From 6f9f071e91d9a0bbbb6607f5ee1764f8bde5e103 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sat, 26 Mar 2022 16:14:45 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/filerun/0.0.1/CHANGELOG.md | 10 + .../filerun/0.0.1}/CONFIG.md | 0 incubator/filerun/0.0.1/Chart.lock | 9 + incubator/filerun/0.0.1/Chart.yaml | 31 + incubator/filerun/0.0.1/README.md | 39 + incubator/filerun/0.0.1/app-readme.md | 3 + .../filerun/0.0.1}/charts/common-9.1.15.tgz | Bin .../filerun/0.0.1/charts/mariadb-2.0.11.tgz | Bin 0 -> 74232 bytes incubator/filerun/0.0.1/helm-values.md | 39 + incubator/filerun/0.0.1/ix_values.yaml | 48 + incubator/filerun/0.0.1/questions.yaml | 2567 +++++++++++++++++ incubator/filerun/0.0.1/security.md | 2408 ++++++++++++++++ incubator/filerun/0.0.1/templates/common.yaml | 1 + .../filerun/0.0.1}/values.yaml | 0 incubator/filerun/item.yaml | 4 + .../snipe-it/2.0.4/charts/mariadb-2.0.7.tgz | Bin 74685 -> 0 bytes stable/snipe-it/{2.0.4 => 2.0.5}/CHANGELOG.md | 26 +- stable/snipe-it/2.0.5/CONFIG.md | 7 + stable/snipe-it/{2.0.4 => 2.0.5}/Chart.lock | 6 +- stable/snipe-it/{2.0.4 => 2.0.5}/Chart.yaml | 4 +- stable/snipe-it/{2.0.4 => 2.0.5}/README.md | 2 +- .../snipe-it/{2.0.4 => 2.0.5}/app-readme.md | 0 .../snipe-it/2.0.5/charts/common-9.1.15.tgz | Bin 0 -> 43530 bytes .../snipe-it/2.0.5/charts/mariadb-2.0.11.tgz | Bin 0 -> 74232 bytes .../{2.0.4 => 2.0.5}/charts/redis-2.0.6.tgz | Bin .../snipe-it/{2.0.4 => 2.0.5}/helm-values.md | 3 + .../snipe-it/{2.0.4 => 2.0.5}/ix_values.yaml | 9 +- .../snipe-it/{2.0.4 => 2.0.5}/questions.yaml | 0 stable/snipe-it/{2.0.4 => 2.0.5}/security.md | 74 +- .../{2.0.4 => 2.0.5}/templates/_secrets.tpl | 0 .../{2.0.4 => 2.0.5}/templates/common.yaml | 0 stable/snipe-it/2.0.5/values.yaml | 0 32 files changed, 5210 insertions(+), 80 deletions(-) create mode 100644 incubator/filerun/0.0.1/CHANGELOG.md rename {stable/snipe-it/2.0.4 => incubator/filerun/0.0.1}/CONFIG.md (100%) create mode 100644 incubator/filerun/0.0.1/Chart.lock create mode 100644 incubator/filerun/0.0.1/Chart.yaml create mode 100644 incubator/filerun/0.0.1/README.md create mode 100644 incubator/filerun/0.0.1/app-readme.md rename {stable/snipe-it/2.0.4 => incubator/filerun/0.0.1}/charts/common-9.1.15.tgz (100%) create mode 100644 incubator/filerun/0.0.1/charts/mariadb-2.0.11.tgz