0.errata1-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libarchive13 | CVE-2021-23177 | MEDIUM | 3.4.3-2 | |
Expand...
| +| libarchive13 | CVE-2021-31566 | MEDIUM | 3.4.3-2 | |
Expand...
| +| libarchive13 | CVE-2021-36976 | MEDIUM | 3.4.3-2 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml
| +| libavahi-client3 | CVE-2021-3468 | MEDIUM | 0.8-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://ubuntu.com/security/notices/USN-5008-1
https://ubuntu.com/security/notices/USN-5008-2
| +| libavahi-client3 | CVE-2021-3502 | MEDIUM | 0.8-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3502
https://github.com/lathiat/avahi/issues/338
https://github.com/lathiat/avahi/pull/324
https://ubuntu.com/security/notices/USN-5008-1
| +| libavahi-common-data | CVE-2021-3468 | MEDIUM | 0.8-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://ubuntu.com/security/notices/USN-5008-1
https://ubuntu.com/security/notices/USN-5008-2
| +| libavahi-common-data | CVE-2021-3502 | MEDIUM | 0.8-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3502
https://github.com/lathiat/avahi/issues/338
https://github.com/lathiat/avahi/pull/324
https://ubuntu.com/security/notices/USN-5008-1
| +| libavahi-common3 | CVE-2021-3468 | MEDIUM | 0.8-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://ubuntu.com/security/notices/USN-5008-1
https://ubuntu.com/security/notices/USN-5008-2
| +| libavahi-common3 | CVE-2021-3502 | MEDIUM | 0.8-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3502
https://github.com/lathiat/avahi/issues/338
https://github.com/lathiat/avahi/pull/324
https://ubuntu.com/security/notices/USN-5008-1
| +| libavcodec58 | CVE-2021-38171 | CRITICAL | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-20450 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-21688 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2021-38291 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-20445 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7996
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-20446 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-20453 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-21697 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-22037 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-22042 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2021-38114 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-22038 | LOW | 7:4.3.2-0+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libavformat58 | CVE-2021-38171 | CRITICAL | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-20450 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-21688 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2021-38291 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-20445 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7996
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-20446 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-20453 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-21697 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-22037 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-22042 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2021-38114 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-22038 | LOW | 7:4.3.2-0+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libavutil56 | CVE-2021-38171 | CRITICAL | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-20450 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-21688 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2021-38291 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-20445 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7996
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-20446 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-20453 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-21697 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-22037 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-22042 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2021-38114 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-22038 | LOW | 7:4.3.2-0+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.31-13 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2021-43396 | LOW | 2.31-13 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.31-13 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-dev-bin | CVE-2010-4756 | LOW | 2.31-13 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-dev-bin | CVE-2018-20796 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2019-1010022 | LOW | 2.31-13 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-dev-bin | CVE-2019-1010023 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-dev-bin | CVE-2019-1010024 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-dev-bin | CVE-2019-1010025 | LOW | 2.31-13 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-dev-bin | CVE-2019-9192 | LOW | 2.31-13 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2021-43396 | LOW | 2.31-13 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.31-13 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2021-43396 | LOW | 2.31-13 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6-dev | CVE-2021-33574 | CRITICAL | 2.31-13 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6-dev | CVE-2010-4756 | LOW | 2.31-13 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6-dev | CVE-2018-20796 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2019-1010022 | LOW | 2.31-13 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6-dev | CVE-2019-1010023 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6-dev | CVE-2019-1010024 | LOW | 2.31-13 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6-dev | CVE-2019-1010025 | LOW | 2.31-13 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6-dev | CVE-2019-9192 | LOW | 2.31-13 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2021-43396 | LOW | 2.31-13 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libcairo-gobject2 | CVE-2017-7475 | LOW | 1.16.0-5 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo-gobject2 | CVE-2018-18064 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-gobject2 | CVE-2019-6461 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-gobject2 | CVE-2019-6462 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2017-7475 | LOW | 1.16.0-5 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo2 | CVE-2018-18064 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6461 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6462 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcups2 | CVE-2014-8166 | LOW | 2.3.3op2-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2015/03/24/15
http://www.openwall.com/lists/oss-security/2015/03/24/2
http://www.securityfocus.com/bid/73300
https://bugzilla.redhat.com/show_bug.cgi?id=1084577
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libde265-0 | CVE-2020-21598 | HIGH | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/237
| +| libde265-0 | CVE-2020-21594 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/233
| +| libde265-0 | CVE-2020-21595 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/239
| +| libde265-0 | CVE-2020-21596 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/236
| +| libde265-0 | CVE-2020-21597 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/238
| +| libde265-0 | CVE-2020-21599 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/235
| +| libde265-0 | CVE-2020-21600 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/243
| +| libde265-0 | CVE-2020-21601 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/241
| +| libde265-0 | CVE-2020-21602 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/242
| +| libde265-0 | CVE-2020-21603 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/240
| +| libde265-0 | CVE-2020-21604 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/231
| +| libde265-0 | CVE-2020-21605 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/234
| +| libde265-0 | CVE-2020-21606 | MEDIUM | 1.0.8-1 | |
Expand...https://github.com/strukturag/libde265/issues/232
| +| libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgif7 | CVE-2018-11489 | HIGH | 5.1.9-2 | |
Expand...http://www.securityfocus.com/bid/104341
https://github.com/pts/sam2p/issues/37
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libgif7 | CVE-2020-23922 | HIGH | 5.1.9-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceforge.net/p/giflib/bugs/151/
| +| libglib2.0-0 | CVE-2012-0039 | LOW | 2.66.8-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.2.1+dfsg-1 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgs9 | CVE-2021-3781 | CRITICAL | 9.53.3~dfsg-7 | 9.53.3~dfsg-7+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781
https://ghostscript.com/CVE-2021-3781.html
https://ubuntu.com/security/notices/USN-5075-1
| +| libgs9-common | CVE-2021-3781 | CRITICAL | 9.53.3~dfsg-7 | 9.53.3~dfsg-7+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781
https://ghostscript.com/CVE-2021-3781.html
https://ubuntu.com/security/notices/USN-5075-1
| +| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.18.3-6 | 1.18.3-6+deb11u1 |
Expand...https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libheif1 | CVE-2020-23109 | HIGH | 1.11.0-1 | |
Expand...https://github.com/strukturag/libheif/issues/207
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.18.3-6 | 1.18.3-6+deb11u1 |
Expand...https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.18.3-6 | 1.18.3-6+deb11u1 |
Expand...https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.18.3-6 | 1.18.3-6+deb11u1 |
Expand...https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libmagickcore-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| libmagickcore-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickcore-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| libmagickcore-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| libmagickcore-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| libmagickcore-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| libmagickcore-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| libmagickcore-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| libmagickcore-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| libmagickcore-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libmagickwand-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
| +| libmagickwand-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickwand-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickwand-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickwand-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html
http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
| +| libmagickwand-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.html
http://secunia.com/advisories/30879
http://secunia.com/advisories/32151
http://sourceforge.net/forum/forum.php?forum_id=841176
http://sourceforge.net/project/shownotes.php?release_id=610253
http://www.securityfocus.com/bid/30055
http://www.securitytracker.com/id?1020413
http://www.vupen.com/english/advisories/2008/1984/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
| +| libmagickwand-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2
http://www.openwall.com/lists/oss-security/2016/12/08/18
http://www.securityfocus.com/bid/93599
https://bugzilla.redhat.com/show_bug.cgi?id=1385694
https://github.com/ImageMagick/ImageMagick/issues/272
| +| libmagickwand-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/633
| +| libmagickwand-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://github.com/ImageMagick/ImageMagick/issues/634
| +| libmagickwand-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/97166
https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
https://github.com/ImageMagick/ImageMagick/issues/271
| +| libmagickwand-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| +| libmagickwand-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libopenjp2-7 | CVE-2021-3575 | HIGH | 2.4.0-3 | |
Expand...https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
| +| libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7 | CVE-2016-10505 | LOW | 2.4.0-3 | |
Expand...https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-10506 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/100573
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
https://github.com/uclouvain/openjpeg/issues/731
https://github.com/uclouvain/openjpeg/issues/732
https://github.com/uclouvain/openjpeg/issues/777
https://github.com/uclouvain/openjpeg/issues/778
https://github.com/uclouvain/openjpeg/issues/779
https://github.com/uclouvain/openjpeg/issues/780
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9113 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93980
https://github.com/uclouvain/openjpeg/issues/856
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9114 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93979
https://github.com/uclouvain/openjpeg/issues/857
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9115 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93977
https://github.com/uclouvain/openjpeg/issues/858
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9116 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93975
https://github.com/uclouvain/openjpeg/issues/859
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9117 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93783
https://github.com/uclouvain/openjpeg/issues/860
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9580 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9581 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2017-17479 | LOW | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479
https://github.com/uclouvain/openjpeg/issues/1044
| +| libopenjp2-7 | CVE-2018-16375 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105266
https://github.com/uclouvain/openjpeg/issues/1126
| +| libopenjp2-7 | CVE-2018-16376 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105262
https://github.com/uclouvain/openjpeg/issues/1127
| +| libopenjp2-7 | CVE-2018-20846 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/108921
https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
| +| libopenjp2-7 | CVE-2019-6988 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/106785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpng16-16 | CVE-2019-6129 | LOW | 1.6.37-3 | |
Expand...https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| +| libpq-dev | CVE-2021-23214 | HIGH | 13.3-1 | 13.5-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libpq-dev | CVE-2021-3677 | MEDIUM | 13.3-1 | 13.4-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677
https://ubuntu.com/security/notices/USN-5038-1
https://www.postgresql.org/support/security/CVE-2021-3677/
| +| libpq-dev | CVE-2021-23222 | LOW | 13.3-1 | 13.5-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libpq5 | CVE-2021-23214 | HIGH | 13.3-1 | 13.5-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libpq5 | CVE-2021-3677 | MEDIUM | 13.3-1 | 13.4-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677
https://ubuntu.com/security/notices/USN-5038-1
https://www.postgresql.org/support/security/CVE-2021-3677/
| +| libpq5 | CVE-2021-23222 | LOW | 13.3-1 | 13.5-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
https://ubuntu.com/security/notices/USN-5145-1
https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libspeex1 | CVE-2020-23903 | MEDIUM | 1.2~rc1.2-1.1 | |
Expand...https://github.com/xiph/speex/issues/13
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXCRAYNW5ESCE2PIGTUXZNZHNYFLJ6PX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3SEV2ZRR47GSD3M7O5PH4XEJMKJJNG2/
| +| libspeex1 | CVE-2020-23904 | MEDIUM | 1.2~rc1.2-1.1 | |
Expand...https://github.com/xiph/speex/issues/14
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh-gcrypt-4 | CVE-2021-3634 | MEDIUM | 0.9.5-1 | 0.9.5-1+deb11u1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1978810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWAAB2XMKEUMPMDALINKAA4U2QM4LNG/
https://security.netapp.com/advisory/ntap-20211004-0003/
https://ubuntu.com/security/notices/USN-5053-1
https://www.debian.org/security/2021/dsa-4965
| +| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-1 | 1.1.1k-1+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1k-1 | 1.1.1k-1+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1k-1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1k-1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libswresample3 | CVE-2021-38171 | CRITICAL | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38171
https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-20450 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-21688 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2021-38291 | HIGH | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38291
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/9312
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-20445 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20445
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7996
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-20446 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20446
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/7995
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-20453 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-21697 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-22037 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22037
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8281
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-22042 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2021-38114 | MEDIUM | 7:4.3.2-0+deb11u2 | 7:4.3.3-0+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38114
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-22038 | LOW | 7:4.3.2-0+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtesseract4 | CVE-2021-36081 | HIGH | 4.1.1-2.1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29698
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/tesseract-ocr/OSV-2021-211.yaml
https://github.com/tesseract-ocr/tesseract/commit/e6f15621c2ab2ecbfabf656942d8ef66f03b2d55
| +| libtiff5 | CVE-2014-8130 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiff5 | CVE-2017-16232 | LOW | 4.2.0-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
| +| libtiff5 | CVE-2017-17973 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiff5 | CVE-2017-5563 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2017-9117 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2018-10126 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libvpx6 | CVE-2017-0641 | LOW | 1.9.0-1 | |
Expand...http://www.securityfocus.com/bid/98868
http://www.securitytracker.com/id/1038623
https://android.googlesource.com/platform/external/libvpx/+/698796fc930baecf5c3fdebef17e73d5d9a58bcb
https://source.android.com/security/bulletin/2017-06-01
| +| libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpdemux2 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libxslt1-dev | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| linux-libc-dev | CVE-2021-43267 | CRITICAL | 5.10.46-4 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.16
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43267
https://git.kernel.org/linus/fa40d9734a57bcbfa79a280189799f76c88f7bb0 (5.15)
https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
https://linux.oracle.com/cve/CVE-2021-43267.html
https://linux.oracle.com/errata/ELSA-2021-4647.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVWL7HZV5T5OEKJPO2D67RMFMKBBXGGB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
https://security.netapp.com/advisory/ntap-20211125-0002/
https://ubuntu.com/security/notices/USN-5165-1
https://www.sentinelone.com/labs/tipc-remote-linux-kernel-heap-overflow-allows-arbitrary-code-execution/
| +| linux-libc-dev | CVE-2013-7445 | HIGH | 5.10.46-4 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2019-19378 | HIGH | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19449 | HIGH | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2019-19814 | HIGH | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-12362 | HIGH | 5.10.46-4 | |
Expand...https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-16119 | HIGH | 5.10.46-4 | 5.10.46-5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16119
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695
https://launchpad.net/bugs/1883840
https://linux.oracle.com/cve/CVE-2020-16119.html
https://linux.oracle.com/errata/ELSA-2021-9487.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza@canonical.com/T/
https://security.netapp.com/advisory/ntap-20210304-0006/
https://ubuntu.com/USN-4576-1
https://ubuntu.com/USN-4577-1
https://ubuntu.com/USN-4578-1
https://ubuntu.com/USN-4579-1
https://ubuntu.com/USN-4580-1
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4577-1
https://ubuntu.com/security/notices/USN-4578-1
https://ubuntu.com/security/notices/USN-4579-1
https://ubuntu.com/security/notices/USN-4580-1
https://www.debian.org/security/2021/dsa-4978
https://www.openwall.com/lists/oss-security/2020/10/13/7
| +| linux-libc-dev | CVE-2020-26556 | HIGH | 5.10.46-4 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.kb.cert.org/vuls/id/799380
| +| linux-libc-dev | CVE-2020-26557 | HIGH | 5.10.46-4 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26559 | HIGH | 5.10.46-4 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26560 | HIGH | 5.10.46-4 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2021-20322 | HIGH | 5.10.46-4 | 5.10.70-1 |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
| +| linux-libc-dev | CVE-2021-35039 | HIGH | 5.10.46-4 | 5.10.70-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/06/3
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.14
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35039
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c18f29aae7ce3dadd26d8ee3505d07cc982df75
https://github.com/torvalds/linux/commit/0c18f29aae7ce3dadd26d8ee3505d07cc982df75
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://seclists.org/oss-sec/2021/q3/6
https://security.netapp.com/advisory/ntap-20210813-0004/
https://www.openwall.com/lists/oss-security/2021/07/06/3
| +| linux-libc-dev | CVE-2021-3653 | HIGH | 5.10.46-4 | 5.10.46-5 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1983686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653
https://github.com/torvalds/linux/commit/3d6368ef580a
https://linux.oracle.com/cve/CVE-2021-3653.html
https://linux.oracle.com/errata/ELSA-2021-9565.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://ubuntu.com/security/notices/USN-5062-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5072-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/08/16/1
| +| linux-libc-dev | CVE-2021-3656 | HIGH | 5.10.46-4 | 5.10.46-5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656