create mode 100644 incubator/filerun/0.0.1/helm-values.md create mode 100644 incubator/filerun/0.0.1/ix_values.yaml create mode 100644 incubator/filerun/0.0.1/questions.yaml create mode 100644 incubator/filerun/0.0.1/security.md create mode 100644 incubator/filerun/0.0.1/templates/common.yaml rename {stable/snipe-it/2.0.4 => incubator/filerun/0.0.1}/values.yaml (100%) create mode 100644 incubator/filerun/item.yaml delete mode 100644 stable/snipe-it/2.0.4/charts/mariadb-2.0.7.tgz rename stable/snipe-it/{2.0.4 => 2.0.5}/CHANGELOG.md (82%) create mode 100644 stable/snipe-it/2.0.5/CONFIG.md rename stable/snipe-it/{2.0.4 => 2.0.5}/Chart.lock (60%) rename stable/snipe-it/{2.0.4 => 2.0.5}/Chart.yaml (96%) rename stable/snipe-it/{2.0.4 => 2.0.5}/README.md (96%) rename stable/snipe-it/{2.0.4 => 2.0.5}/app-readme.md (100%) create mode 100644 stable/snipe-it/2.0.5/charts/common-9.1.15.tgz create mode 100644 stable/snipe-it/2.0.5/charts/mariadb-2.0.11.tgz rename stable/snipe-it/{2.0.4 => 2.0.5}/charts/redis-2.0.6.tgz (100%) rename stable/snipe-it/{2.0.4 => 2.0.5}/helm-values.md (96%) rename stable/snipe-it/{2.0.4 => 2.0.5}/ix_values.yaml (94%) rename stable/snipe-it/{2.0.4 => 2.0.5}/questions.yaml (100%) rename stable/snipe-it/{2.0.4 => 2.0.5}/security.md (93%) rename stable/snipe-it/{2.0.4 => 2.0.5}/templates/_secrets.tpl (100%) rename stable/snipe-it/{2.0.4 => 2.0.5}/templates/common.yaml (100%) create mode 100644 stable/snipe-it/2.0.5/values.yaml diff --git a/incubator/filerun/0.0.1/CHANGELOG.md b/incubator/filerun/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..5eb9b764afc --- /dev/null +++ b/incubator/filerun/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### filerun-0.0.1 (2022-03-26) + +#### Feat + +* Add filerun ([#2242](https://github.com/truecharts/apps/issues/2242)) + diff --git a/stable/snipe-it/2.0.4/CONFIG.md b/incubator/filerun/0.0.1/CONFIG.md similarity index 100% rename from stable/snipe-it/2.0.4/CONFIG.md rename to incubator/filerun/0.0.1/CONFIG.md diff --git a/incubator/filerun/0.0.1/Chart.lock b/incubator/filerun/0.0.1/Chart.lock new file mode 100644 index 00000000000..8bf4c48a08f --- /dev/null +++ b/incubator/filerun/0.0.1/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.1.15 +- name: mariadb + repository: https://truecharts.org/ + version: 2.0.11 +digest: sha256:c39ba04e741e8ad8a0683d6816c0e32fbd445c0f097347d102b61ed6ef3066da +generated: "2022-03-26T16:09:05.977910339Z" diff --git a/incubator/filerun/0.0.1/Chart.yaml b/incubator/filerun/0.0.1/Chart.yaml new file mode 100644 index 00000000000..26e39d05abf --- /dev/null +++ b/incubator/filerun/0.0.1/Chart.yaml @@ -0,0 +1,31 @@ +apiVersion: v2 +appVersion: "latest" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 9.1.15 +- condition: mariadb.enabled + name: mariadb + repository: https://truecharts.org/ + version: 2.0.11 +description: FileRun is a full featured web based file manager with an easy to use user interface +home: https://github.com/truecharts/apps/tree/master/charts/stable/filerun +icon: https://truecharts.org/_static/img/appicons/filerun.png +keywords: +- filerun +- file +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: filerun +sources: +- https://hub.docker.com/r/filerun/filerun +- https://github.com/filerun/docker +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/filerun/0.0.1/README.md b/incubator/filerun/0.0.1/README.md new file mode 100644 index 00000000000..c52564af578 --- /dev/null +++ b/incubator/filerun/0.0.1/README.md @@ -0,0 +1,39 @@ +# Introduction + +FileRun is a full featured web based file manager with an easy to use user interface + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 9.1.15 | +| https://truecharts.org/ | mariadb | 2.0.11 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/filerun/0.0.1/app-readme.md b/incubator/filerun/0.0.1/app-readme.md new file mode 100644 index 00000000000..b30be18b066 --- /dev/null +++ b/incubator/filerun/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +FileRun is a full featured web based file manager with an easy to use user interface + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/snipe-it/2.0.4/charts/common-9.1.15.tgz b/incubator/filerun/0.0.1/charts/common-9.1.15.tgz similarity index 100% rename from stable/snipe-it/2.0.4/charts/common-9.1.15.tgz rename to incubator/filerun/0.0.1/charts/common-9.1.15.tgz diff --git a/incubator/filerun/0.0.1/charts/mariadb-2.0.11.tgz b/incubator/filerun/0.0.1/charts/mariadb-2.0.11.tgz new file mode 100644 index 0000000000000000000000000000000000000000..031ebaef1f5a7fd2ef90d0c1321fa5971ebb1c59 GIT binary patch literal 74232 zcmV)~KzhF)iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0POwycH20zHw^E;brsynGkcPrCJBINPp4-b+ew@_vEx$?z30n- zBqVW6k!