https://github.com/torvalds/linux/commit/89c8a4984fc9
https://linux.oracle.com/cve/CVE-2021-3656.html
https://linux.oracle.com/errata/ELSA-2021-9565.html
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5072-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5082-1
https://www.openwall.com/lists/oss-security/2021/08/16/1
| +| linux-libc-dev | CVE-2021-3752 | HIGH | 5.10.46-4 | |
Expand...https://lore.kernel.org/lkml/20210714031733.1395549-1-bobo.shaobowang@huawei.com/
https://www.openwall.com/lists/oss-security/2021/09/15/4
| +| linux-libc-dev | CVE-2021-37576 | HIGH | 5.10.46-4 | 5.10.46-5 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/27/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576
https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
https://linux.oracle.com/cve/CVE-2021-37576.html
https://linux.oracle.com/errata/ELSA-2021-3801.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/
https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u
https://security.netapp.com/advisory/ntap-20210917-0005/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://www.debian.org/security/2021/dsa-4978
https://www.openwall.com/lists/oss-security/2021/07/26/1
| +| linux-libc-dev | CVE-2021-38160 | HIGH | 5.10.46-4 | 5.10.46-5 |
Expand...https://access.redhat.com/security/cve/cve-2021-38160
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160
https://git.kernel.org/linus/d00d8da5869a2608e97cfede094dfc5e11462a46
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d00d8da5869a2608e97cfede094dfc5e11462a46
https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46
https://linux.oracle.com/cve/CVE-2021-38160.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://security.netapp.com/advisory/ntap-20210902-0010/
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://www.debian.org/security/2021/dsa-4978
| +| linux-libc-dev | CVE-2021-38166 | HIGH | 5.10.46-4 | 5.10.46-5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38166
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=c4eb1f403243fc7bbb7de644db8587c03de36da6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUVLBJKZMWA3E3YXSH4SZ7BOYGJP4GXP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UL6CH5M5PRLMA3KPBX4LPUO6Z73GRISO/
https://lore.kernel.org/bpf/20210806150419.109658-1-th.yasumatsu@gmail.com/
https://security.netapp.com/advisory/ntap-20210909-0001/
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://www.debian.org/security/2021/dsa-4978
| +| linux-libc-dev | CVE-2021-38300 | HIGH | 5.10.46-4 | 5.10.70-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/09/15/5
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b
https://security.netapp.com/advisory/ntap-20211008-0003/
| +| linux-libc-dev | CVE-2021-3864 | HIGH | 5.10.46-4 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-4028 | HIGH | 5.10.46-4 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74
https://lkml.org/lkml/2021/10/4/697
| +| linux-libc-dev | CVE-2021-40490 | HIGH | 5.10.46-4 | 5.10.46-5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa
https://linux.oracle.com/cve/CVE-2021-40490.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/
https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/
https://security.netapp.com/advisory/ntap-20211004-0001/
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5120-1
https://www.debian.org/security/2021/dsa-4978
| +| linux-libc-dev | CVE-2021-4083 | HIGH | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
| +| linux-libc-dev | CVE-2021-41073 | HIGH | 5.10.46-4 | 5.10.46-5 |
Expand...http://www.openwall.com/lists/oss-security/2021/09/18/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41073
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7KSMIOQ4377CVTHMWNGNCWHMCRFRP2T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAP4TXEZ7J4EZQMQW5SIJMWXG7WZT3F7/
https://security.netapp.com/advisory/ntap-20211014-0003/
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://www.debian.org/security/2021/dsa-4978
https://www.openwall.com/lists/oss-security/2021/09/18/2
| +| linux-libc-dev | CVE-2021-41864 | HIGH | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
| +| linux-libc-dev | CVE-2021-42008 | HIGH | 5.10.46-4 | 5.10.70-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008
https://git.kernel.org/linus/19d1532a187669ce86d5a2696eb7275310070793 (5.14-rc7)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://security.netapp.com/advisory/ntap-20211104-0002/
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://www.youtube.com/watch?v=d5f9xLK8Vhw
| +| linux-libc-dev | CVE-2021-42252 | HIGH | 5.10.46-4 | 5.10.70-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42252
https://git.kernel.org/linus/b49a0e69a7b1a68c8d3f64097d06dabb770fec96 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96
https://security.netapp.com/advisory/ntap-20211112-0006/
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
| +| linux-libc-dev | CVE-2021-44733 | HIGH | 5.10.46-4 | |
Expand...https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/
| +| linux-libc-dev | CVE-2019-15213 | MEDIUM | 5.10.46-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-15794 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4209-1
https://usn.ubuntu.com/usn/usn-4208-1
https://usn.ubuntu.com/usn/usn-4209-1
| +| linux-libc-dev | CVE-2019-16089 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
https://linux.oracle.com/cve/CVE-2019-16089.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
https://lore.kernel.org/patchwork/patch/1106884/
https://lore.kernel.org/patchwork/patch/1126650/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K03814795?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
| +| linux-libc-dev | CVE-2019-20794 | MEDIUM | 5.10.46-4 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://github.com/sargun/fuse-example
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
| +| linux-libc-dev | CVE-2020-12363 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | MEDIUM | 5.10.46-4 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-15802 | MEDIUM | 5.10.46-4 | |
Expand...https://arxiv.org/abs/2009.11776
https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
https://hexhive.epfl.ch/BLURtooth/
https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
https://www.kb.cert.org/vuls/id/589825
https://www.kb.cert.org/vuls/id/589825/
| +| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| linux-libc-dev | CVE-2020-26541 | MEDIUM | 5.10.46-4 | 5.10.70-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541
https://linux.oracle.com/cve/CVE-2020-26541.html
https://linux.oracle.com/errata/ELSA-2021-2570.html
https://lkml.org/lkml/2020/9/15/1871
https://lore.kernel.org/lkml/161428671215.677100.6372209948022011988.stgit@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/1884195.1615482306@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/20200916004927.64276-1-eric.snowberg@oracle.com/
https://lore.kernel.org/lkml/20210122181054.32635-1-eric.snowberg@oracle.com/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
| +| linux-libc-dev | CVE-2020-26555 | MEDIUM | 5.10.46-4 | |
Expand...https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2020-3702 | MEDIUM | 5.10.46-4 | 5.10.46-5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/
https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58
https://www.debian.org/security/2021/dsa-4978
https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
| +| linux-libc-dev | CVE-2021-0920 | MEDIUM | 5.10.46-4 | 5.10.70-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920
https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://source.android.com/security/bulletin/2021-11-01
| +| linux-libc-dev | CVE-2021-20320 | MEDIUM | 5.10.46-4 | 5.10.70-1 |
Expand...https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
| +| linux-libc-dev | CVE-2021-20321 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
| +| linux-libc-dev | CVE-2021-34866 | MEDIUM | 5.10.46-4 | 5.10.70-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34866
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de
https://www.zerodayinitiative.com/advisories/ZDI-21-1148/
| +| linux-libc-dev | CVE-2021-3640 | MEDIUM | 5.10.46-4 | |
Expand...https://lkml.org/lkml/2021/8/28/238
https://www.openwall.com/lists/oss-security/2021/07/22/1
| +| linux-libc-dev | CVE-2021-3669 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3679 | MEDIUM | 5.10.46-4 | 5.10.46-5 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1989165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679
https://git.kernel.org/linus/67f0d6d9883c13174669f88adac4f0ee656cc16a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a
https://linux.oracle.com/cve/CVE-2021-3679.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://www.debian.org/security/2021/dsa-4978
| +| linux-libc-dev | CVE-2021-37159 | MEDIUM | 5.10.46-4 | 5.10.70-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159
https://linux.oracle.com/cve/CVE-2021-37159.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/
https://security.netapp.com/advisory/ntap-20210819-0003/
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://www.spinics.net/lists/linux-usb/msg202228.html
| +| linux-libc-dev | CVE-2021-3739 | MEDIUM | 5.10.46-4 | 5.10.46-5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
https://linux.oracle.com/cve/CVE-2021-3739.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lore.kernel.org/linux-btrfs/20210806102415.304717-1-wqu@suse.com/T/#u
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/25/3
| +| linux-libc-dev | CVE-2021-3743 | MEDIUM | 5.10.46-4 | 5.10.46-5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=194ccc88297ae78d0803adad83c6dcc369787c9e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad9d24c9429e2159d1e279dc3a83191ccb4daf1d
https://linux.oracle.com/cve/CVE-2021-3743.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lists.openwall.net/netdev/2021/08/17/124
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/08/27/2
| +| linux-libc-dev | CVE-2021-3744 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2021-9565.html
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3753 | MEDIUM | 5.10.46-4 | 5.10.46-5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753
https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7
https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.openwall.com/lists/oss-security/2021/09/01/4
| +| linux-libc-dev | CVE-2021-3759 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-3764 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3772 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-38199 | MEDIUM | 5.10.46-4 | 5.10.46-5 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dd99e9f98fbf423ff6d365b37a98e8879170f17c
https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://security.netapp.com/advisory/ntap-20210902-0010/
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://www.debian.org/security/2021/dsa-4978
| +| linux-libc-dev | CVE-2021-3847 | MEDIUM | 5.10.46-4 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
| +| linux-libc-dev | CVE-2021-39685 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://github.com/szymonh/inspector-gadget
https://www.openwall.com/lists/oss-security/2021/12/15/4
| +| linux-libc-dev | CVE-2021-4001 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001
https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
| +| linux-libc-dev | CVE-2021-4002 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://www.openwall.com/lists/oss-security/2021/11/25/1
| +| linux-libc-dev | CVE-2021-4037 | MEDIUM | 5.10.46-4 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
| +| linux-libc-dev | CVE-2021-4095 | MEDIUM | 5.10.46-4 | |
Expand...
| +| linux-libc-dev | CVE-2021-42327 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42327
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
https://lists.freedesktop.org/archives/amd-gfx/2021-October/070170.html
https://security.netapp.com/advisory/ntap-20211118-0005/
https://ubuntu.com/security/notices/USN-5165-1
https://www.mail-archive.com/amd-gfx@lists.freedesktop.org/msg69080.html
| +| linux-libc-dev | CVE-2021-42739 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/
https://seclists.org/oss-sec/2021/q2/46
https://security.netapp.com/advisory/ntap-20211118-0001/
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-43056 | MEDIUM | 5.10.46-4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/10/28/1
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/
https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
| +| linux-libc-dev | CVE-2021-43389 | MEDIUM | 5.10.46-4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/11/05/1
https://bugzilla.redhat.com/show_bug.cgi?id=2013180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
https://seclists.org/oss-sec/2021/q4/39
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/19/1
| +| linux-libc-dev | CVE-2021-43975 | MEDIUM | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2021-43976 | MEDIUM | 5.10.46-4 | |
Expand...https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2004-0230 | LOW | 5.10.46-4 | |
Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
http://kb.juniper.net/JSA10638
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440
http://secunia.com/advisories/11458
http://secunia.com/advisories/22341
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
http://www.kb.cert.org/vuls/id/415294
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/4030
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.vupen.com/english/advisories/2006/3983
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
| +| linux-libc-dev | CVE-2005-3660 | LOW | 5.10.46-4 | |
Expand...http://secunia.com/advisories/18205
http://securityreason.com/securityalert/291
http://securitytracker.com/id?1015402
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
http://www.securityfocus.com/bid/16041
http://www.vupen.com/english/advisories/2005/3076
https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
| +| linux-libc-dev | CVE-2007-3719 | LOW | 5.10.46-4 | |
Expand...http://osvdb.org/37127
http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
| +| linux-libc-dev | CVE-2008-2544 | LOW | 5.10.46-4 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
| +| linux-libc-dev | CVE-2008-4609 | LOW | 5.10.46-4 | |
Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.html
http://insecure.org/stf/tcp-dos-attack-explained.html
http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
http://marc.info/?l=bugtraq&m=125856010926699&w=2
http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.outpost24.com/news/news-2008-10-02.html
http://www.us-cert.gov/cas/techalerts/TA09-251A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
| +| linux-libc-dev | CVE-2010-4563 | LOW | 5.10.46-4 | |
Expand...http://seclists.org/dailydave/2011/q2/25
http://seclists.org/fulldisclosure/2011/Apr/254
| +| linux-libc-dev | CVE-2010-5321 | LOW | 5.10.46-4 | |
Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
http://www.openwall.com/lists/oss-security/2015/02/08/4
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
https://bugzilla.kernel.org/show_bug.cgi?id=120571
https://bugzilla.redhat.com/show_bug.cgi?id=620629
| +| linux-libc-dev | CVE-2011-4915 | LOW | 5.10.46-4 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
http://www.openwall.com/lists/oss-security/2011/11/07/9
https://lkml.org/lkml/2011/11/7/340
https://seclists.org/oss-sec/2011/q4/571
https://security-tracker.debian.org/tracker/CVE-2011-4915
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
| +| linux-libc-dev | CVE-2011-4917 | LOW | 5.10.46-4 | |
Expand...
| +| linux-libc-dev | CVE-2012-4542 | LOW | 5.10.46-4 | |
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
| +| linux-libc-dev | CVE-2014-9892 | LOW | 5.10.46-4 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
| +| linux-libc-dev | CVE-2014-9900 | LOW | 5.10.46-4 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| linux-libc-dev | CVE-2015-2877 | LOW | 5.10.46-4 | |
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
| +| linux-libc-dev | CVE-2016-10723 | LOW | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
| +| linux-libc-dev | CVE-2016-8660 | LOW | 5.10.46-4 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2017-0630 | LOW | 5.10.46-4 | |
Expand...http://www.securityfocus.com/bid/98213
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
| +| linux-libc-dev | CVE-2017-13693 | LOW | 5.10.46-4 | |
Expand...http://www.securityfocus.com/bid/100502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2017-13694 | LOW | 5.10.46-4 | |
Expand...http://www.securityfocus.com/bid/100500
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 5.10.46-4 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 5.10.46-4 | |
Expand...http://www.securityfocus.com/bid/104593
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-17977 | LOW | 5.10.46-4 | |
Expand...http://www.securityfocus.com/bid/105539
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2019-11191 | LOW | 5.10.46-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/18/5
http://www.openwall.com/lists/oss-security/2019/05/22/7
http://www.securityfocus.com/bid/107887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
https://ubuntu.com/security/notices/USN-4006-1
https://ubuntu.com/security/notices/USN-4006-2
https://ubuntu.com/security/notices/USN-4007-1
https://ubuntu.com/security/notices/USN-4007-2
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4006-1/
https://usn.ubuntu.com/4006-2/
https://usn.ubuntu.com/4007-1/
https://usn.ubuntu.com/4007-2/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
| +| linux-libc-dev | CVE-2019-12378 | LOW | 5.10.46-4 | |
Expand...http://www.securityfocus.com/bid/108475
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
https://linux.oracle.com/cve/CVE-2019-12378.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/229
| +| linux-libc-dev | CVE-2019-12379 | LOW | 5.10.46-4 | |
Expand...http://www.securityfocus.com/bid/108478
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
| +| linux-libc-dev | CVE-2019-12380 | LOW | 5.10.46-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
| +| linux-libc-dev | CVE-2019-12381 | LOW | 5.10.46-4 | |
Expand...http://www.securityfocus.com/bid/108473
https://bugzilla.redhat.com/show_bug.cgi?id=1715501
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
https://linux.oracle.com/cve/CVE-2019-12381.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/230
| +| linux-libc-dev | CVE-2019-12382 | LOW | 5.10.46-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
| +| linux-libc-dev | CVE-2019-12455 | LOW | 5.10.46-4 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
| +| linux-libc-dev | CVE-2019-12456 | LOW | 5.10.46-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://bugzilla.redhat.com/show_bug.cgi?id=1717182
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/5/29/1164
https://support.f5.com/csp/article/K84310302
https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;utm_medium=RSS
| +| linux-libc-dev | CVE-2019-16229 | LOW | 5.10.46-4 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16230 | LOW | 5.10.46-4 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-16231 | LOW | 5.10.46-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2019-16232 | LOW | 5.10.46-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
https://linux.oracle.com/cve/CVE-2019-16232.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16233 | LOW | 5.10.46-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-16234 | LOW | 5.10.46-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-19070 | LOW | 5.10.46-4 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294
https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-27820 | LOW | 5.10.46-4 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
| +| linux-libc-dev | CVE-2020-35501 | LOW | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-26934 | LOW | 5.10.46-4 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2021-3732 | LOW | 5.10.46-4 | 5.10.46-5 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1995249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732
https://git.kernel.org/linus/427215d85e8d1476da1a86b8d67aceb485eb3631
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d
https://linux.oracle.com/cve/CVE-2021-3732.html
https://linux.oracle.com/errata/ELSA-2021-9577.html
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
| +| linux-libc-dev | CVE-2021-3760 | LOW | 5.10.46-4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://www.openwall.com/lists/oss-security/2021/10/26/2
| +| linux-libc-dev | CVE-2021-38204 | LOW | 5.10.46-4 | 5.10.70-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5fdf5c6e6bee35837e160c00ac89327bdad031b
https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
| +| linux-libc-dev | CVE-2021-38205 | LOW | 5.10.46-4 | 5.10.70-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205
https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5094-1
https://ubuntu.com/security/notices/USN-5094-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
| +| linux-libc-dev | CVE-2021-45095 | UNKNOWN | 5.10.46-4 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2021-3711 | CRITICAL | 1.1.1k-1 | 1.1.1k-1+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| openssl | CVE-2021-3712 | HIGH | 1.1.1k-1 | 1.1.1k-1+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| +| openssl | CVE-2007-6755 | LOW | 1.1.1k-1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1k-1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tesseract-ocr | CVE-2021-36081 | HIGH | 4.1.1-2.1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29698
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/tesseract-ocr/OSV-2021-211.yaml
https://github.com/tesseract-ocr/tesseract/commit/e6f15621c2ab2ecbfabf656942d8ef66f03b2d55
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**python-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| Django | CVE-2021-44420 | HIGH | 3.2.6 | 3.2.10, 3.1.14, 2.2.25 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44420
https://docs.djangoproject.com/en/3.2/releases/security/
https://github.com/advisories/GHSA-v6rh-hp5x-86rv
https://github.com/django/django/commit/d4dcd5b9dd9e462fec8220e33e3e6c822b7e88a6
https://groups.google.com/forum/#!forum/django-announce
https://nvd.nist.gov/vuln/detail/CVE-2021-44420
https://ubuntu.com/security/notices/USN-5178-1
https://www.djangoproject.com/weblog/2021/dec/07/security-releases/
https://www.openwall.com/lists/oss-security/2021/12/07/1
| +| Pillow | CVE-2021-23437 | HIGH | 8.3.1 | 8.3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23437
https://github.com/advisories/GHSA-98vv-pw6r-q6q4
https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/
https://nvd.nist.gov/vuln/detail/CVE-2021-23437
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
| +| Pillow | pyup.io-41277 | UNKNOWN | 8.3.1 | 8.3.2 |
Expand...
| +| lxml | CVE-2021-43818 | HIGH | 4.6.3 | 4.6.5 |
Expand...https://github.com/advisories/GHSA-55x5-fj6c-h6m8
https://github.com/lxml/lxml/blob/lxml-4.6.5/CHANGES.txt
https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a
https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776
https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0
https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8
https://nvd.nist.gov/vuln/detail/CVE-2021-43818
| +| reportlab | CVE-2020-28463 | MEDIUM | 3.6.1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1930417
https://github.com/advisories/GHSA-mpvw-25mg-59vx
https://hg.reportlab.com/hg-public/reportlab/file/f094d273903a/CHANGES.md#l71
https://hg.reportlab.com/hg-public/reportlab/rev/7f2231703dc7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMUJA5GZTPQ5WRYUCCK2GEZM4W43N7HH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZQSFCID67K6BTC655EQY6MNOF35QI44/
https://nvd.nist.gov/vuln/detail/CVE-2020-28463
https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145
https://www.reportlab.com/docs/reportlab-userguide.pdf
| +| sqlparse | CVE-2021-32839 | HIGH | 0.4.1 | 0.4.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32839
https://github.com/advisories/GHSA-p5w8-wqhj-9hhf
https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb
https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf
https://nvd.nist.gov/vuln/detail/CVE-2021-32839
https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/
https://ubuntu.com/security/notices/USN-5085-1
| + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:017e4d5af2d17c98b8c779a943d8152f75a824535aca43381663c365895add33 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
| + + +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:100253084d6dc4a542a19e77c7c181e9013042788c83673e9f40a24b629a5147 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/stable/paperless-ng/1.0.0/templates/_sercrets.tpl b/stable/paperless-ng/1.0.0/templates/_sercrets.tpl new file mode 100644 index 00000000000..6b6e2641e7a --- /dev/null +++ b/stable/paperless-ng/1.0.0/templates/_sercrets.tpl @@ -0,0 +1,20 @@ +{{/* Define the secrets */}} +{{- define "paperlessng.secrets" -}} +--- + +apiVersion: v1 +kind: Secret +type: Opaque +metadata: + name: paperlessng-secrets +{{- $paperlessprevious := lookup "v1" "Secret" .Release.Namespace "paperlessng-secrets" }} +{{- $secret_key := "" }} +data: + {{- if $paperlessprevious}} + PAPERLESS_SECRET_KEY: {{ index $paperlessprevious.data "PAPERLESS_SECRET_KEY" }} + {{- else }} + {{- $secret_key := randAlphaNum 32 }} + PAPERLESS_SECRET_KEY: {{ $secret_key | b64enc | quote }} + {{- end }} + +{{- end -}} diff --git a/stable/paperless-ng/1.0.0/templates/common.yaml b/stable/paperless-ng/1.0.0/templates/common.yaml new file mode 100644 index 00000000000..946885f5bbd --- /dev/null +++ b/stable/paperless-ng/1.0.0/templates/common.yaml @@ -0,0 +1,8 @@ +{{/* Make sure all variables are set properly */}} +{{ include "common.setup" . }} + +{{/* Render secrets for paperlessng */}} +{{- include "paperlessng.secrets" . }} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/stable/paperless-ng/1.0.0/values.yaml b/stable/paperless-ng/1.0.0/values.yaml new file mode 100644 index 00000000000..e69de29bb2d

*GT+_&8Vn#t=jUTx8a}5h3yFY^WRm{nF99)7#1)$)lvqN{ zXBnqlHshCfOZMPn6Az{_FOAKy+ZvH%4lpb&SGB1dyx%pgY}(deY?id?d{R>snMnkxwsKR)ZmZqI>FCPAC!Vv%!|BFB?;8~@x4X~#{zIDc z>$|<)ieLVwQ0tK-+@+VKteouQ;27P5BvGXT=J_ZCjFEO!x+3k>%8swx zz5rXOx{xF^6C0D72LXbjOfVUtg718j#t&E!kg@z?LzxC;`m+4ruoORwKycel!jtJE z1^QFt-T`;GT1x~qaxK#jW~o7(g}71Va}@Z~^ZyfYQ!=qAPj@&xgT5=JLg%?S(-1RMY4i!Z^ido0GAvo4X?v@SRdr*Z z^SkBHNIdBe)FFyhGZaxq&U`Vl9xc(?M8PJ{>3_Sfovzabg@@P9%_FbHd-^#*%^Qc| z2VR}1-GFG&HLl%uoGKsHjC)w)pt0YoJU*DNhE+fEPagzFqd6@{G|DYl1>}yUbG-p4 z2B3j<;=W%ek$XHAV3;5Beh6SQn$E`bdc*s$ZFEQnsJF{SMk*onsjkke5la7q=!xjj@?5lHo>kShd z*KVE=<4%gu?KouCL4zR&cItrrrV%!q!@8DNQpH_=5NJADA=;SFGL}d@fJBK2LB3(W zTdbrQxf`T0nMuTgAN>i31PF+@q6@Pp6?sz-WQ(ya zb)HcMD|(CtzB~tQY?s8@q-Qs|P*HStPIJu_qjM-Ey2V*QjOvHiMw**7_#4WVUhF=} zaiYz`X!EPFmS4HCR*VhyWRp$bCi|7mooI8L5gz%Dg$tf&Qpv3T*ZJ|Tx!)D18Z;YW zK-1;9=4RLr&33)gAJ;K%x(Lk+SxX3p(Lg30Re>{L4b5~Hzp|IN$IIdE$y!Ch-jZF- zCVsYdc@4R9&wCOxl1lVW|vDIEBp;@0H|hxs0vfW=Y%wxx0hF zF~j7fOjTBtvJ8{)t2tzI+GGz&t#dB7r)Uni#8!Us>bq7QzU5}Lh+D!+| zK+5nHZZ-j88G+mey5mQ54d}AT5|zFTkZ2|TI`PXq2|sveB<2%~Uvi=Ji-13&&cYB< z6Yi(7$~-xSWr(nUS$KYcOu5EL9D)L66S*ze%PRN}o3YhXeNESCcL52pzA7IZ_@kA{ zH$1RVBG?DAHK%@0K{XK9-4OrK@=p0NU+}2fHh89jyvQde@C|v+B_0BuT;RC2kcMQ3rnkpa*#H@{uBywSN&&LbvL4-`B^cV zrdtI`I`5=eTA~BE>_+*sPnK))`7EjhIun9cNi#?XNE$i~X}pJ8kn4k+!UGhu`VaRF0@h;j-GS`p!Iv;`97EQF>q7l#2-N{tJr;yf`eBcc}7M`qoBS6xH%U@^^bY!gZD zoQW<)3Q|^HN%NPLoEk5Iajd-DfLbs>Sw~d75nUW1np!>KcX4C{LRn+4#0n`aK^8=u zSZ-M&u|-GqeFDk3aWy(I2T51%yo6^j#jKYCEYZpg0~@xx0s#^KPnrA?|I-k2R03Lb zJXB@a1qPLp2-=8pP~%$3K|Q=TJ$YmyUGy2j@x}CjRuw3`Wr~MK1p5~k5*+Bwff%Y2 z#HKhdyq7JD?Sq&PXJ>0*zoG29?KPg4>-RwcZdpfVxqq~=9F{4++~8_shQ+O`(9r!C zAF#s(B(cj@H;q_>*ZnKdN3-4=#cj_^bPnegWMs(Tl8_ZjMRLJla+Qk{ibe+t^Fv_d z4JA1I)b_mdSt0V|$1 zA|wn{G-DZl?YQHN^_cq)z0Qx{Btp4L@aFl!^pasT5yBx62r#V5N{|sDb>^uFk_-V4 z(bD~xua~C*f0N0>1q7#=(WRDDP)-u^g(^=4ej=dJ2wYK=JG+v;PuTV!z8&C%S45RVJX`!Bg!p~2jp3E$1oRU=2E*+blv!x=X{1o znd7OYl4W7?Pzw_nHK5qTe;Hd_(gvhUU`YC#XyB?MYLKQE5(lBzw|&&{!nMDie4;kR zH={|BcPTM$N}iS#b}xH*f9~&N)5ygj>FQkccz9j!ZeM>q7Nn^v+HWa2IyCvcoIW=_ zpI^*5ot)m^K16b0P32@?bp2vt%;xEe)!hE}1eWr}1Z2-0%eqAPgSEHvQ=FT|{^)}> z!$xK+VnoU(gjJIjf+AWXgKWqn#{cuT{8^76vE)*aD6)m_v9$IJB(B?`p>0o#K7 zWyD!eMn->A8{L3$-(stf^xqC$Qp(y3Ta*%HEA=OVB-O*(YUp;m?8pJN@>@k79!?Rt z*iCUcxftD?t`2tx*V624K0dFg<|!w&|GfY0`^RA782HO6j;AM0H_)RaRF}us=kxh^ z`(vdyL+xttLT>cG4o@}X!O>I>VK=u&UU%H)KeMaH$Nf1Y5yhuJX3#JjLeX)5(7h>s z{4&J-w~`ljhwg~hQl7qgqN<{W>bd#6*+5+7qJU1JqvR5vik|+HL_H+^w~W++iNb(* zfc#JNim?aFP}|Rdr%HdZ@}E^ruQ+yKj*{(Xa0s0R)qnN1PT*L=n64;u^CU<>F-!6q zIYf)&tnNrl$K=04asj_il%^kW@&n{km=hr?=RWYZDO6N3S%@nwgyUkHd;e_)D_Cpv zjocs*ras$>7dQX%Nou%jB7rn8nB!2R zd1RzoJcLwIK45TPB>K0i86oW}ErhFUwEIBp`f^<~D;lnUSp|B4Nb?HLsAf6O{BM{8 zM!D#S?@e-mFGE5~*5ubQJZG5ouKW(9qOe4~%e4}|3|}GeEuO**nf^fkwr77BmhHm* z_W1n0Q(!mbhg(!|AP88k{In%Flzk-rPbFGzliW1HnyJb-%0R$4E$Eu`(N-K|iV}`- z$~h;7(pKSvW`<4o_^4}I0|285#Yq;|mNaeFIo0aoaHu6(szoH_=n__)$`>Y&krbl& zFH(oT?h$Jx^{IA;vW{%OH(zU24%GZTE4@MK#gkLZxuMc=bSBjN1uK18D1{d$wSc03 zHT&9*$5~VR>U-~5fJau~6208oZuPO_HElwzFVr`LKhvfk^<6X!berc&4lDiCwtmze zshSL4f6zWgwpn(xy_y*tIsT*$`R(S7-mkw#k(Vu4dGo3}pVTa}3@`9R*!8mCcqMe|JPbXHgyK-{kBWzcl|DV9^Bk|}q@AY(Iw9e7hk-Ddwd)4o8 z_jv#I34LOlncpbrSf@w?E78;<;bRTf9*B!> z=qvj=Fq+IPezq5K^6zK9E*FG5r1fg>21O}(UcQ&OB-qB5%EsGT#NC{m9TPxSmQbps zCP%k(&FjVY>Z9UFEOwAeF3GKCi_k_7z3RU~!=nNq@U#s`c`NJC4?4FQ@@B8b` zO8o8Thtf?}{RfSPL~n{`L3ja7;!RNd%)KpgxFI-OE|fjEW>`S`^D$cO>Ll5@d)|fU zyu&$)i$uA@)7)W7EdQ<|csS zCzciIX(}6ZSwtgbjqKTJA1uzs+yL`+jE5n%b;oP3QkV;vW_P*v>FLdz8rHwa$nWH; zo$OX8FOP@k=edBl+xz85{zYQRtN(pC4UT zcUK%y4yLm;B^(CXJZp;sk)5idJGS|4<>l+1LW)g>|upYE4c4f2-t_?UdsU&cC2sZ z03Vgm?(%-U+;X8VU@Ozfbc*w_6!$#^!D|A5K#E(rez7}SNN*~y=4g7!>G+K6{sI5h z6X3%e`mF}H{J#Cj2<*=8XNNug@3Zb8Pe4;jfX|Q6?o=VY@jRx(YmfhY(s%2QjoeL`biHr{YH8i4FgA z)>B09ZywY3G?u+N_RFH0-Ejqnb+c#xZPsFn?XeWcyNM(RJwKe!Mo71}+<*^mpeG~2{c@yrbe0L?02|Ge}^H|2K6NMU*a;=a#T!DfkhyXPN6gOE3~Fi_Ee3jQkZV`(`{$UQ5Vmb=Dr8nH3mscw|0*p{sK#^x{6FZ@ zLU(qdPzxKZG?paNT59X|O~_Uk5*x-oIF4^m7dplQpX8LCuV0@>&sa|GUv|3dzl6J1 zyIq?S{*$_xOHA~+xs~ivj4Ap!x{c&@_PjaVT{!sjE-Qkyd-h*fWl>%p*}CL{;v$2V zS|xp`rmjI#NCR?tBd`8?@k+Oo1|IXcJlTeVAb?c);7v|5f9Wfdf`dn<$_p?TsVk^hmqC=NtC0jjPzPaW zl%mxJSM&FiS9akw&wA8ou`N~MnnKKho*uS+1DC2zB%d9Jr;k$1J2orTrt^GF^NQ%> z#ueOhk;qlx#L!)uN@TXr{dob#TdE(jAOE=#AM8?jaz^J71E1F=#AbR5iGnI_szl`q zZl|@0X#;K;)1QpMd$CK|I)f zF6do-Y-j%u5but-x)&qtV^zl;%cIH&MW- zzE55c8g&yyAGl{2BU?_Uh2>x$#P?b63DUR<0UJ$>>9oj-jg9-N@dXV0$Q zt1q9Qzk4O^?LFSUUAmHjdw(LJp6s3OUp_s3B3>Qusjv5*U%oy+MzVY$9bH^q9N)te zfmIZ&VJB;#ot>PtU$47X@%c&nFV`$zCe#y+L{w14le-Ox^=``R^bJypMQ;YzCKX|r z`{y>G2+!fFBePj-Khy;X1b_t8@=?GHa5J}F`374f(`N$SR40-YO{~?4k{_G6VMhK) zn4TLUpbo_$4TT67zUGtjQSFgw4&K%3NM@v+)iH%w!|ITv*4J$XpmkLjs25%)E?Pfb zajdOT0bzP_L064x5l1aq6WgW14IYxfBjM1phm+W~hvfHye6MY?(ihk)A$9pUw}vh*c-ALQ7*IkR}fNA^s?&gx1vbk82m|CB#w*&iKz@G5u|fApLB`xt`{QC9hOkW}WkXcLt$l5;LkmN&f>qB1y>I(8m|)uxGAt&&p^m^-=m|A~7zcL(0FtOz z%aQJw)-VEo#csm7S{ngHxMdr6;=?+(o+QrdAWz+TXjd7+A^L}Dg(F^CXWOz`Wd*6A z>ylLTrB(mFv7jq9y6#Rw23~&_Cca}E3{|ps_^Ay&n)p1+Y{8J6Q$L~;g9ZWsGEnE0 zw{@^IAuXW3$8ae_Bn0$EkQIn^f@Gv?w33Xa5F7A9LA0*Uw1{Kb?swzJ3B_u*4S7-2 z=GnG5REFv_5K&#j{KWx@Y+`z&;jI^#en7*t_6`CN2|yE&E*KPt5zj2d(BZLb@@X`R zFg4!RK~iT)8jd#_PQ0{~Zb|+plagr4NX?lt9%0)JBR+CMc3VkFL`|M}lSH>9II=xA zoKd@R%*%!l4kJp&E=}tI8^RsH2fBuHy@Hs z4Iq*pmz^q28rOAXdbh6QVKW@!FrtASUZ?UsHfDQs@BAVy_FHC3U7_npq1T>|gXk{1 z#DGxvHFj+5dVFC2{<}By$NseA25oD*S-36%k}yrAxTHY~go*$~Wf?-&pbp{4^F|IO zMVyt;ZVIs66^VU6Q~Rd+zSLM=QS{Gip1x!({`$JVpR2%CN9F_v zWN5pVC;a3*GU8Db;NMt) zFo4JdH2hdN?k!+CcPjyf7h85agQ@K{tAjW*Bd!hM*@dL*Gse86O-r;g0B{xBq)l72 zPy{Q{La}}?)qo&vHMOYb*}xJIxxpmJttUZ&^2$j_+SH-VJ-<`mb=hY>ecP3Jbf;al zgsbcR#!Yh)RJiLvcCAqsu}uM%h0tN2OsJVLh!8t8j6BZ?h4bgnUh(SLi>I$%7XSU> zO!{#6YUrC*DW0w~mSvJup)dm zvu@ZeQu@#_VI{%@69GaQ3iDC3tJ<&AodVi*r+|*##jgFa)$nEjYjxOsfHQz@9p2im z>D`8{23dkxx7+4JEx|PFHWTfMK)bk3JyR@5Glu;(v6J{wyo^O+xV|f~J z1Z5uTD$-TB$o1AkwIL#7hhavdqUxfu7LgUGHb7(|h4M!n5b}~FN@DlPtjD&D)PkcT z-!O9y3&=xJlNQNp1-TvxER8_L3buk=MnXP`mPg_=tj4fSLDEI7EQgk~>w;cYo1s_L zM(FeS>jcm?1qhH1bx_$ub<_5p`~(4#bzN=HN#3+uCkg~&!