*srZNQ$InC+U{fnjS|&6{>(j;fKPZW;k@PZHjwS z97e(|p1J?E@ecq1sItud9{^DOe<&;Hzo3kuCL=|L@_zw{6ixjv4s2eO`0zZs)xChD450;BrIKmS@ zbO_zyzKl4I<9N=-5jHU;%cUnFw#g26F~Wg!NkZ!Q-VS$-MmPwHe?lN=f;6&8Ks=jx zR>FG3a~__N9nSJ+Gv6C=Tu1_+I*}jV?r_s63h0g~E>}pB;{F?VYjR%y`>SE38Sf> z2${<>aiVE#3YI@Bi6-J8pkfpfBF-?4NGQ@MsaDK}FRY7KhdPeEYX=w5=Kc` zno|maHyK@#+Z#W$S(D`)d2V(~e|1Ntp5eLVi>ufqMZ5p`=O<8rssMQK=g|y1UW6Tw zgp3oJVaMI!9B=IZeW{hxo;eR=!aNBbaa+$nw1?^j(*PiJT8P zp6AX;#6?rW&41#O30z>mUt-s>IiDds%Hfc3HVIt+c1FDDN6yA%=6jSxoF8%tkRs#Q zrG$ykFu>w>thzVx%p@V_k2#xACnPo(_%=-&Ex`+Phl4Gm#Q}r79E}n$Ho0X*pZOuT zU&uv&d<7I zaIQ0RB4!2Y4=>X1kCLx#i0}3?)hFsK1b=;#rCo1-k$n?^vrQdx)Ryp#@MA~G#UlIeO5yid%N^`=*Phh z2S%f7-;HNv&&AH{oXi3jM}&!)EEiG{iI?~Y|Vc7<(H6*|M8DUIj%?+BB4hjLKEL(`xX@=Os}Yz(-J=LZ9W-T zY*AAB-gT~tM=0f!mT=f#iCd52fDe-DsrY#Gko$XP=&4l@&LpmXGfE2-9e$Lt;({8v zlQQ*OI4+l=WO@gz!I(R67uYs5XUTy$G+B85Gx_PCoHOQb{g}IP=rsA32E=m4x5;-Q z=ihh*^OJ(N71PL{Rau`;2_xpl4smTRYe~uk%zVYz57|F+B^Ou=8LPuo9!gwdMa1U* zS+4G%Kc?cRbxeKNra4E)V}mPkq~$hQ;N8@`9FsgBE9CS1Z;ruL?Ah}#IF9E;)A2+T z)9J#uJh2x3{UG)t$K^ynhzbKv;{(N16lp?A`I{e%dsYQM@9zr(~QrRw~k; z|MMU25f=q6CtRj$$HiK>|HD1zz7$sRh;uy4jcvj`NP`PP!iEat*maY?9&iHpnEUOw zKWCL(k=q^aL8cfVWLiBa33_^beEw}pn>2b!8{_VGIFzxsMSswqX6TQ#zuWHNVA8q%4@8z?w2Mb46j%V+1>6|#4kqGCj|8yFy z@fOPy<8Qwut6^*sH(Sj7=Rf=sS^9fY{0rwfo=v=nlT*^lmUKdW<3!V9+AIB@5~O7! z{{x=6bqteViDxJONJD(b0sb{6qg=Nt%3yjvs!p>xvMRxZ2V@pRw+|R}Fjbj&7Wakw zHTENtR$L1R>baM(Tjv@!(Es`P7pBCWrSZNEa9#YY8vlw`J^vvAu-*T=m(N4)1V<4G zJr*y>0=_p>;&Eo|xVGa>xBy#MctWT!ddQt8>$L1V2<7OMxGpzweUqEv$eKFd($hnS3gpsg+ z_USD0Lo#~E?J*C+UGAN6wiD8kFmWQ0{WleVB$)pWMfTtPi|Is6{*(WcUVGx4k%_IV zIN-*POX%naf!+k89|RL$jeZcKSupzH|BfDVmpF9%m~w~v2XrI^q5m&pMI*tn2^Q0G zq5rRua7``WCJFE3cW(|(&lpp-LVi^QH%IAD-w3!W_Wxh(zIlFdbo^YH*_*DTef%r( z^8O!^HLxB3_wjki?M<;aA+A69$qauUjYdCVHrYQZmb2;kmj^%pB;ub(4H%p>ty+}0Efi^r<4>3g0RTzG52V`!~b}cRQHg3=6oKFe&C{z9mX0vpScINV{@J# zabw4`Ir2G3qe>6>2b|;Cj)fyX1VD(o;}edN#u4Jm2GI_+Po&iqTJP#d!R9HSflTF`C+?n;3P? zqF0*5D7Ok~YLx`VaEx_!h9$9>YeRs7-YC4@B)mRYc&#G5UKSoy?D`#cA~r`jo)e|r zhtz)Ehtw9U)tdCv2J5F*^wVnf>uR!V7@pdsTek+R(@m-9rj~SrT7Sb+(=G+5UzY;Z z(xpn1+TFZeo!W9mZKaditzHNk-9}KZGc@!rUMS<;Z-_vnZHUNC?I{m#PpQ(La=AT~ z{$?bnYU|x5nnG)jj8M*gA)!CY`&D&srQ)(HWI=1_L|> zO4SDa=5Pp%Ht5obTn4MXgx)%--P+Ya?l-D|+%~Ek(b_Pu29t@d3QNjh4Mg%cya~N~`M0Eeo8GmMEd6D;-l(d#RMs2zwslnisqX#OsY&@Z-D{y) z`panC>8}y&cm2588I|^0kuIg>NH{v&SIDS*B_)XP1>E7Pw9gT3VcN=b1 z8}XYu9KWem{HB)i8&C)Ic{-=*O3yx5ItQ(wuJrUFN~;fP#D?l{Y^YYTp<2dtv$^iDd%Ma#?Nx5I*GBBA4#%Eq6?>{>>^W?m1$C*XZuarReWei-cHGUa)w_xb6{Dwo&LZyle6}6M@?S0;{Gv<10ZF)E2wvO?#!>-HOjup|Yx_+SrO=$})D2*^q z84lx=DvVR)QZqwiSToB#n^}f!dN;y2WjKsesxVHG%6j)-VoL&S)}Rr_DZ^o$QiX9! z8O9Ae;Q%$%(;=dCv1qvjdz|ZM2v9>k4Ii}{ej@_xIGk&nuZjSbG6IDC_sFDdy{&aT zKv?JwOFo9+D5;Bl4tz>D3kTSATqkk}JbRxe8B} zGCYO-VHy%(rh8AA2HIen+z3%SuE1+`uR>JWSXcMVwECU7O3JtC-Uw0U;Sg1>LR7g7 zQDJ|m1_ZTPgGR6^4+ooa6>Q37usJa3tm^%&R@Garwh?G{JZ@5}cNJ*L>IU@gxRYP# zt+fG7xe;i}!-1w;1)6dhXoCJ5OCSrjt3A=5+KT?G zlyB3!5&g--(VtvJe{zQY68Ajdu!JEXHPs#U^Ux}4_0WyDQ67#PrV$t5$eMCyJPSCJjQx;sr+bJqL+n{o-XD+WXGZ@?Y$rRyGElG;i4 z_94>oa6zHB+6F15Mo1|Qhm=wkQc6l$?`3$w!Y6SsKM>8Cx9NCrya_jTY@2wcxT4ZC zY^`+L(r<30M(imK$DUFZdrES-k$U59LqN?DIH?guO2bj4R7H_e8AUdSklM{#>K8sz zq_)_p)QBLZ;RsTyB1j3f>&^VS<5{uE?y)9}*|UAj&9etw*~CDuNq8Gg9dFXCPa`ty z*le}>RFR=nMuyGtn&RP3jy*cu^2#tXQ3wPz+iO%{zdbhvw(Yq|jnGaS4((7C+DT<- z*FTVB2vB3X%RQl;+zRbbBeX-qp&hD1J7jdyed$O9>+7CN1O>FsSEv!vb&TBC>RW|$ zs0`_v&)h9~E?Mt4E6IA>W-4j~V`w-SLsc+_%3!SKju-PwnH~EcXOnC@=x6G#q?@D-uW!@P05(D9y0tv{=-7f^Y<(0q{hj{3V% z_r{e*$IhzNy}HssQYYOvHhLPhZCqb;420KeTU}ou)U&6Dd&qkj9F0pDG<*qzs!JGD zUc%IDVs)EQd(2*q>NYM;I-U`!Qx{ejC#bwQsoA%>yJ@dUZ`imnfx{Oju(~jTM!Vkq z0n6Qks13q|#>Q`4CBfmVBv@S~!G%>)hgIQlK+vdY<0=UbUnRlnDhbY4NsyNscQ!Jx z(kN?VsI}wfVXdsyP%BhQvZBTi^D0>z5lqL(O|7g|1Ow%=tc}a;8o%YVOfaw!fpmO2 zqgM7R0)bLl_QqJ}qVY>czdZ}dXxp=Zjoi`03T@T&`eoMX?k!7#oWEgB(&~gjZckm6dD=#n!H*k{X(4y2goau;A4tFRT?jKT^-uHGxl~Nl56g zZk`1_Po&5)DPqqqmb|R*I-UV2`c7&Kem5?JhpmG_P2Yj;eV6FU+9ac|6&qA~ZsGg3 z*50*k?sZal|0#2%X>0ad`AAZ-^6C5jb0(s=cl_qr;axob-6j7ARIBfQLm6)0|GtmU zLvF8}V~#sc)8?l3$$s>R6|qU)=lp0&((?$TETNl6h@JdmrRCC-XNd(DrFVmXCZ6v+ zjLDnbGwy6}_vqk9E?^PmG*-e2$07I2k>gz@RWX`FFCw9bUH5iA4Cb~k_~AsHVK2t6 z_%?Q|E1qS}`x64sW5*^`1S;>Q?07az9&^94Vk{RPH%ST!xt6H#4#$x{!x6DL*P#*TkLOv4iyEAirQ^{EyDn>Vk=Rbe zT^tHuAtyjS{!b5f_g^1;mGO^MZ9D$I*5_d|&O+ag*^8Z{(KAdVmczqIto28ZTG&nh zN@hTU>1_@L{D62o_2bYYSi;CY|v)OxT!PoQnz6i1A*8a zri)G@aWtIoxwiuMj&K(C*o*&@7>C%4NH!c(Z@}I7;T26d-~^(0HjiE3%TCvnhng_@ z;fM2rE*ZxO&lz^o;H}M>w`_RE0gXa}XIz%*gK3YwTP~e#(`W??