%mW>9XnBh)U*>7R3~D~ zAPX_YapAt(Kw=d8UJnyc>bwkTHc!kGGYoAyp>E1V{J=9~5+y$izG(?z zhJL%#Gp&e0S?1x0~W5cmYqT`t!Ij}?D!FNBI z9yu}}(Mj;Z#XJF`ChA(THu8oM*AIXO6FPSnoV^te1t>yU(n^JDnl$g;nJg7w4>f9D z+nG%=Zd&B31t;^-{`t#29%?+0H69eYZ3)=vd0=`LTD%S{0CasEnCf~htHc+9YCHCB zurnm~)ZLxOriXUq1$RP7aX`j`NiEy8BinNsz~96@FBs+gBmKgp*5AZED5-K`J+^_p z^TVv7g3!GEvY_`c#JpXB@jzGM!h9 z2iRpwQ{k4Rpkb75On?LdkEGHqOMB3@EFB>80HO|tP64pJAp#-N^ah3qYqt!26vSa< ze`HgY(Z^zn0g%gP$g+mD$A^AQohQSOmKP8@w2cXIyx3&)&8de1RORA3@b<7Pp1AbY z!nVkxfuyV3rHe#H~lj)WI9FlgX~ z{FThZAyoLQx$_eRlnN8}P(nCzBRZnN-w-&tp@HRix0SCzH-^3Av9*%Jp<+W(BwZ$| zW*8DgzyPW&nWip_kYHq4KoWtaD4L9kZU9wPQJzY9V!Iu)7jM4jC41X8UBuU>fk8-L z$nA!PU?}tO^CW?pz3*EyyGjMFjfLzMQLh`ayNGK;)^)bJUD-qizKl;eI6cYfF3bK8 z>91)vrDbK^O~#LFias`5@f zIe&Wk{z^Q2eE94@IXb_(d?_9r@14Eee%7*;6x{ceym))?;@z7kSIR5&?Ag`%p`t!{ za_~}pDn2>;`N)?;=9AkxAI$2d3tg6^u>wv`o(+s9@71-qTs%#=i#MkyFP}eo@$R`ONpGcR_mBZ`B?YxpvMQUAQZQy$x9#kLlAxls z%6!DyH_pDpS})1Ilm5O$fxVVl78XzJy;;3CtM_L0-mKo6wcMMvlwtOstlpFLm3p$6 zd$!jCdM%*W0(vc=*8)~)0kzz+R{?qz;44-EGRaYSrPV6}y&}*n0=**8D+0}VX0HzP z>cCg34mc+Ec{G%2g0^H{M5?k-epnhxYMS9Z-{0#LCS9KTN9GZnf8f^`Vgv6DSvYq7 z3L$+bDDy~#x+2M)pB=75+Uez*C?N!!yG z`U|_SB~bUHr}9vO^1M*l^x4a+TP4IWR%Az^V7n&$$d=5qUDGxnY3kfN!e$_A4PI5H z#k%L49sD{~(PVLR71lCb8w{?Spj^O zcgZiBFT1$rPOreVshwU#Ew33yT7j!}t6@TD7*?tvkC_C}cSS{&W*e&^z%qdxmJi87 zIc}ts-^Dg)zn=V8B>+^=QvRnvU*#Dl-elsry_(#s$-SC<-)i!bv-cO!lb4UaSCo52 z`A?%L*KhS+Q|>k8UQ_OYTb`8i^lR_%DgQ2VUry%qodyO3TAW~5v~Eaw5M6KHpurcV~NiLm^NH61HR&fsIVWRyyxE5voB{gaEK~3F(?abPT8{E23(Nnr2c%79~X` zSTYbr*o2m)D5j<>o0*8MbY43VbN=r_@yRr?Y@RwB&HGbZ0yZU}0u6Juqxr;y?ckOe zi4!k&qe?3gL0(i9u;|Ye#UbRuu(N?Ur}tjtfI7e9Yaxzohi8uJJlO~&I+R2c5NPSD zPDB%15Ku@&)sPKHb*K=8FeH`w^ak)Y(e10c$;=KY>T+Y!3NWkR*t;~sewz4nTB62{ zu+Nqa=zwJnM?%Gm`-YH9c8p8nAf%yEw`X)&ROj}LGKBv?0BR6Gkw=+>0j=R+AUEMH zHIl&?p~;wt5t_+2WMm8e^(YKTS}{e)s1{!$aXF71HpdeCI1?dp8|UG z2o53hvSc0?KDzViqlkWtgpYjMGe5z>bv!F_{)N!9g5i(cxR@hCU>w(oM|t;|KT*pQ zI4#~>b;q&+(%{Tvg2c|GEn-={*KhmH-f#9l|7IU09UvY`b$31xXbbuE;80YCV7k%o z(`}s0ypj*EvcC9QxSB}+Y|f_tpD7rks9;^Qr~yn_F?391i9)1`iUBoMlL=BSRR(&s zBXCWeYmjYeCRRnm1QN0|2rN-Dp>F9EQ-BOfF*OxnOVp({WH-gxh3tw#TEf$3=X?Bb z@@>F>v~G3&H}zxCh}?#_y2OFxN2hrpNC~2ABnSe$tSWN5NRT4X3N}_K+n4^6ccQR# zrl2roKX5T3r7Mp6&dMd7oV?q6`TXkmc>nnA!Ns#T;+1^)_SNO_`^S%8NGHnnvvRGZ z;J&A1Z*L#%?TO0C#o4nL=T|S~lPmS&;{USu_U&!k$fEfEtxtigWPgpjp+r&=CHbE0 zIj)noX%ojAJIS`^oX3GkNaC6zS%Q?K&Gz@%?}Jx@uOcPcO}pZ=-B=_r7yyI8%wT5l z{+q%1&o94w@$Ca7D%*-dt;$_~)XHkwTZ{jm4Gi=Gvu*8fskcw_v={B| z8*05T*Sr$i5h_hvKsfx+7>)Sb*Ds#GeD|6eSWYLs!BjK$Q5i6@xd0R``t!u|92eVO zfRl*HI{oL!?hi7TV>c;Zb&$TLy3zj@&HBc$X>+1{wI|CgNaCK76gEO0f*Ky| zq?5)!YQ{h_G*kRkSkytl)t}xgQR-u3JT>*)0e#{7VbUfGD%&vvRaD~w-nxme+g-xJmL4)VL+D7jD{AN4lvG2vr|(NCSC+f-_w zwqiORjYkdAR?u>X;dWwxca68_)sGyYE=s+Yye)H(PgipY@+R5=ig6r7D|wJX=x6SF z2=|SVKADdDm*;O^Xp`R1(7s9La};SJ>p<2pbO2bpi9yDMNl}A_VvsDq&3Aq48a50f zz!*lsd%bbZ1EEk1$Y@&eKnRR?MWFW5*A{RlyCSf|^}L2|SdFg#Wd-X6SoFzVmAYh` z`MXEAl--fFjLqTb9ym+QzBJaY@>_vR%I)HF&jPO|r{-{CHS)PvD^yPwy^&T?C*UIB zJNck*>U}=UT6`C1IEMDEHiH;B+KlnJfb%)+E^=d}xxPjx#k{eDaC3u`8IB{@U(mNV z3lwX%qDMV^+uKjdiy7vPv7u|`sN`(Cvh40OTL?rw((I9Dzg(J~YNkFJOzweb|KJv> z-_pnm^q_; z_1$Hz>FK~So5kj;6%Mw;5Q^S?gCVt>IC$^@Q^rp5i!F8IsI9T%mPW8`wWG-jJ16a! zYGk%rChbrv)d`iUV8e|Ij6{Di`o?&g5h-g+?j*NP^`T}=n#rxKY-KZBZ}QT0qt(q{ zwETX}nJt^ExmrJWkr+j;=Atq7y%jif3plghXQF|zit;^U)HiY`=`Cv3?zv&$RfZ~9 z`lN8O(wk^|MJcq4ogNsv8q&W*cuO<7A~1jOdq36WW#(gbOz2qwAK+fgZ5ZsscM68-hvqwmDjDujd4IlRI)l;Nw#R6Sreh15 zgP}Du9AxTfG@MT?Yk(%uvS)AyzS9)+eexaCI6U9sF!$g)ZG3Cg8b`kK$KX4~ESC?< zcT8iPKl*D|d4IlR52tW~pgtYx26QY7ji*xthsJDTjD|C7Jl5yPHtop{e5Wbsd*nN# zfpu`cBVg{qcUok$%+xsYoj(TO$wxdsIN!0xyX#q`^8S2hFx2NdnvLfJYfJBeOg^)nP#2C*PTj4$pTu%su$dxHaFYF##X>&Tq?i3PTb^sCSDZ zA9*~`h7r*D*^3JkJHPz!i|7SX%O{AxZhpFfX3J-gj3C&M@R{Fj^e ztG{gE-~MX_U9Y#G|4%09TJ86JHdDt`S1^k0z{AH}8^>H5jdN{ayfmwGcn%C>R1C+S z^mNVKk78zCu;^j5T5%31Fmc(9UefC&=SS11%E3;gX!mzNlA_fcC2wRsk^hS9mAZ-S zxiRkbdPCD0jA6NLqjBwBP@$n1X% z!*U?}wvye5N%%+YtwPs4Lr&$o(-XavDXg9x# zdqiPZACsZ2o8$3lV(HFoXpCmV>1Z?_PoOa{Y;!yvndV?_8TM>qTW~niC)0s7GSKjV zgL023>>E;UO#Aw{Eak&~FdkY^vtGTs`2O;PHGKKq`PtRa!yo=;{xJIS`QI;oz8DRj zfB10!g4$LL9(qV#k6(T}cy;mpo3rug&G5s|A6|a{!>gBXU!RR${qXL^^TGWO$yN;Z zk`;`pKGCgRWCgY6R>!LOh-pGN?87K_Z4dQ-GzJ6H98QKs|Ejvudo}f+NxZtjK@!>M z*<4)MO7r@V|H#J`a@=I~?CsT6JG9zB-dVC552tx2*u4d-9o?A>!KtkMU88caY8|qh z2y@PteG8Mx%)}(@lLev&YtWjE44fVom1Lat(V=m^*71LtV6m z`-W}J;nbXs$7nEg^vQHM9n6vC42aBZPl&`gn#?NFLmdqIj!u1)C|h~;r8V}*z%-Z| z?K3dRN(T^^CDS*G`KNY;@zAoNX?{Qa+vxAFzq=az?c(Ze{O0`C;NAG$-+mrm{QdRY z(VP314Yy+O&_iXoZ~peT4c}(56M;x zYNapF=#@%e`dG8Zqr69r(KC96qv<@!;CK%i3`Uq#S+&#-OiH`#26lEy1q8 z(0mLv*PnX{@@=HqfkPv_f+W(yC~y)x)*=kG7;%Wb3PrdtMYQ{Gs>->YieGlL z3FBZ9!Em`j{=)SUid=s|Q4tsrpm#9xu|_j?1|f>D1{cuvajdy9)`B}fD|a3q^xmC_ zmq=Sdf1}Mkc!#xMt~m+xknKdX#g52t1zCl3l&nHR#XURfZNgq0^o@~*m&q!)>xIr- zVzQ-NWn5bvA-L+@;eRlSiiw`+!5HCKTO#Oqu8(m4>Pj;;YcQBj*`I@fX^loHVeSQ` z3N>m%io*c2a0J)a?%*vVL&qVran~Y34KQ{CA8TlhqD{Oc3&6!1PH>3qSfY6_i0xzN zt${Ua5=l$T)w)e%d+8&WUt~%{L?quO^H28Hc!_Rs96^6U{tZfUk?ja%Ck|}rnm#p) z>hHlgaOAi+?nObs_7l=#Umx`KNgu{Bv~S7W5$1tDg@KR!*rije-MR5no5RG5HP5fg`3=5zLF7481V;w6gE!o@LN6TRd%o$+BG6DELes5u0CH|xanQ3PkMNA})Ki@SrVT=VD?I~nPH zng@}MdhTpxdqKj6P=(8KcQ?eBfE!GwgD706S$4 z)_p{pjt&@UI;xK}-6a+I=s;H?m%yqv1u5%FT#H(~fz=pJjPkWuUuRdd4WaOMW*b>! z53`Liv06rBs+H>2^9ILg<>(a)dN7gKvdZ;r4h?Pm|1-I3axZyf41Ho4R-;T&q+neZ zjIEdHX1bd3;%ry-U?&AxJa(zwD6*N&yZBebF`RjbSwTlb@MH$<+c1b?Fb^WICR5Hz zoRmjB?+R_lRY-c-Y7xo``>et7bcZ!4Djj`Njy@>|@ku$j;dJ!F-~V>@0lYt9X%an&D{g@O>5dJ4*)ISIFg>0 zu8E{)-}jOLhQEmfpidi00D8@R2W_|U;qDT^;c}Z~@z|yI?%QgM*m1SOaa%oZtH0N6 z^|*)J?;bMHhJ&e@4<$L!7DA)#6rTaXA7{xTLezPWaL8G*cs4di1LX{*ZN*w6^7e!> zgTA5nb)!GcT9{i@+-r}UjHbG!x7*xUo!un|Qy&yV!VfgPZ)~7RQPwn|^IE79VBS2f2JLmfx zvuFju7H_tCVn9pB*JNW7B z`T6~;cv~^pFYry*O+())@J*@tZ@E1aVR|q!r}xCDo9%L@(bp$^eb_f!ZjWij{q|=D z#~8Q15+bd*KLRukXcq)n#lvhuf*y9b5c2{)C8vBIR53J&Spp7d%G&dib z*ROwgfAQ1XpRCb0!@r&X@bdhdpWeK9`TpnkgCF1h^zs2N0NsYcF3CAfLmz9yX305u z*?ps>EptRz|EPVmw5(Z)LJYkCyMBy3&s`wjMg^~l%?;BuaR2)3)tf7E&+bsk;<*Qq zop-YlQQ2DTW~}^v&9z8e%F6Gv+l|NfqLyqCheeS8XgVp+3{Y2LXLdRsx5 z3dfdV5Nr>L1B@59!w}(yyH!MmUyF)nuYKC(E zM$ulkJCqtqPaL$a3gkb!(;eOEj_!2FbN}PH{}*uXe{`oix5hBqA9PPWZXox#fgBy_{-BO@buz=zi|*(}cl4q=deI%d=)TyE`RGD-bfG)C&>daq zjxKaZ7rH-&3tjzIcl4h-`p+Hx=MLvTmn5!pyoT#|4Ohc!xPpc2mr;v8)<#yrR%DzG zdn3)*>z)XLy6-|2Wf$STIX1aY(wf-LH zOh#i0YBywxwc9&nnwCDCG&s$p|_&KQ7&&_zT8dyUfe z(;l{|b%-O`eEY4d9>_YI$77e;M_1eJCvaLELHia(>d_2;)vuU})>YfD!ihFEth}M@ zAghobLwPXq?PUlZvdMBasQ(vsJ5wJop%dKo|1wJ!ePe7+Lr+quxi z7X29F+rBlN46Ga_RTZn_TW z1MSgdIvkG21KTj2afQ0QKis{D)|gJ)QLQm;v`W^2>u`mD{>imb%z=zY6&E`-sJD|z zPuC|+R}C*)wQ5#D;>Sll^QdPw(ldGdgEoU09piS6aXWwLxE+3}LWNo7cmve&2B_l= zQ03r{H$WY4fZG2Cs2cuzy#J|=SdRBU9q)ho9o+vELX7X6xzj2RgQ@S%$}RtK+%V0nV*zDC~G}bv(E_9$Zx{8x(of=McJPSjI?b5U*c6fBEh; z{d?3iCp|;6xQ$>RU1H`13)~}kP_z?_BHZ_p>&;mFh+*`h<3tEk)2SUoU(4x7T7*0p zBS(t^&0Zq=7AGrQv<2Q*Bh~BI3l_a4-6dTV_xzww0b_UJ!#IhMwnmXV=URWhJ>}SG zKRAaAydk8pN8k;q-ej>s-?^nd3|C5sradyCGuP)1G)E3Xlc7BuoA%6{8MFD=nG8&0 zI4M8E+yh=Ex+@ez0+RMU44l5>;y7|=3AHMnU!Gm`u^qW#jA_d$UM(x`v}_GS8yZGl z??2#@Z5S3#m(>nob7{pr1KI_g;jReOrnnUJbxG#pItV;_30+_N4*HA!x2}h@YqSdG ziS)3PHXGKhL?eoOlA12539>h>odm>w;}0J5?B zW!N_d*+{9{l2t?=!>H7(HPXz{&?s1~2l`)}IbQ5_9rg-FcF*!r9MWc zVNB2v!YP_e;8-6T#&|rOj%_9R$RdF@Tm>H5O?kaP3|f+cG1aD1b8s)DuyErZhHL2i za4C<(?S&inV;J?wzkD+xOU0h)M191Wd`ZBOSj)0mG2&_?6YbUd0*4P!EbhN(+x zxfkeF>~fdv#zTI(Ki>cL^gOJ}^UnNu5Cy0IpQF*hN>h^56{^>yYE}6dMqH1d7`iz$ z+L!_Ibq|(ogV6Twxi(1cW8SG_-l;wFPHoKLs)F(Abs}x^EyKv zo3Fp_bQsBW{sk@q@IGr20`nm86;pZVU#Hr(=U)=ygSGRgwpMtg7fng|rGFQ!xgP0AIzWX-usjnUI+*t&p4b7~79VLj; z4DKw06*>haj5v-G#HkF1A@0W!Lj4uQF^aO(*Kuvqko2Qi!x%=m$3P_*Mcm_`LQVQ( zYpCnv(WrBaHg`ef;M0x<(#ATPz*M6zIvU{3+$J+5yZY5%pBX*F>gk&PRfirdLDxqS z1%_78^-h87&x8L;0h7(Y0{{`pPSpVbAc?#b{agiBoMRAgLUbz7>#PMXlisvv8V|)V z%hvxIdPKQ67z3zX|AuZ3Of$d!2fB4!{}1sz0-6Tigvft?c>!>UY z2-SH6{>wqs*_IT(LI})|7uyBj`^U=h%t?9@@ z$eE2%6C7F%br=OJB3ic{X;H6wpe5vn<1ET=hm{#+vp4J+Vt6NmnT?QRTF@FyW~N~{ z)@Wv-iS7*HVBqM6V^7T4#6Z?ScSd70nG9ybsSa)39*xm_*r4rJqwAv>FM}X%JG!D? z_2^2-4M$g$-wvyqS&a0NGZ+qZGiqanG9Y8-sS;Z>?Mf|w!U zLC-LIx?~ZiF)-n5GK6DmHl9u$8&0Pqd#XD_G#ibr(cBoA)_AB-=HuyTG&E+&w#NE= zZko1@29sv(w<2Tcg|3g<4mGP)Jco8A|OMA{M zYu51I6nazcD{C}?m)+-vJtHMw-58^xGlFx|F~;_EGMm`r@f1#n17~84%=vf(C+2W8 z7(p8j2ZM=WSp$1ujV99(bezGUQS(iQy0h?t8T8UILNS0o2-YZyTnAANjq!LicRzt( zPJhi4&m-Ch*J0l9(iteE9P(o~LbMEU(A@Q1I&nY(P;0vQ>iq20i&HR%9!8xGQPrZr z^H3z=A|K8?#22ji+Uo%R!8xVMTONzFC?Hx>kA8m-J=XyN)l4yf5kWBYg3Su~@l)VH zvr2cYi}Xflu*B>+}_nec4tAsI^|X zI6ejc{l5%8*A;QFLVVyK0RX73#op3CRb2MR;1qoRwW4<(oFT6bSXN=*KJD17+L4Q7 zHA4|0WCvk4LJkN62eakxxi-Y7z^EahBwR$$K>)`QjL~94i+&qK;JHKwKP7!|9o7>@ zTW^saAs8d@gmbJD0DT9%4Lr~F7wXjsF~ZC`LsPDR>6#IUNcD z2Dl49h{)1$G5IF&Crc|*L7Y;ftL%O{#<`YO@DoUUxQ4DrmL9F8{B8pVC((idpnv76 zDpQ-Q8^S0S3Vy`3ANDWLKUWl%!A_y2Qa7|_M znbzzyWM5(6bi%+nD`8P3i@9_ucOEH?HEDsa+)@Oytbo^imE|(c(JE&!8K?>>XO06P z_&$i-f0E(!z-8covm_3%4Lua)1e5=8TugVTzjh!m!6bR;iPWFtQ&G))Rl(sHlSDu_0xJya4{7-o&v}K zxfm>vj|hWx08R6e5t=}ZRw2dH=U#$i6uk{R#^sgY-?+Zx`ishek7m%8 z!~KF%7$#B-r$S6|X#l@Kp6af6R$ROa2r^&kFLn7;?&X!W3(TM~7NR3rc>HZ!q|#9- z!m2~@Z9<2?tdkM>l&L`Y3QlJKKz57;As2CAr0Dv#mpFVn;Vf9o)skPKK*Cg5*g4mv zsD0rsh;G?lB=-xd^nfLbP_NDglh)iya+%T<)WtH~xc}r;!oayg9{te1UPxopM?oodPvrm;1`$LcLMt*}yvszOCw17?d`*6_eX+C>B5D?9gYy=hg& z^_4ob#yiYpGt#>-2osO-0Zin^7~Hw>l6IO)ftw)VO7VtF&o>CbJ4mHFNF`Q`RC$rG zEacOqDaZk{jSvQ&GA2fuEzOBAClVr&hloJ;h;meaGYgyzLx4pki}6>^dBEKDP_M&~ zmBRMr+11sDH*cSxg4IT&F?m7c@b12bt`CsEcB8JV6L9_WDR_5%P6ptFwf6iJeD(P==)FZAf*AEK2)q6D*RMK{z_~0!WdJ}3 zaQ$r*tmJP1dc9r;`D@yPM?^*BII-^Y5hcuj9tA7O#_>~tKEYK;#_SRJKt~Eh3WEAq_e!*C%*fhn^hF>ld#tU!7gQxOso}>fMV|&@JgE zt4a2fD%>gFPskeQNSsiNo(FgS9gG}scKMQ2CQDqLLEa`a6!|DdxaS6aC$KS%SHyjm zIYo0|3^f>rB4tTmnN>~9DowzGkroDy=KAv>TCuXEm+uK`bRtAwFWx+VadUC@`o$?% z3Fj{IoVRE$e)Bh%FkYV0bqXSKyaD*2+VV5o7?P~+>Z zP?Wuv#WZkE85Ia4H;CML18fgsCTu(Ie2yYQ(lKGjl(=WiNQ3PqauOmSihAdy+68R_ zJOb=W4UP0gvm-ZlZRiP!)ANEmEY>`cC?IE+DO8GUNB)#x;oU8nT+M<00!2ZBwG@#m z=;#xfP&Wq408;^!kbO)xK=DFoEgzQ1=RywobiuehSixIF)H%d>6;T0wEEsM8KJsnt zTQ|ZnSu)?Vx*t0V5VV9B{OJaZgOGyg^;@Ku+6&9H)@JD7hMU`!MvPD zQ$pub1}5zJzyCWz^Z)(dCpApN4tyJhG46|c8W#v$e?dO_gqbLO1Z%ut{}J1FTz{d( zOC(;OblCQA#eTkW{ac(Rm~-e89U{SqY6XM_g?rt3;K%4w+_Pbrx~K(7jEU~d^?>i* zy(BYp9VO`E>T@)mtcr(xb#7P)>h|CxC=m#H6#f9jsG?X;@2)-!Ps85 z!+J&b@YJ4wi`a*eyLLUaP*vOrLFbL{ZAiP{x*lRoPa19^VMUjs-V35EL*_gr0gw^6 z2q@yRnw^`G%$z8*Qr1Dwog;f=d#I{svVdxh;Kq08Z-DE&@wq6Csn84{298UeonW*9 zZj4sA2VOvXnJq1J-6dQj;1YIm=Yv~Br8=UR=3tOdOj>YIjG~q6vn~XYgQ6bz9(jsb z0_=1F^g3B2D|({XSM0_eDyvl2uR1JKSf#jLM!^gfPJuM72?JtMi>S+F5s9zz-gDQ; zM;L2_QeFBNj$srhp%#+nasQ<5%zwrRkYe?Ug92d*-lR-96aWMciYfF(di3FCz;>7{ zn?3)?7_gaE@sWJ`NOnE4Bj34rNx34Q{Y{WWbdm({O9`9tymSF_*cioF9RJS{)uO;1 z5eA65!2|*+qojyt``o=gzwFZY>{R9Y{4#Ce1<2A+cjM1D*rHlkA4Rg?oL=BHdBppc;V9C>hah3vq0@F_5K{xw9AOLv{z z``BHfAc^IN5r032u9rmUdKn>15GG$zTe}0@ooHPyvvOjWpYMg*CG;b?w;}iJupOA* z%YlDs1b@Z$gx2KF_mXmA$12bRlRAfeB=k0ft`6FP$-E5oA&5Lr%qD;Th)9$!1}g-8 z42WtEF@RtNKe?-9MX(xuJRrsm#?Vmg=6WR4wG16 z=8QHgiqpA;F}Pd0HZyq6U9vO+!ojhi_9@9QUiuDEZ4p=ocg;JJ zo`ngkuv6u~@{y=hAF0vfp&e3EjD$)5D?*ZA2{2o+KBXtnu3y;8iibbEM#+|z)_o0c z#Tf|QecTm6Qyj-Wp?ieuvrPj(CEF1-y~lR1*E>;|Gd;>6JH(1Pyg(lq0?bpzFi8(f z0^i%DpJ^=^-6DtRyBq}un*S(ZopHHfmeOQCcRw-kVsB$p=i=?)hc|uD!sdS2QH&vO*&oSgu*s}72FWQj?gcO8!=W`da_^QaJC~_ zJGq@zcZq|l>5Z2;nJ#RT3M_8=1Yr=xKsi?7tYMo-K`&!ZIZsJj%>37&5rqd)s5>(t z!qXK7)Tj$WEJ|6?R(2E$s;=NiTX+&3i!BUEfwLn|Vk2J3kSdr`M%twyeCqL-)(N8c zG*_0aa?+1Dumi8Be7j0Q3PU+f{z#SyCSV1eS4Pr81LB0@^<-oBz=DOXL8C6wMXgik5-T$iL-Gv$cX-HCQJrz^2D zyA1oJy=KR}O9Yg23Hqg%o!yTq=#ON^xW77bxH6zjgWM5ZU%Hkui>aa^xIT^%bU-jy z+99PshO`Mf8$B|^{LG$=ki(arIPu49>eS7LDkUlIDb{&<$i$!UU4Wle3n4_^HRvpf z-6FFCVRfYTJtdL{LIg5BCM6wASDL`|v>--te+$Cwwo6gewq4D^*k^@tao{;=>A(NC zqqJHn-0?C^q`S1}e&QX6Q!U;J@08}^ofv`)JC%MtwY-#9-B-TjV5)ejXyxAJJ2|*@ z0-ii>4TM`Z^rcr0Shm#@&_=>_5+-p#Hg_8`Ws4qvQ=c*nps$EosXvkmlQ01ohKT5M1U~uAn@-!3?n7x! z_K~-DNvFZ}HtD!#PGBXj>AHA=QAnLFPcrBb9D^hV)b)g)$*)A~$ak~^^IdVCA6w2* zG{91E&LDPeWvG=k`G*+wl}c9P#PrJ)?ZsA--8#ggqh2_tz+brjr;4Jnhc#$Zr(3ds zy1#Q};lOH!P$Kz&Qum}LjP4P5%Yb9miG`-cn9>3&K$cW&5qh{o#6EU_&pJS@KAQFkYre5df() zNd1jE^(`*#Q zENgqpWB`pNIY&{PIs3_y|06+ZWkj48H$y@zI3^=pBM86a?ovFqf$TsjTOoZw%)5we za}0X|hhBP3HraPq-v9?u(S1LuTEVs`S+f=@1?y%#y)Wc)t(Rgby;2*<{Yu$g1%C$O zD-h5)fNIH~m0Ll2JZVeE!!6RkM6gW$m$g~MMJ`MyTQw7{3ATm!Wb2km3KW1W1{@ee zAQC|3__6dgC-q3djJPomf>SVqQ5~i2O=S(|kb6;8I3T6?$RjrHI9tFqb7oBs+HkM- z=(;gMs4bCBSJA~mg-jZhmnD|V_vf7C|A2O4*=bKMtXzMqM7-i8DTf7xbH!6aiJ^xs z-=9C_e|~@Y6ohO0DL|_*-aL1sr+lw_ny$8|be|%!4ENEvko z05#-bM58M|Y9F5hXXC?_YZHl#1!R-Kbg>vQr=%K{KD3{|z54hxlN!%v3}xH(=Bqq69tVEN}3F`pLpI=;0GBQ+2q|Uul?jQ?YjZi`ZAprX1VoIU52i?`vbkeyyiu_I%UPe1n zPI^S4a{_}lz6p{@qaYO=-f>f&9r*tcDIclv;$sHD$DR@n3;|AN8guUPu^>yS6FBLD z6}EBeR~)g7O*F<)E*&zJ8ct?Zec))Z#T5l1TyTf-3|l;-F$S*#HRXw5ka3Q5U#BL< zfQ$50PG;e8tH42W38hB(8F$6v)5qr3LDB!=KwBBd8H|34p~f)8B3MErSYT!vhq7y@ z;4OmAhscf58zQ=<-M?NU02y-(<`PHI3$pPboE{}qjtzGIiB7?EI{nU-z?o4Yph^s* zNWx@U+{62Gkc5E`J}!wcmiT0Hq33<%jEfY^M<1U{y+mw2f-=ZtEMY|CmG}-JA3#ra zWA7-V+-8vF$kO&4H#({J?;|KUr&*ClDsXJ`6PV|@exFq?G03ct<0jO4*=6zi-E=pD zAYO%Y44%9_d#%l&eM{y^Mpm4N6~lo_?=v>V0x+3rQWwiJAHFBi?{rnMhO?}O9!g!g z|3vKLH?;NlY{Wi-Iii=6fd!9}=i~8|awr@6V((0k>fC>_^|zwn0PhW-f|SO1nhx*? z7>v?>7o@R<0JlI$zmXR#@Q$>xhEbnXKT^j7QwL*uXcY!DXE7g}+L}Hten73Xy`06i3O1`gk;BRn2Fb(ZXz^uoICu0HkNX)+(G4rUQl!hxU&9tDl5~;&#$WE~={*Fz3 zN`LRq;P;%GshCNQ&BS{SGDJ4D^6X)Y5WI!i9M~_?fy_CIv<{!jS3p?0n1Nzw>dGf( zg~QLn>Bm>SPTmNd*WUC}dZnzTyQ9LZbyQZ)j1Ggja( z{mv}6RCRjv2)u~^JvIQIi(@5?Dp9_Yu+WO~TAJbGCAwmNw`kw|&Sk$cXB_qt!BFGx zH0tEXNBx4(1+&1D0k;Dm#}RaCTGCdV7)yxd`U?%M*)e<{V(cz_nkIzkz5Pc%y%>Q7 zU!8Qwud7TbmO^(Jz&Z8i-zYe-gpaM$B{e}!w5CDd(V!o@ns{^45r35+83$qD1&hs9 zNS5UJo|uZ*N*Yqh;wnW08m291>0l5+p{jW-leewlr>k3ZcMAT)^<%U^(O)Tfh>Aaw zwfY}8j$D7izT7R5|IWuScJZ9%s>*$*N8;(U{RiXJf6b-BiRmE3fyX0G@B!wG!ld() z!lh#%8_8vZB=Y&0=R%C6;|rJCkRL}bd)r5`-Dm!6WVFJNu>F^p!V!`c5-HmblBx?j zj>Zwt;(*d1ifxVJpb?Ho|I{GEynoVB`XT4l4NpPWn3_Gqn)HmGq3etbNK6?g(?D0a zwAsO`E8gAR-Ssl>I~k*x2<;WeRv7eIx^G;O;HlS<(ZHu2@CbZBAi)XrybXwu9jsQ! zcc|}yl2#$jgu!bv$Lj!i2(EdU1C6gIByYPxf(c}M8Mun45ZOa|EGi#*H~_9s_5vE= zu_O#1GhZSMqQoaEw33XC=XLblIQ9?$EfIMNaAGe>Hp)(nAbMK9r)eCN{qFl-i;qDHRZNPq2eBDm(c)5&hY za>KF{SPU>)qX>FrX=p?VCPlGy#FhD<9D1J5eI9Ckt)S!ZYnPjJHZ-^wPmoPtD_$zk(TDl71#7> z;$lNS9Q{Y~7B6ib`sIcpCFN@efOV*b2C1?#=_kEuqwJOq?$Gg6-hviHK)pds-mt+7 zsY zMM=*lMlhGPuVM_d6A$vW^1c+Fr{s#1!H_JEoXE_<{2zt=Ec5|(9c05u$-9?YwWvmr zF=ug2jP#1#u0VJyKiZ+rMigVN?yWOM2$44UOGY^3j|jjc)gcl2>(oS2yvqO-yb9B_ z+73m$==jOiB1+*ixrUjx#!7$ddeWi4c&1r;h_RCuICGG(4t?@pkD$Q6`T^BZGi@K- zl-k~yS}>=Q@#=O;_6BkFZE<%{uOMSwnaX|4tBAShetElwf^?HTBfVU%m;ftEe7`sn zDbI4#OF2rcI9ZMd{Y_2kS{1%Dd)^0|P;cSeg-PnrAc(CX&Bs zzz=+d3*-?{zI3@eZNIn1q(#+bQWagengb~MOBl;}CBg&Q|Ch+mq8#&^n?ZU%2z47} zE|xG1MZ#9LEJPqCVLKsQ${W?(2*(OdDfT!Do8$G|jaX7MRVZREF4B`c7=e$ja}#0sQSjmnN>}`f1R?b0g78#! zm?o}B{iyRBL~rYkoK4t68ID5j(#bfN+(ihfYI>C-^G*w$0>d1bhVr%yBaq42A#wt8 zY|~s6N;^t{N006$D+L7{q4{aug$FxirN}g({z$V_fPrP`V@3x`%7p?Q_%eGz3qnXO z>s3M2piLNcE;1_@gG)Fu52g(q)T@iAEs2vQwaa2&DMM`=@>&`6Dxx{t$z<|s<5VC^ zWil^VFtZO{x}i)j;03pC3qh@3UJ~usNlOyPrlJyPE-6XarDD>KQc-%N_AW9}?zZWN zkcgBKE|Z5+F-3_WV+8i@?JLsjSHZ1IKM>-`I$K=JsB%g>3mHDfBmiD33!C@C3q*8~ z3>xP`4yn-px>g&AY%IyMryLBNirB>EO6eNTM=xbkIszGnKxO3wrl{qd0=U{6? z;83?VB%b%7Mo8d?Tpa0z=({YA+-2eSWn*~ssKc|#;`Hc^CDWy`H$*67O%e>|)P(ED zBB_gmLgW*X%|)1i;<^3PD~x4~&`9X|$Nank@udevjfXa?Qrr`NEgm{z4Qx4qTBFDw;yA_dY&3Z(OK5VB}gsz=g z`)=`y%{s;lKUCNLbbMMol9{R!yz*>UkCME(DhzIR*s&iziF&!78Wcj!JK6Dd%& zgr9xRyaa`j>$40T%k;k7FkpGF7(H-*DV}MF==;mmqvIUc`?i}>qGpRwjd$-5g4ll@xK3;~9#^jzp6PIgBsO#rS6(>gG8xiWJK6zuwIbB1DQbZ%YWIRzDqsIx*bWKKWAPxABUv=bCPuC+-- z^O&*k1fzce-z7Xe218O+WSgf=UDMw2>-PZ2U>%0Izc%>!6~XrN=ZgNPZcs!yilP_IP*&k!$iJe4Va+l{{F3*?iciI+5e&EwcG2x)}9GoVxDpX$94q6$CJPO0keu>)CoE!+$e;a*(C&yKPkVF9Sz{-Nio+kgLS z@EyO2og46>@2Cn3&ujg4UzHhh`xm{7lW$lha3i$h#|J`;sf9*V)hiX^@0qo1S^qL1 zVjnKBW&InbG03g|@pxz)*Z)I2bp5}jD>;`6PA&$Kv`YAuFg8%RfF;RPEn}AIT*-+C zl{PXfFM|F8fybo6Q}8$q&N+Q1g@p8FR=7z^7gPl<^2-7Y5&^0-q5b-6N0#n?&GG;# z=WS~Kq(VA77HUEVC~c4*faKflWgw+Eax8BMUZn8?zFoCqmyJ@UkCG>KO5uU-8#=)Z zTo*iXTstPSD5o#q?h700}0+;hMb15TE9_ZXr{9*sQ4uX3c^1la<*>dlv> zazjcbVc?WZ;!#Mrw`be_FEiloApmUI{|Ccy{`^Nb#^!PVe~4$7{a@0=VFdsQwuuBF z3m-**KY$1jl^x$?YVxBSiN<3bM=(Z<4bf+XQr>-w7y)+6fXEu^*&_5E@We+7ycEbu z;Y;9ouD^H}I_$GDXmjX#;0awQbI`pAVgSLKhR(_A^d4@qh?E8NKM$7-t~s zGb&}LE}uUuXf+_mNJSjv%@TAB&@Xj8eG){Vhm&Z5Kriv(8oC~wc}NaHrh(HEkwU4I zw!ea(-lgx^? z{sK;!z26b}nu?ZuCN>0d4rIod&&3C7mw%FHGXhb5X=N8YJ~^qg{%0}YYWvrAGycoz z%eL3l@Sj!(*_Qcq5;pqjDR>-v$`s^>FfOuqcMf{;GA;EZ?^oss<@6bN0)!y;=e73d zbr*DFk9EpHpFnn;3$(NCSf;GaLX))BI*3~_%E>*28BE8pj2P-L-+lyyqWJs3b5PV( z+9@5jJRzVc?y;ymg# ziXl8ndnYC%*E^2TvmC$L+7oed%IjwwHzmwlw814^_!p1MEdtL1_;+;?+amw*D4@&0 zbM4KpQs6fK56iOh_CL!y%6|{?Q2XCE1smUmI`1+~<`T-dFV6YpE%-E*Qnhi9(@{v_ zb>(VPyil{0Cio*a1Tv#v2C0m3Fb(GI-A-sE?Api}2KO-ZwX-P-^)d{cE5(#h+gYV- zh0$(Hc~*nq&XwUx%bmgoJuIy!1vAHfMh&-ErmT?HK)RRnTc&m0k-@60z7XB}N9q-ZqV=x?6z zAm;_p;dk-Hxg>d&EMIYx%@_lCgl|c%BzIn64N!v>Xv)4`nqWfRDymo)+nmxm^8BY{ zQKuNDx&CS~BV87m?z(wA*P%~y24_X-QuNlL-wdyOMuQf^CaN|cG*P1&YWbk@7O07; z%~2CIwxIS+;(AW%pSgmeib|RNS2!=KTbm9lfTsTL^-kk!JL`a6^iiitNX~3KNc=cg zc3yU_G{qK)(g7qZzcT=(13l22wUG%c-w%d1>kEfr>?<&@4~W zl(N8*=9$T;2(4sQS1;LK7(_AjDzPex@L9E_(D^^UMPQr!x3=#+{>w1+aUuR|e2o8i zkf#v;ahWFj<9Ex@%L;al2BG_2`C(AFwznPti4%j%_vfm4RlWJVXrm;h@z0c?x^7@20C|BsC$|9_CDRsIj? zdCLCqKE2B3ppKwS$SpAuQ)0|nhE*#t{SK3urYWJGO^P*`nUHxh&9{Mvz97d@ig?y# zw8FEgk;7f5tAs)W}BXCu6 zBO>3#tG8-lw<+0-CC_Gne;Yo{yyf47@RtM?H!yCOA}oqtF!r3ISGVl{XzI(>^-sC( zz54%}Lp?A5kB5Wf`hSq8VE+-9CGBYMk%r_t2Vjwey{Z4N$o#HYfW)huf1RM$3jaF( zS+U&+IJ@Ng5OpiEeWX6ZnP!{&2#d}%^%2hY?w<04$O+Ci*VIguR&VS1*-<<{#kn-j z5bHLgtn>D~5+u3J*|UZg^Uj`Ih_T@8DRHX{qT-_F%j_TcF0 zxy#dR|A$QL+EEPHCjXD~=Rc;Qo5%R?2YD3vU)8T$>j7Ekg`({)TcXEr%&ylPGA4pj z{Xy)`g{`xoNSst*;_shpx5Su`YouVaDYf-93cNnB0i}EU|8QU$dH=t` zaClt*5Ap1f|KW<$#Gx}lWn6N2k;iK(s`I5KzeLQ)CvtXYjDBT|C7VD(>BJXgLOxUm zi8{asKglLxCVOz$CUI?SurMJXz z*roX%WU0y-tOxq}0TVIs4f>+xa<9+dP*`?VX%6JRVj~@_xWbRoojOX{MuH<#gbZO1(X5M3IwCx`yc?x0aV8e@cV9F2M)?y zy{D17Pgv7w5#@@5?pp+%50M+AH`K%D1pEv9k_2iRm^5vF26Xn?e(?~l4HqfSJ?#E7 z)82GC{m$){wNmEz$)GXwP!~J_Wj;w{BD)JOm_e@#9v6IP|0t&T-{h&6|Cw)oUy0S| z-zcFM4K;#o^1o^1@_(2E%N!l$|A%;({4YfRI1pL=bKyCG-w|p5#S-oV*XLoOD7E5O zr2nV)DR0mHUx?Ew@dB!j01~#o{@36v3<*ETU$vUvA;?Ym&~aRL`SQ8=B-4F-=2^md zjgotT^7!^-X|{XKqhLk1$V}ji0yAUZl=fhyr$ywtv{6kRqyoT#VYUA?c*${RhZ>p7 zjD^(|t-^Sd={-LoZPN7|%=Ct()Eb_P0!ZN(okq)gpv)<+$F_7am+V(|`gn;}9bkTK zS2CYg#Vm5r^;4)iD)aE0TeOjfDV%bVhu4RQwXg%P#0@z zT`Rb83{L8X%qgw`Va->DsdjZ$onn+9sBMK)F<|wFSKT~MC;_nRc~!