^D{nl>c_5~s1ss` z5}W&FN)`pNA7`SchKpN;9C8>r^% zcX4)0e|7CoKmkhJ7gqgY z+T;1slo{V>bnfS-FrTKX6BEaBcBZpYXDgy2*U10^xH}_*9OHqGxHw zpwWouPST0LB+JsgOos^r`CU6{On&Zg#K+v&327vZ($ug?JO1*{xpJCncs$~{y}4-n z4z>Kyo|m@MFNDcNj4tWP`HOewQJ4@N2gKtr_X``&0|)+y=lRjD>vE^gWExTKlu#00 z6Pru(@Rt1ONtS?UegB`&|B0vMud|e78wLUG^FIU%fYtn8GTi3>xtGtwB69d5v4Auw z-NKxmVBXM4?8LoIlY+6BeH;YtZNS7(ra_aA7m6Owyx-IqjxhZ|&UXf(lKfeuM>_l0x3gylcsKNElv&rA{~{hnaWkl0+{+mu@( zzIGA-^1`7BFgbE&PBdpEC5%o}{%0iO^3vQiEzY@V`3lc;7QbMTO(DQxl%_BL!qF&9 zCh{-bKRw4ycqdHrXj)<~r)5&EMA}vZjl&6P;%<|`^>5jrS!6!LpSg^(jd|?NSFMW; zypsC@>0%u;3UNdxw+m7~SYYuWuOqd@oHWNhT*2a*A0|*UlY{=4*rj8aN8%~5LXt@J zC>v~#8Ms=gPGEe_vc5PYwTzCv{S;s=k&T`e-L58>*ii;+di2W5)?-};QW|C{HEUm@N?I{S{A zFD9BF%>S#j!6L(j+UKR%MIj-GUH8Oy9jnp|hvPSXbP^Iuyr@bOmRFo5n&wMKRSprJ zERtSBAZUX0cRIyLQFpK`8+fcs3dFW1jZLHj4JaBwx@}u%j1)^!09FiBH&k7nP1gWW=Jizv+Cr@nq0v&&Ql{Wa(Zm{-idT{gS4a{oS|TY%Yl|>}Z=YpH8~1!K zBA+86jJ;j@JoMvWK4pM8LFk(#nXP@31y#PVMVU!l|Aza*{qjpl#{ZbFovw-qL(*Zk zZ&5MA^oojB7O^IL;M;t0@UHZ|>s%9$P|AlSSzjlAvGrvf@Tm;qHu)~({2PzU znVzt^>uO8){Oy|R4${*A$xPxd>QKigsk*5Nk_9OHee4j|&JpPX8qANo=5Ap@aDmHq z3@CBaWS##^8!5ZCp5g11`_y;s;`X}Zr9j9ZFX)kRE$LD8b(0RK#KumSek?d`v?B|y zOFcQSuTxjf6&+_Lk}BDNZPMW^`*}rIW?Z^8EM4GP!{vJ&A++kI z3AT?t_coaro;fZ_WA&xR8Dp1{!f$6MiG&$;Jb|VDp8r`|GD$#PNfP03LZXvq!fW4+ zXJpUC&g`7b0v9L#-^LMc>B1F+?6$!Pj;4!~SrI<30D$`r!F|U#{cf)^N>4CvHO1}32LLijS5TH8F3uXT_*;@o|j2RF?L5B$8oIe4){#NOUc~oGjH`1>cJEE?|>)&K<>W-GS$M!Y$tlGvuoBB80 zZuUDjmo5QM$=Z*uYUR!iR{n`j{hLoTHVZrcgo9S`6oz8CqvP@IgQswqar?{G*i$+@rH`Npj)16+s zrrFXD@#0yX0BO^?G1=iB%;QpZRV=sS{)+N*&MTx}W_`Abpd@u3LF*`VQ}MD1g!tE{L0LXFn@_+E{Xx#W-HnW-hR=iIkPkgSGcMhO)@)SyuO*jG@Jl^<9mkJb>NJ z9P`pU+$+a*iy&LN|B*c;$4Vq$dgO-lJyK&Y6%ke`S|dl9WQW^JWAI6ZOcLzb$&~AH zS8R*RwL8g?hv2)3@aTw4uyy;mh}`ewA$hin6QXR5z*$r5O_JK@v+jI;J@_1uF#2s& z`H^9s6yN+ds!Yz6Xx_pMy&D9J=Pef}>LLR82G2+{PFgU|xk1iu^RriZ3oTh-jhuO) zZ;+e`@fvc*1$j4F^BCqJS##pv@-|3V5iwivE{OJqM2Q1S23unCXW50ECYYT4{)j%l zQ^c06!)wsmYwUQr2+e>wSp}c4;{dn0%AD_UH&e$-55!FgcB5%}yeEu3`XlF$Ba-ea z-w^ZSa24ol)w4m{1)b+ZH52fR1yua-w?+rk&@|;wT{E$TO`Y*Af0`$p&RTb9ftuE6 z`gwV6*HUz@exh-cj_IdrFAingvm_0)*w#$fjqE4i%ic*?GQQ={s)kHIZMbGp*ld(b z5>Qu^T{)lUpB2la%=6E}t0RZS$8h_s5R7H`LUY$7K>*&#q=ZuJ3JRMPw4PyK^Tbqz;XU7jb8i9~S!xi>BUzAaBm>OV*Y}S*vz|y|G1Bvc#?F zuKlNrBId2V7_Icf3@7`py)aVq#jMb+XP4FojoTKri-nb8@WN+h(YhMdY86ao7PjRw z?+jMKkKC@8zG$6Y9*w5h<4!L3I4iwh6%u?^+W@FN! z>0^Mz?$evh11C=RmtP(vJ^SEC?!lAfKZS7r_(!7=BxQnS4Hx17#CGCYV-p2zsJYcu+*+u;( z>30(XuAt!NBwwfPV{ezf