&Hs$#2&U)pZF z*${!kO=qJjfyn35^hR6ZR1Icrx}m~sa0vac!E+R&XhnEBjg4b>e`U@||37wBxjZgq zWVE)09Y;x{qc+pT!mH&#(p$ru&?Jo;%6yBUIsW;b4PLL^giv%GrlKG zqo9?0?6zS2M4?Vjt*kF{Jh}vruI$W7#X(xrwXik4Q{7rnk~{6O7OMXKt>vJ9*Jl^` zp9>p}4+OUP|BT1^{4ax{b(H@f#tn~^D^-~mW(53jm*{wWie{dF5a@9 zxnZ6ETXj%b7CBHlCZY}>%G;;l@tO`~vG2Df z9bT)QEH@3&UH-HqASqM`Qc@@TZ1x(;mQn*nEsTOVumkTDT%TWdV6?z0om7J+CF$W6 z%VJ#KB@J{njYB6&fR(&!FoJY|s5=AH)Wv?d zxP)4rKRXzOa0SLjw(MD182NpLO9Rf%5c$w=-GYxQ-xv0@=l^WiJ}Cbm?X#GR_HHvVR>o=oFYEi);chTJgP21Gi`+$JG8}~K-$wZE&ra$qu%T#}Qsq8n}3IeRKBw^~;M+3;Upw{_^)|9hB5_ zDBGYq9`|nf?^>U#NF^pY13!l_s4r93h2QRRpw+wJB-{!+!0BNkO z9rE1VgfL#-+;Clk{GbX$MF_#anF*sk|3A3?Z<hqj{}xKUvd{e(J#!lP;?&OX@5lb} z@BXyh|K$uH(EekL2l@Oz=J=TZ?_r)Q`;U6b)I-{T()*@bsE_6LA6270y#1$4%(-X# zPdYZOBmSgXULEU~7HQPy^pdPXM>&{GN7L7>gZ=WBiT$JgWIxvT73!DU>F+(@Z)feb zCI4^l{L{exKQIgS|Dk@2|9Ft6*8hhQ?|~eDN*A3*58t?fZx6fPQC{5fX|(>=q2Iru zS6SXi{zpSM^Z6fiYos67|3f@g@*lta^dUt*dI72;^|iTJ^|QSEvKxfRXLqUYd=+a7 z0+b6VvavfiLW=}Od)@r10x4;*(@5f2hrWH6Q*+mXfJXQQ(gafhJ24WL{GKED>rS@DLgJ52&T6duD(3-F$x`=R6 zW`CZ$+Yc8cXD(Oy0};e@9~wVz`vDbx+1u9oKHf92kLW8tbTXggUh`!=?fL(~^FIv6 zR-XS4MuVgN{~%8x{&U~s-x4mFp8oQWWrx4~)0VT}OsOVEznKdAC3|S$_$}UC{d9Hn z`pxrquU@n`H729?`#dlv^mC}QVm=D@e@t9)$Uxe^bv^Iu&W-J5wzY3xzJ2lG?A0r^ zweFjXu2SUfn|IeQZj4L`V{G;etEcz$zF~IDFS=%fSwR$^m^0o5yR{zQyu4fwvzW1F zKYym;7SCd9mW@lrl*=h8ACNK(thD-L@txnRkJlEvl17#&J&E7aw`$nW0C=J#4Ew)- zUUy5&^}tEKj|Ulit7P!4+~^y-jD9th1`&8thMr)%2}TiJ?kDx-LWuEQ5IJmQkiY&m z3RcWlfyr_Fl2EYyX3m^VR`7TQ`Jz9B;`N~V>7)jY9$vx-IXziW3?oB^eXR}@&DlIM z(2u?lu7l41F6+Oo1!$Z7#~O@s>wl;Zj`_bHUH?H)}= zMU&C*(q{DI%U7?iKD@j>|2{Lr)D5uGd@`iwldRq7UTi7DhPISpxh>7{Cc4Gd$m}gLID`LpqLjQL% z)ZEikFaPn}|2xM0i)Wkv$G9N>8AJW3|2@c4d;crU-Tn$a;e`Jhh6la-Ra`QWOCP{l z?mY24aX-j*8?=^>X?P7oQ9A{tlq%dY+sg(qr1BKM5x-Y{&xIP2uYT_pVvXHw z@s|5^1-JuVqRR%O&;og#mW@LXJQ3hdGDgg*4W!xr(UAX(Yln7n0I%o&hCVFB{~LyJ z%>VZwPiy}Fl3yHkAKYJFF?0yt&w;h%{OY|}d-MJLC0kzr*H=fS$n({&4LH7n;NviI zS1{UK@w>iGpMiy90~J?*6%4NOf(lkWXJ&oO^U_|Ww>4MIWqyQm_!LGe`@LqwN>C^c zTuGq@E#zmt(3-fxj0|NS9=+0|B)~s=bsfL?Lk=&GLtJwL&H+6+$;_#XuVOg!O4puh z`;xcPi3&WBLBLr#&Rs+X1&5H)Mwj=q3$lThnRRncx{?Y66`)eh+x?{dne?d&O7Ti{ z$z^)ePpR zWmP&OtCo|oYBmq6x+z%gG5Xc*R}OrO=89vU8Fl6hrxf*?Tnp7r+|aL{ zw#YrRelyFz&5Ta<{+Ho?%B~cPsg1otx<1MEVo$jmwpbMa4bV$WPn8?{B@kJeUv!!h z5}=8bh=$suifPHc|C!{1De@^yY(o#7BXNBi0EPPva_mk0UruoC#vZ%klrZeB`^iT1 z4%M>89{1iNdOX#8i`Fh#u%%qror7MAP9=(T2$XViFv=Ng$&AV$QR1amV?G1xlHq4F zmbOmsrY)I-WgLg;w9@-$)%1zVkqEn+R+&8+-6IA2GHF*U)(E-qS|ZbC@7K)`Md6<4 zQY@ZHrXgQRiPtaUqhh2~rN1+hatTfu%4K67ijxsK<}{;ZDdDTMF8M<4JE?t5uY>yh zIpu_x5t_T7x(qn^Tn4s)82~eA-y+{R&Ai->1Q2&L=PRlklo;qjT|lpNE>;D=PgXM& zvFhpNh=qP+B%2&Y7u(y%DPe7GDnDdZOR$|4?f3gMwEu-`d&lGtP455I^ZCDYb8yW6 z{vc0l``@KF1ddtWmvaxgt9!8qhHK?Is1j41n*KmZ8&PkotFYANVS!3pUG^Y2b0+*a zOs}zTW~w}lX^%tkgBUzPzm%8kYTeug`2yLZF-v@@Z8ARyX>X)~BZxA>L9W&EVktDD zd@;SLl;rZ~Oyx?IXigocAd+oID2A@z@>ECZBCju$l_m04J-qCTbAK(Q4rbj`aEnk_ zmS}r_b)-&;+%ebrR_(F1f&^_FVf;F9ki1chiuAJA^1G@IzD3aa5V)N$T%(IIK*WZ#_giXPKMGaLBu3gL2li1 zFTpX2US4)jz!R3PMtnTs`zX6JTNW%%hb=y_^73b9U(FTz{8QAYWFz z&J-;=dmX{~+_lpfi*$f8pGrrnq;g%GDvnoFDtrt5g*XnX`g&TmZmXbGlDL+gs%?`| z)eVd=;caJgcF!OylY5yJXv-?p17)6grJ&iTs!=J2(_~00ISP`*jv^0KWLU7_1y zGV@%#ya-~VMr_U;hwwu|5>;O_qgxLm(>UG7a`t+%2R&8H;F+B<>TavQo&R+Ub*&!aQVLX}EOy-mUm}Rr&S${8Bkw7Vl5N z_4#F|%mSR2NIPGGZ2lOf6hfwrv_dK!l#I_4Dw<_j?M2{F>oVD#n3aX?P!u_ze>^#n zofNN>E{Ipk&RMRrm(eskZue2;u5?oMnQS8`e64%Pj)Um5j6<+b6{|G+nXk!ef7GhA zsm@Tf+$CFkRWF8B+3dIMr>wV+7r>bVn3hufl6u za+^AS!Gbs3fn*;M0|NS5j zwg0?DaT59bvJI+oQdYohK0Jqa*6!2TmXp`;74rpWK$nz5ojzk$)%1HgU+ZP~npVfy za$eUmFGIFr#=fdOu`4ov>)?rp{4A^!mF>~s=O@A_a}hAMO)X^tK{C9;4D~*wZm$JFk#8e$#L75WjmZ3v#irJsnHdabt1(tMiaRK<}KRb9OC~1b2q|qwePe7@F2GFe}`ua{}+L4xKCL>Yf;y;JS z^Zy5V$~d@;^<`7uO-dem%7bNjngwrtFzk@y%f{30_ zE|!1G`IrKQdhHQj{+OtVH*VNX`^Y;t91fIzb9I((>gna^Lc*Wv+B~ zNGlw{1o8#n$8<=afhTPDVTDeZ*Iy;fIu%vTAwsv#@~D{1WR!UX7wZ>8Vah9?lqh76 z`N;uWzRMuEB@n$JxJ^RPT^n7{l|j5+wcT!7qnq|iaquP`%X)U_=uDPWWkdP$S!uca zKo%Jg?=|HP3S@OLJgciC8WEue#qm+s%oEN6ip5wYuiB%GoR~vs2RJq4#jPQ9E#y~% z@;%2ibw=XXPotxDKv&F6C43~KaaHh<*1ZSr?9r>=T;#K$uUc+mlI2AbClDmU^zo9E0zPR zX=x%jB8HT zdY1bpJjU7JWxgemSBP*p?f3t@KK=8W`Qr%`SfdR5V?Hfg)BDt`LiO^$=g#^zisJqa z`TwidnSa@{&HvXhjlBGC>Bsy3ALJ>M|4|fYlJ^R47a7>n*x5yH&DnG)D2l%iJSUUs zQt{)dDxCF?DZ6}zyTX*l3UxDusv608&5G!u%HnA((Mjnka5MC>xb4OC zyo(gqbW+eV)A32x)2Q9(b}53a6KQV>;a4Z6epTH4rJ%DBvV?2sdMv`6C=dJ=-SkR3 zf!Y7~f5!jgcR^RvG`iEaPCorO6Y!;d{tSw-V(LLqt1XK824sD6Vh_tLDE4sA=DSJx zK+v;k`$x241Mx2q2Ul_A`inHbbY_zw5O2|@4r1i4VT_uB{QMBvX^+o+KW+B^9n=48 z&Hrl@?0@?4{=Wx$#Q9I;qBR19o%ZLDtGr~+-MMSS7y%da%x_7Aoa)1$9FJBUUK{LX zC0@Tz2$cpiis#cG!BYQle(VL@QM390m-+2DRe8|Ez`&c?T5lr|=vqt%|? zgb~8Xk5lh|O;s7i4>q28KAAZf>13yYF?Vo_HXz7ML;b)jd%_ntl%T6%N61X>{bid` zI-=V~ifvl$hf3M(zPPd4acEjBWw}Iw>jU@GdHNOCj$2CcWghzSW!A4<+P^dHfG5%= zH$QwmW!MxkUntgE_6 z7ciEqQqUZ&-cv`i$kTWszKF=$t6^?O;qXg-8pwa-TmMF}sU6t=N4Ly;{$JBHj`#mR z$V2Z~IcITNYJdmJ;0>T11xm8V%8MTq;$Jg;OdPeFGF*cEovren~u`@aF3 zY`p$6iLTl)fUW+2re0Y8y_BhG7(hkxPV^)b2;!?ef`cTlGp!>y~zk zg~xU|%W?fhk1!-R=&y}#*1nC=YK@}vU=`B*d;ekdjA^&T8n<;sd)ZVD9D^B(VW!Da zRg*FNC9-ejVBnaww`n&VX|hi(ch=jiOPMTrC-o!9qYk2^EOqKp!rc97%>Q|K#x54X zZTw#^`u`cm(f{v39##J1@yhK)KXJxE7N5v}LP@6P3Qzi-r^c*2HYte&QrS%JoB-*a zg`wc@^pq#eMLe&S+?~ZLRjDwPm57|$V`K}%pq1jc z<z#7m$-PKhxpSzzxSL>Eb;hl4uF$X}2 z!94N24frL2o;!ERMiGW|LVBGKh(V|2W6}nh91Ld2h6zRh2P;GsIL6i4G|pY*IV|MJ zb60MR9Clr9iEs|1AXW6yMSj1B$(id z0i?)tZ0kuTbrMp@#;^4&D!JZ+O~JSPB8UUgS^-><-U>x>G$(quo$j(Xsc60qsyd<$krgM)@&sL zz7iD@C;X7hj)c4^ne#QnN>S--3v=XhZq8PqbX4Iu{O?pUjZo-O|N6glLHDNHp1+7* z<=HwHS()LdQao7MeDn4@6G+J>!fMkriq{J zv}d>5Q$r*q;hG{?0#c%z2HK2>Ag+v?2*b z9=PJ^HEIo(GRV+;9SguN$k(cY3wF2WS}g+*Y+#HdP{#TAFZ8hEqsS$dy&E*2*N)`L ze*>LB{F~o@>45nkQL<~x`y)zkIX(RIc_&e|u$`*1R#3Y2V+5%Oegf<;iwnzC)NnQ%RJ1znd zN_?*GR|dd9b-rd~ffAJQm6sCA78#;{#2|%~z9m^i#r<)FA{5oZj!=q{2qhsFH&is3 z04IMJ-jq75VoiJ!LII%>t`*EMjAoyNO~EMRYvj0Ty#94I$b0wy4hGYHrT%Y!{5Ai_ zgM5T`^GVCwz3*)*Iam!PQGv2783nN@P!p-pyV|$b6lIQA9+MSjg~cb|EGIx;@m@#8 z+p9HYVkEeA^fto`m8mk(S)lTmzyNfLs}-6W3zJLpI1q4-zXPHnNJ(^F1QWc(l*xo# z_V04&i|dl+v!^&@c}kU{m0k7TfyMw>ggH7uOT}4Evhh-JBU94^lZ1$|6&-V9c4BZ* zlFz5z-WqC!^UyP{(ur;jsr;!jn)2sH18L}%aRJ{qmImO)!x+O^brdUT%iwFq(0Cbi z^bw9dj4_-!N3nR*$)wK5_UJmBv>j>KgmwLxnhkyNzMGNV^wi;PIw#P>-!?@%CaBEq zSugx_`^nyv&VvRa|ySOpeZHP$kVQ6W=`A^^oWi-Hxhn1~u-xsXv-9n<&K zI&GMtm8Z~&z)|%8TDc!$Oqp;mJ=R6gjH_IScJ={rU!9>=+-}@(UlKf@K`rr%|jX2j;l#S?rf)r3zEZqfB!( z@NuP@M=?jjdVC zuLhM@o@(qAz13%J)}E%h*}ALZx-W6-fqZ|WRv~bSSr6_#M67|Ny?E6Nr6gLdpFjK5 z-kUhB!n+qys=zwLXcb{Q5n4cQEk^r3rG3io0V^_Jva7xbrmSzlh>?yi<#ODjY!CF<;Tp zHTrt$z@P^P)x7)r(lki3z(iq zkz=3BmTY!E&w@*($i-{OZSjo)j5uhdtY32HGqyO^)f3~zLfaG4OLB(AYMW29vZ!qH0GMAA~ zC{~hI-Rmb(-}gunWnI|hr?rHur~A{K?oI7ZX;|zSIYggOQbM6q7LnD&y!8sDxz>ED zWFZGFJyQK_NtP0o77Q)T%0R^LwrnWNKx?b6{J7JAv?L1X@b%Uy;CS{ch05+mOH43| zIysc8&FWgl75}o9Jgi(16a4{nd@5e0F}nQuqT?hLbeM?G?WCKq${${MKVI$tw^I2 z39alCJ7|+*wSzE6CiF%WzW=oAnGNFq@ceX^O3h?}w6Kb*bCXwnwFPkPb*;zp z7t8cjP%4+64C}GfC1t=$+WprWK7Ksts`SRCAwB>Aui!%6|5iPRaf%c4g8v?5C?ym# zl5N4qk7u4n4CYmZttn9%_}9rfeM3=p272O$!XbSowQ}(*jAQclQa^e|Lnt}NY-1`2 zx@;y_Nc7(Tbiw({mj?i3h>G&fd1YSVSkc7iPfZs=!(zjnZDA5glwHs{p5f$}E<5^r zH_ZP;;gW!F&n@#jBw2<+#%J6Vr$O-TzrTN9EyMt$h(F$>x;WDhI7T_&iQ=z>$$Aiu zSJcHGOhxk!5Or$9C3%~G?iCnMPR_=Y6L7pqlVgqH-$A%sk%&KE{M%dm8Tjx4$Uez7 zbBJ{@yG@#?EU`!8*6Eh4`NSu@pRazn-i*Nc#Y_5sL?`7?%9L1q1^#{nzFDTiqg7^b zgIdmfN)CMdDC;n!t3XO5Sy+MUj1Hwf_^GZ!`S`J({vC+(-f{F~5 zP%imRnn<{6k>r%0*|Y0&o!N5IJ5d(Sa&cG-t83H`ta41^Fhw6s{K&6F)`uow9 z{uMv%^gneW7-g;Qfz<1N{a$}GDCd8h_6J|}zlZp|mv@qGxLyZw0`eKwSB@fplk&}0 z<6@FukK^DjG&HHj8G>PV{SdKy3%#VcGm=S@5yH4GMz@rqmC(ezuW%dZ6-oFjprV0YPkz68cK-DD*RNjw z*Y8)aU*FjM==3}87$l{6-Jz{MgD?$Llx&Q0o2KTa(sGvvi>0v!^NnLzTH+Re{g9DW zGYWXi!c2Q_CMQ=Fr~VUduh6`BO|1U>_u^fnQcuw%3x+hI%Y9TIT?)tdE+^gjs(EOl zUJP|9yAt8%@4E;$+qNa#dUrSBrQg)Fe$XPX5O^n**Ilu37NekKBO(KACNZK0E%%9f zr24DBnE`_qJ6X*goLz!Y8iVSdrIJZ>E@ieOnxYWTw*uj@1i`IClx%QDk`*5j9Wdsq z6q$c<%Wjlx9Ol#=UskfxfMveqArs%+l^*1a@S9D=V6so^>|wGUP#OATjWZO1j;niA zCUg?VV`L6iFs1qp0FBgA`bf|bmtojn#uUm4`KH?3Abusv%gSzcOXQc!C#Vw59easb zBlSen=!U45vI{I1RwdAeYLKrRy<8@{R-63QC@n1!_!nRmV!3E>i%>UxVw5^Ow(n z&gT&U5!#x}iR>hAS@kz_8E^os2!Z0EKB4G{oP8ojt`ZdcAwNP8P0dJ(0#F{1R{Z2~ zeY^eS-|X)o|LSP_vwYh5|56g|kpX7M`R}Ax&HpqWe9iy*ARp=fJGfbj^cd2ehZ!bG zjsGt=XygD)No3}KvDD$*)h0`@3JFvGt=1b;4b`otD6HA+T=@(GkK4r&s4vhpcS`x< zifuF*CIVm#Db>lhD?c{(7SV8tqIHZi4a@qWIh-Y-?3FCdz*`t!+riLUzy7=SZS$T= zLJKcf{>5_qSWRqY&C?45&PBYY3}rvyjIv)aTmC3pmUJ=C3)OAU&gvQ^s<2Q%WWhDZ z6Ty)v+n~(#lp>ggOSuQ>`69x5&zIZ+SrUZI(M#Tk#HUsSm*iuukwF-~*r}W1@=IVaYpE zoL=cti5^h4Z_==w3lMe)4ycCV6v$L^&??Z1eO?}zCjiPDbma#IbeD;&I6sZSW9^Ty z0UQd$(!T+P6&9=Eu+mYUhcoO$rYI6>1dKf#;%wmO6BT%1O>l7kGg#}%s-wJ^Nay4B z)9C`UYf@WT*JZ<6{aWl31)j!x{CSKamBQNi`sun+LL!tGQ~CJu!2JH{(BWJty<+X^ zzds!+BPof=Vtbut2u2qqp)7+~g~@my-Ur?oWko^+<7-RUUyb2^3wbqLy=ZCe@|DIChRg%2@*1e$ z%T7r%!bnJB>sJx=f&MU_c7D9Mx$KD0j_U8%t_L?4qP;vBQNNynn~TfJ2~P2p6J8~# zdK=RZ)Y_Kssp5J|`7aJi?z#T=a5AmLe-4IU>pwooN6LROtw2^9#3TVRS>Ujl)K^Dm z`F)!-!z-9=bzMYdhnIzY#XM0D0`+=cZ;=7e-hJqwV+ z0BE>GT;VA|2x7euyrV7pz{2#Jgm?A5s2x&k&JFd%fh`{cq0XodIA7k`oA%Jt-Edv3 zq@jwlK^Q+pG2G^EY-1YvG7cP#K>e_4@Lc6wXXs{`A-W`SRE1q`(GW1hD@4}JOS1jE zA<)$J=9ghwkKGU(+7a$Q?`QvSr~jFuH_f%c9s1v3*eln68IDHNulnCZe1wVmvvmE| zcmTY0Uc5nDWplrII%w0EFLS*S0o2ksife;sPYNsbSS&(;>9FijK!2EtEb?nYG9!dU zWLAcAVA2V|G!#!!O2a2B+ZPaOKnE3QHu*x&v9h^6PLK(r)9oBeUqI=WW$A`x5l}6Y z@mVApR9p8d&0Ckjjsp?{hQ34rRG69k))tEFKt@uy5RPowu>9)|s6OFZ-q_#oF1~0L zGxQ&6ZbB;%-k;t?al2x~eb@f9_=*jkBza zi?_UdQ+>K?nrbHM>*>V(eD>M@+d6=D?Ejg987>)X0_y33Z2>;LS{lAefC_h&& z`LDG=G==I(3X3cxT=wt_Ls-PiQs!ls47*zjM2ZxrApaNX2px|uzKw$DW5A< zoCEhkP)QN>;VuvGoMh6gSVz##H(W|-ah*fI%ziG^66v%H`JZ`+XpYf7q|pAc(%J$Y zv`X3bDbDQmrGK^3FWH)&32KERysmf(i^IGeTt~L-IJD<_3>5zZy~HbAKGky~$s4=y zh_AZsS*g1YkLIX4k|e9H7de{wb)n9ouZg_q)3Gupe?w+}MgN`Ih|q)vkAK z&9llkYH#_8MEQHhPiNIE3A+IDQO?Z(@#V~5M@O8_#IG9HF3eJ@N&Qt~OSO((Tnx>P zT*V)yoiu-3+dJLrCQptCL|Ocrf!f^@d5&NS7#%ccHkR7RwLDmGMLD@H13N3rS4fbh z;I!+?`!^_2l+ViKkB=T z6hN-QM`V>(Cl_8Ql+bm?tp%o61_dz82&G`1MuKlpgc;R(rC=_v{jj5wd2tlF;KGD& zXSpV}>HcNY0l^g#7x)7q%sUE12k3KBBVb*FH_eG|_W-6?r3g9$oBqKaPNFj)FCiVQ z5Q7n9kjqI~MaVeXEUAFH%8=tGg50ze{xCxkmA#5)X@)kKtYw@OA$RK(bT<7C=tu%e z{i7)ii%tqa9W7G6iDs9OQguSEf6NGB_Rq3ATJba}C=SjQq$l7pkT#alEa30wBy=@v zbig6_0A`a>ghC@Xc!9qOFy6QhVi~E}N7~V7!Ljf)1XiI@OLXhjb}@u}35m-JuhuIt z?zxA?*~r;j4Ool}N<#bkxW8isHrJch7QD`4H5U1C>mTvi@$p|aXMfrJ$6q#Gh2?BG z>`jEry}ZEG|8FSDnu(PrR}KvKa|ER5}_w5P2z)7 zoyHI+DajZYWF^vtEEAOa1zIg!AI$dP{vOT35+v~x{UerFyu=tgc;J3UiR0?7wtOxf zM92pZK!5`7B0)X+j6_Hk`E?5aSfhjY&aC+gQa+!Txj=eshzJQW7g4*xTqz-ugEFK> zQ((b5i$O@RjSp(_qo=iOkcndq)_ORT?9PY+V0Dk>8Gdz9?N=yI8Jf69}nw)UUCCi)`5tm!e(uKOQ@NhSVcGW~l0<3TBd3+!z z^y9~W2N3}@MkoaXz`rD@OuSzAXQrwK44N0xWF~4R?o!bOhdq53rg0FI{{N=by2K?(+XB0-8cof7XF@Am8D- z^N?GCRz}_etc&iw9fSFpIh*+UU+)>**-wpi5BFdJ+cX)CU&o{2z_J?a)rWf9(fRJ) zPQ#|O``w5Cgud)_CDzKs`*9>Tf#~xkmImF;D)%>F4g6__iDUF^Pp_H_SZadGms$%@ zE!}G6>DdocQ|H?KVDq`yI8S^=ls-q>=Rxasw|#LUv~|Bcez?!N)c+Mdau54yYyXM% zt)f46-~aCoEAbz_-dFqYK|WuW{U^BVQ%pYrz-jeK(EluhPhkIao38-lH~a3#!V{S4 ztT4O54oj&DZ6DjnfwIo#*+PA%#N95{0B8@$8cq5%hxr%}2?+Yadb@cMP9$dB|`AM?Kx zhTG3aN}`fH49O}b2})Q#7w8?!;7^=sUur{B7b_?|5x3_UddKp6$_?hpAR#xnb0Wl* zO?{)f1A^i~-nK%7@rvlvA*d3%zi2K-oiA#=@Pr9&=LFBiwnQl}XI3umO4~hHS;MPF z@zAj6`#n&(v7Fy_UZren4BBD2X|9>WG!5?7Gn6HWAsS$EoWFD?Z(9}vTtVl|&E>Aq zTAh?KMXFkXO3mRandw2CXn%wyH@Q4hqvr5jR3PgF=>N&Ztvw*RKupVh?EY4xwX6Me zR%5a4J=|(+zrl9htM2~RT%`nUqXqZr%gwRa_FQU>7g`Brb&<7PVoerU&62ve)$}l` zhQxFanuf6#-k+jjEa_c(#zWhGjqQICsM+53|G%2#|L+gW_5b?g$yfXTAwJFQe^WNF zB?4*2jUgGl3zR6SEC9tZ;=c}ftg4!duUCXH<0KohWxzhK8&u?`+bD9um^8H&!pnj&ELTb2|st0>}xG6bW;n(0W3=A}u=C9rp1 z`bYj}gTrFhbR+q_$rM^t-Qx%%zPCWe=TI5qusG?YHN#XH+j}1@Q#IT@Kn{BDW$S1x z|CP%28RUO&JS^w`@At=F^S?dFr-l6g&s>QFl))t8MwjFYFY_v<(anv#{oVs~=h|0# zH6ua_k_1F3jmcIfTBgeUFwF@Os6aQN-C`G=mOWBWY7X)Bj=$!AevnUl{m&#v12Ie zUVZP#d#G!DxWSZ$>d@bi3VsBY)ads!qMj_zu7Wsuasp!nWKKU}jwyP&WZfnER8p+z-U_yV3+6PPu`_ti9{r^Eet@eLzf>N0lagAiAVpW~5Fsg%tHxw?= znM)fecu1PFg+d^HcB=y7r^e=T6-7xP^6pv14`pXco_LnV`iXYA180s=`<2Im_V3HP z_=oPdzo0m~#_Rtr%o3a|_VEDh^8faRqw@M65655E|3iFQtp8sm2LL!DYX;Vo|DBOI z=KnLes9X3s^QiVWa8cv_y&{Cwt#KzbQ%M&`gk>M@2aur!diMiPBGBn(|MNf5zkTz8 zF5zH2Ig{y=e>uN;_2Sj@GjLV(3PgyZkf8`Xe*Yer-eZ*qL?-+=JOZguZ8&Zv8nMjd z&N7lL;w{J!C!Y(Y2rvTRhTy0=iWFdR{FaeuEo(8NWP>x3tWd&&gMY)xoPZ@`DLp$r zjz~y@8DMAT3x;|5Ak^fE+JzmON4h-PC9tILa*{xbG7#eg1qZ>?>))>#$`kP4yJUC=rM19czEFJ zbI;f3-oAbApO*UEGy6Q)uh0FHc75)j`1{;H_4K)ax_6&X>^}EToqhfRzvDetTMM9M zg+PSo;t~cEc|^cEi@&9!Oo`4~t1k+ByK~~}PO~v9b%!C!y2D@?OiNulF}u|FO=B@{ zYC^^I^``BnuQ#okzNxRj&5*dJZ&K>()aYyPq%?gj+bWX=0*b_a2?R2fkd3%lo)Ny! z@&PEaNU{v##M_~XuS1i)J2WnJXyWXUfAaXOjZWGvy3tA9q8s}r^Ijz+&O@KXqbLkirE5 z5X>+;_zuk0t5o&(;5(2Zmf^($W$Gtx6(C5FcM2xW7IfaJ$wYL@4Q$ksaYv_hz=kb> z4Qqf6+DZG-U|I*PC1nGPGBsD0{1#jop_B@vh_l^d8D?VU6Y@6j^1M$y?C+%>=8Jn! zTHL0J=vYJd$XWL?Dn13Wzn21;k4nEZDy9&rr47AMH~ZaTuVDxGlCqu-`joT1 zb+eLcHa0pqI4wyYD9go)@}2;4O&YF{h;7VJm?7SEG6x~bSeL30aFXajkwYz0R5P^fueuiw^eu9rWoBd-|VF%G29(cJK!T8SmeVRT`reN|ZB( z;#C^sISz&Uo`QKsR^WSi_9(kPZMO*zr(T=*#51=i`_Ao&J+~+J-1aL{mlCdckhjw2 zk>Lin0w3xfK-G_?}KYlXtT3L9B`lj~uP3xymi5$tcD@+-@6SeJ&Lc(APlPFdbszu;p$v^zKFzk0hS#D~ZRp5k9dbu`v#YxYhQGKHiGq)@QbiJtp;d zUz2)lo77{=r0$O@d?~!XV4VVSJ0RG?RV=5Zr71ZSrlgP0Tbk%YX`<(pvdR|c9!vN6 z(Ky)i_-Jfz!sB3Kj%7uK=2I^dq@Jg#?02uFhSBqC7-P>?I^K6H9ot*!*xE|_4Sg@e zUP~_N)o{t+w4F2@oK}3dbNo)9Jp{seBHPLkC!A0QMNp(~h~2yVc;8)qZ13`8YnL}p zQ*$kz5+OdN$7h9BGnARt_%cFRo}Am)2lqxk-ghG(+Z*}V+Q^$8xecc6G?l^BtEr4V z8~J$OjeKlxKVQh{=ijzJUfKg=4g}k#h^paeDg92oy5Pt& z9HV`QV_1r18toX5^C;5OuiOqIixQ*&f|mqF-@_OtA(=Fll$-G?;h~ zoQA#_r{Uf)PQy}+)6k4@GCQe5)CzM3BoUEyF8X41b7dn+C`qM@6enU!kVDW;EgDR` zhU?H56*b&DDr#7YiW-_xQN8ZKYn`jRC&xxnpFWqAJssi};RT|MkI-Z~oX$rRIT|fb zAP06#g%w06?#w(EKOIWo!TUwXgg|;pO3k~g8>>fraAxVI|s4hmR-*SZdbtB}~ zq4|To*oY2 z-FoX!YhsxCEe{I%@}R)wp_j8IZ`fgyh(iem8Je%-m?Gw#4Y$J2AM8CF{nBg<%-JZP zMPHC~3+(g>LFF8j5fCnM9Lf4e9zXKX7dtiFGj>Y6SzdU3cW0Dt#y7M);fP*Ta(}CI zifgNK*2I!b2wRF{6bcr2gA#d^)Ngr=()S;u41G~l!#$&@_?xGt;pv&fGcC>a|FfnH zq#4=Z2my8TRCYdGu1Eyt5X<8yawRV;|U$^>j@nOC5_Qk82#6G zDt92H`o=rk(&OLvd;EtU&**Sp&*(5H>1?LT=D)X7+BaMJ&-?yRtf9v*Io#JTIkf$f z!@yM4dZ%78d}`6&T2V+=UDrF60lpqm-0P*cw^7q8 z88tn_sM$e^dwP0%tK2E?H`|d^quLx`p(qWccvwM$1!R0pkk9I<;Wc$y)MOQy02n1wH2djNih=i zy2)^Pz{KzSk}696W6o9&jq711y(vij&&Q(()u;4raS} zj8hqoA+Wtzr5V|X2q*Cu0#PC-mM;;Nc~^uC(`~}wJFI4}RkYu!FW7JDQMIT0s@nX; zlHy?L4b=b_A>~#i(^;98>sc}6VxXV@cyR?*ILp-3j$2)xIUS#rPfL|(jn-+5L(V!{ z66w^!;woNAqw@`)Pc7MBE3t>q(n)${CjE(bMBK}guat(4tTV298o#Rduh1OI%XZ(X zqit1tEQVXY`!k|9%sknUTxOIj1{6mqAp73)V6V^B^#$Y zm`k`pVk7065ENmRmyj*B67JjG3^YDagBlD)AjaJ^(H}oRGt}A)$8TK8YY`wA%(^^vAXvhDzeC@Vsju#EUUZI^lE z)R%Zf5$Nsp{u6#$?zCsZ?F<3yRNW+pv2ZU~@mvuSmyksc7#OlOjN>h55){cHX{Q*8 z`+ooIoSJ{8k1PM{)wA=bKRvsrqC4Vffwqkf~e?dqYD+qwyVK47FS(BOoUU0Dc0XmzrdBOgU$sOJus>so`KuHJ?RJiNzm)|Zbj3lh6F!2_yDeo z@&F%11yb+<{ERZLk%JEhAG*fpgY_T(OF(>)Ur7`F5W{qEAkuDQ3Ly9q#Vhbq4U4>? zS=24K`SHayxcKq>>IS^H2CrV8PcH|H;3K6?tDzPNgJar5%O z1jcK5C-vZ<3oc~|gK&w$JE4sK`o|iFcU`_j7+9=vglHj-3mF`cY;nAT$r{GT|F3xC zn!oXvLGQVE=eXDJzD`ln<BR*%5e))D2eI7RIrX z|3(2>fmLD(z>7qR{fLBXk$H$iz$;-B>7Tf`(Ba9dq%%&0WKik+l~5ESQ}8wKf$*cx zw#B~0Ul7DFl1KMan4lt4f$&z61rFt|phxBd_)o;8`^`4x(p`@p|4VwZO<7+R@?C2W zIQU@Lf)|A^NQq7w}31^*IL4mp^q5KeTX>l}VJ=YP>0ZjhuevVV~o?p1ivQ3(S0r<8>;Rp_GVR z`IXED!E?-jQDADe6<7OJnkvYpu<&eNU;oHi&W|~e7tp1gqPqIkZKuPB@Cv>a5Hz%g zkiLf$O-2rQ@2Z3ckerQ*;D3tM9*64O%7$a=veaEqhgGYW5OBvXKs zMTRJCuohtgRAa+)TNX+_H0m<70}WSgO)Pohy7oxklI#vAi>ElV2l=>T?o1q}Y6&8o zsndG3CP|7C6sdbN24Z1ZQ1C+5Y!i2gBv-&Rl`rePUajX9Stl%oOT9{kDPc$gc~<@t zZ)Nr-L5wa5sVvGpc8nZUv0bo?tT|(gpA*FRFyx6wFk6b{dr6{(TZx12Rx&-OaF;+g zpzkNnb4+DfZbH5%NuJ|sDaZ5o8cOjrBP#}Rd=IRWgECkpS1w|*kV+<9Vv%EC=(#bu z!|mBbBWlGaId!|(#DKmZo8*|vY+^#bCpO7(wPch0y_Reeh2j*u^-gH&-t?pqHXW@#-c`8gpq$5zl$_=gU{Q`2V65-8^!wyGfJ7Qnv$1 z;14)PHb-{U3h12i4e+R=PenUto#RcK9P4*G#UpOXbq+CGK$i0*L(mW_&4mW+;Dt7yd>0dF3FpJ9w6&FR7n(k~qWJtHJDf_4Sc z`5Y&hZ5^xNsVIz0izXpSsHmvLK(-dni(h}u(EPW;`+b+M!2lB>p^rn7geYb7n1)Lf ztwoVww2^M4V{U;il5R?(ZbBk-{7B>K!X)a#gyF9KMG5IR#R+;LSkc2>vPms-6+nV? z9mkg>#$m~veKCJU*rl}2Dr0^wQOFg+A%IkYC_&H6BO3$yVi{(9gv=uX@mf8qGI&{p z+JL(e8DIwgp(;<0dZ**z=?Knd5S{j>=yWve&j<5pfCdqogroVO*N5ZT>9jW*Pltoi zFoY*))}KVPlQ5c1!+L52c1}^|&{1A*P?qs+OxRnzg*FYf%~h-l0c6bx4Ph*Ml27bk zH4FcZi@GQR5d26o{15(a%&i`9u3l7d3d^#VNled;pHWJ{_G1>)B6V|28BGhWF@QHf z>_X<`p+V5oJTx2hhXXh}8NumfHa$I!LU?*Q4o`d02+hXR$#~u$4kpu4?_@qb9gj!- z844%U-h4h7gdrN9G$2be5?9u^%~H!ts?lS5xPzmLSTqk0Txd14$lY#uNrXnrH_?Fe zo#EZqEtN7Wx7OLVPQN z)7q(S347E?L1_S2igJ;l^H}E_qKF+w5Uof;5i4W#d)HLdsp_3>Uw+>^OzwtFdR3Hh z*r!7o60yXbB(5ra0JnXP-0Mxe>>_>1ha67Xg)9c;0-)|bl=!!=StU9^{!CDGAw^RMl3w$Eh*@N6--l3){9HtIzv>w%AX5a^XWVcqo}LU zcNr0$6U4%sKf!WG<;wFR1fJmO(VfcjlA3 z6DmX$O<{=iT8C>!R*>OPMAKXdg@y`^Cb#*dBUwZa7|_HetTaVQBq7V#aDlYILi3n| z{7v}~T;}nRYkg_iR@XFr1+zS+DCK)8IG4HW;Tkmdn?Zgk>EQ~%)#2DubxJ@*2> zdM0%#HVT2~h2Zjtt33%}fQx7yXaBb+pda){-Ch$!I)26{2lakNRponmL?K$|*Q=GB zz*HW_wZJMa#5Kk$S~te3z7(l@Yg7QUt&H2zA+tG>Tu7p53{b_{z3k&MaSIyQr!xKbeAmfDqUr=_+$Uc-qjfk=<| z`r-c}76w6Z7=RZ-56ciIW+e@Bn1H?paAYVQf@YG$+v2f!3ubpH0#FBzZyn^bxXKd6 zK78}?I^TWsA^4uKr3&SHrORMTwT=rIl|w>bk#q5Tsibo+Z>NzBIsF5oht{>g6?Wx~9m8 z;o=>5`n?Ni>W4{poZzouF_wnTNyaq~9OT!cjjOjv_c1_QFwb z07oa|@h*b24WJCPd?G!mg}T|3(2bWo8CwT#~&pu_~T-#M-hp$KCv9GK1}V4-QT0@Qn53A`EZ3cekS zVHOVIcrqJ={nIfV%|;;_hm+}i)(Z!{)A{hEH=K+IeKd=P{Yf+*z-cr&nT-bH*=aaB znGJi*sM1Tq^1<#}5N6{~+a4PpzUDEm24;2c=%ZF&#wycV4a=iG(EF@D6P?&ieW2BS zgo_yBl}kB%F&BQEw=hu`okeDs1n3umsF{0I=#I)~mOsDz`NFog3|ZwMXil;aRg41} zuqB@9<9w01PCyrEf8m-!B17PXo}yiNnbu}K2*oKvCAd-b{uiO%SfPU|T2>hYwyF?V zPW0R3zjD%kC-dLg68$b;{M+qO?xkV`eB1q2oqA9c`fSbY`84hjc!%zu^?Zrai!DPi z5`l0IuGGsN&&^I%!axCs(dEjz7YoJzC~?B+>FINvM0MVVv&>w3=S>7XK zO|V^kvkE=Aj8uh7Hn5W$<*;AOh4+&)LihFvMB4%N<4Fv4Q$ftRx9ES;sLq(yFz1 z_*Tk+iJMg7y1G8Xa`eDI{Og%-LB3IzVn~v|>#PsLh`zNX*=?YBkn0Q((DkeO%Ac}6O3oQQN#9tx{xzv(8_hrU$_ESgtNeb0(QoJZ=%Kn z1i+zs;p6Saz_vOil%o4sCGu5AekN(+L@+{|MhudRBssH+l6?qyq-!zz zDe~P%iO^<`YbdoCsviG;;tdohrS1jS>3G(g+6H&7Ho?#^UW@s?)m^;x)8SYs+WT8t zCxV1lt0YH45xX=}#5>mHx%RpXWyQ=VFORCjC3&03#MYu#o)eYaj2kombx}n8Vb(xF zU(TqChR?Df9O%C6bzuFm>o@2UkOpz{-2k!;&3_zeQK zO6L?jzB>P@JA>gJilqB;OBq@nnpU)!JLM|TAeWE<{+2o*6$NK$>M351hLL=+1^K=n$EXq7&O zR{rZjd(XL$R%n$HnYlrYn+vyV2K7XJLDMKm{bDCk)(!Rt;C*3hSCRYWFJ4XPmpt*= z+I!3V3!L|Co%~5wydw5Xo%&C{r*e;%OHvY@@4jMax7zb+p-!EXlIW%H)*pvr-`}ge z)&2^g0pi-91>yF6XHK7Ub-Hslo}3)%Zx^DdhCFcZoOND{QVu_1x`HfRc8)rt!h`vq z_~8vjnfh)fc^B=9dpC9jkR}dj>h#=S<{i)_(d*7)D^1mjgew_bGz&8n$yk~4dk+^M zR3NPllrSp7*ThPcfbAD9VW4t{N|dp*h?Xc`-Hq0Ts(RWH1^J$1sGW;qatCnGD0>WPEZuhEX&e?xre_lE^R- ztEn!MR<$HEB5*6`=1klQyj9utCG;hUBdTHP+h0mA zDM5AhqkKBsxw*LH7&W8 z7mcUrygBYiK$V=Fs;9gBi?^NQ#(VHth2C^ zuSKLDqMft%oiJT@&N`!Buea(Pb)-kDbJjU|jyoTZIx3viXxX>hje9@g&c~0YH&El$ zv9J^z%T!0ybJajYs6DH`>*UB)zp(xiOQj)G?DQ{H!{A#4y zB*h*mF$Um!1faO`DBO}v6znka{P3L#C1JKrne@x4o%KjnG+)ON5ElwX7{UfqtZu5q zWIH3#RwCE4Xq@(|M4fXSt39+PyXWoujwq&Znc)qN(E>fAA&dnFcFx4oJ?fZAclgX! zv-cczQvH6Ezot($uLxm3U-tN;f73h1* zCZWDG0=7O`6_%-7}(Y@EzVwvxiFGSCv}zN5TkEUg=50e#;A zmzT|JKqe$Ym!2ExR%Al}`X0tG2~j4N{wv*1PXX6v?;*cRo(_n^6G>@# zCk|`-=DTTsqX#CDsqboGw7hXG;O@9??Y(WSi16LEmYnFlYVGd=VI&m98~QLe!({db z4pp}abY(zO*x&NDw@32-YyQX0#pSJ-?%Ov{FK+`NZ94vgvhGs&HUSXaTwLaiz@IJ< zD^@B_7|Qtid2{trJQeHONIzBADF(9zV!JrED1c(LFPYI1p3hNci6=1tqF6DLRY`PO zD)B@ZjJE~ATX7#lC-_$8qRC%cJgMlRLi8IpWa(`1HWh%yB#6t~YA5AG6e)qD_hFUZ z-;{sCSoLv*eaz$*fX0c_4mnuG(Q?I5D+Tx-ISO{H8V$eU!lC|qulXjFyAkrXWhm9_ zD@q}MacLbVn^IEcs-tHr-1RXRt}`WE505NadjxWLM}^Ea$T-)Ue68*2Q2Xuo_fB}5 zuX;adm5b0DH-?d@8O`V1SjZY+5k;nL7zYYZUizC#_?rz|+8KeaP(+a|B&!HkY4(nQ ztia8`E1`uV<*s37PP05EjzM6{HCU_iaj-IfgP4h6k--pMq6~{eVUk2<#@C(*q11L7 zPPl$8n&{)?1ffW(g`rzGlb`p1v* z91(}VRXVid_TU2f!ZmHRO?VO^Q)Z)>2vw1z_{G-1zojNNps?jN8s27@F_Z)k(D!b? zruW_yYcGn-yvQptRLRq28+>o2rX>t574vVXxDdM>JC)OfOOQ2V*E3q)>Tb_qudXLkPPPMi)rj?jpp z7YurXe($tD%2P>1)8TZ`pPfu6C#SGK8=Zuc(aC%`n}?^-EIOH;oc1UE)6+@6H}6H0 zus0H6yP2}QyCgGYtWlAAgkjNTp`{58hO9av^){-onB)qngu-vMxV z%rd;$1|g*#Vb472F!YWci|-kVpL8hO#)vKvVjXb&H&I}_s07ZxK6>;BT!%2>LS-E@ zdT?-X@BzFc;3rHiY0o#4brR`3%Uocdb$5L}2#iH$HI4BpV)ESAeB`9&pFMA1KVLsz XKVLte`uYC@00960zZbob0FVa&U5exq literal 0 HcmV?d00001 diff --git a/stable/paperless-ng/1.0.0/helm-values.md b/stable/paperless-ng/1.0.0/helm-values.md new file mode 100644 index 00000000000..8b4fd8e4190 --- /dev/null +++ b/stable/paperless-ng/1.0.0/helm-values.md @@ -0,0 +1,61 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.PAPERLESS_CONSUMPTION_DIR | string | `"/consume/"` | | +| env.PAPERLESS_DATA_DIR | string | `"/config/"` | | +| env.PAPERLESS_MEDIA_ROOT | string | `"/media/"` | | +| env.PAPERLESS_STATICDIR | string | `"/static/"` | | +| env.PUID | int | `568` | | +| envTpl.PAPERLESS_DBNAME | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | +| envTpl.PAPERLESS_DBPORT | string | `"5432"` | | +| envTpl.PAPERLESS_DBUSER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| envTpl.PAPERLESS_TIME_ZONE | string | `"{{ .Values.env.TZ }}"` | | +| envTpl.USERMAP_GID | string | `"{{ .Values.env.PGID }}"` | | +| envTpl.USERMAP_UID | string | `"{{ .Values.env.PUID }}"` | | +| envValueFrom.PAPERLESS_DBHOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.PAPERLESS_DBHOST.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.PAPERLESS_DBPASS.secretKeyRef.key | string | `"postgresql-password"` | | +| envValueFrom.PAPERLESS_DBPASS.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.PAPERLESS_REDIS.secretKeyRef.key | string | `"url"` | | +| envValueFrom.PAPERLESS_REDIS.secretKeyRef.name | string | `"rediscreds"` | | +| envValueFrom.PAPERLESS_SECRET_KEY.secretKeyRef.key | string | `"PAPERLESS_SECRET_KEY"` | | +| envValueFrom.PAPERLESS_SECRET_KEY.secretKeyRef.name | string | `"paperlessng-secrets"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/paperless-ng"` | | +| image.tag | string | `"v1.5.0@sha256:aef66d1bd436e237d0f6eb87dc5c0efe437b9ebcb4f20383dc36c165308df755"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| persistence.consume.enabled | bool | `true` | | +| persistence.consume.mountPath | string | `"/consume"` | | +| persistence.media.enabled | bool | `true` | | +| persistence.media.mountPath | string | `"/media"` | | +| persistence.static.enabled | bool | `true` | | +| persistence.static.mountPath | string | `"/static"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql.enabled | bool | `true` | | +| postgresql.existingSecret | string | `"dbcreds"` | | +| postgresql.postgresqlDatabase | string | `"paperless-ng"` | | +| postgresql.postgresqlUsername | string | `"paperless-ng"` | | +| redis.enabled | bool | `true` | | +| redis.existingSecret | string | `"rediscreds"` | | +| redis.redisUsername | string | `"paperless-ng"` | | +| secret.PAPERLESS_ADMIN_MAIL | string | `"admin@admin.com"` | | +| secret.PAPERLESS_ADMIN_PASSWORD | string | `"admin"` | | +| secret.PAPERLESS_ADMIN_USER | string | `"admin"` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `10140` | | +| service.main.ports.main.targetPort | int | `8000` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/paperless-ng/1.0.0/ix_values.yaml b/stable/paperless-ng/1.0.0/ix_values.yaml new file mode 100644 index 00000000000..d088d06c552 --- /dev/null +++ b/stable/paperless-ng/1.0.0/ix_values.yaml @@ -0,0 +1,82 @@ +image: + repository: tccr.io/truecharts/paperless-ng + pullPolicy: IfNotPresent + tag: v1.5.0@sha256:aef66d1bd436e237d0f6eb87dc5c0efe437b9ebcb4f20383dc36c165308df755 + +securityContext: + runAsNonRoot: false + readOnlyRootFilesystem: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +secret: + PAPERLESS_ADMIN_USER: "admin" + PAPERLESS_ADMIN_PASSWORD: "admin" + PAPERLESS_ADMIN_MAIL: "admin@admin.com" + +env: + PUID: 568 + PAPERLESS_DATA_DIR: "/config/" + PAPERLESS_STATICDIR: "/static/" + PAPERLESS_CONSUMPTION_DIR: "/consume/" + PAPERLESS_MEDIA_ROOT: "/media/" + +envTpl: + USERMAP_UID: "{{ .Values.env.PUID }}" + USERMAP_GID: "{{ .Values.env.PGID }}" + PAPERLESS_TIME_ZONE: "{{ .Values.env.TZ }}" + PAPERLESS_DBNAME: "{{ .Values.postgresql.postgresqlDatabase }}" + PAPERLESS_DBUSER: "{{ .Values.postgresql.postgresqlUsername }}" + PAPERLESS_DBPORT: "5432" + +envValueFrom: + PAPERLESS_DBPASS: + secretKeyRef: + name: dbcreds + key: postgresql-password + PAPERLESS_DBHOST: + secretKeyRef: + name: dbcreds + key: plainhost + PAPERLESS_SECRET_KEY: + secretKeyRef: + name: paperlessng-secrets + key: PAPERLESS_SECRET_KEY + PAPERLESS_REDIS: + secretKeyRef: + name: rediscreds + key: url + +service: + main: + ports: + main: + targetPort: 8000 + port: 10140 + +persistence: + config: + enabled: true + mountPath: "/config" + consume: + enabled: true + mountPath: "/consume" + static: + enabled: true + mountPath: "/static" + media: + enabled: true + mountPath: "/media" + +redis: + enabled: true + existingSecret: "rediscreds" + redisUsername: paperless-ng + +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: paperless-ng + postgresqlDatabase: paperless-ng diff --git a/stable/paperless-ng/1.0.0/questions.yaml b/stable/paperless-ng/1.0.0/questions.yaml new file mode 100644 index 00000000000..77014238b16 --- /dev/null +++ b/stable/paperless-ng/1.0.0/questions.yaml @@ -0,0 +1,2397 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + + - variable: controller + group: "Controller" + label: "" + schema: + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: argItem + label: "Arg" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: secret + group: "Container Configuration" + label: "Image Secrets" + schema: + type: dict + attrs: + - variable: PAPERLESS_ADMIN_USER + label: "PAPERLESS_ADMIN_USER (First Install Only)" + schema: + type: string + required: true + default: "" + - variable: PAPERLESS_ADMIN_PASSWORD + label: "PAPERLESS_ADMIN_PASSWORD (First Install Only)" + schema: + type: string + required: true + private: true + default: "" + - variable: PAPERLESS_ADMIN_MAIL + label: "PAPERLESS_ADMIN_MAIL (First Install Only)" + schema: + type: string + default: "" + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: PUID + label: "PUID" + description: "Sets the PUID env var" + schema: + type: int + required: true + default: 568 + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10140 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8000 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "This is where paperless stores all its data (search index, classification model, etc)" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "/config" + hidden: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: static + label: "App Static Storage" + description: "This is where all static files created using “collectstatic” manager command are stored." + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "/static" + hidden: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: consume + label: "App Data Storage" + description: "This where your documents should go to be consumed." + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "/consume" + hidden: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: media + label: "App Media Storage" + description: "This is where your documents and thumbnails are stored." + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "/media" + hidden: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Advanced Request minimum resources required" + schema: + type: dict + attrs: + - variable: cpu + label: "CPU" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "Memory RAM" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + + + - variable: addons + group: "Addons" + label: "" + schema: + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + type: dict + attrs: + - variable: codeserver + label: "" + schema: + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/paperless-ng/1.0.0/security.md b/stable/paperless-ng/1.0.0/security.md new file mode 100644 index 00000000000..12472c939c4 --- /dev/null +++ b/stable/paperless-ng/1.0.0/security.md @@ -0,0 +1,1259 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: paperless-ng/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |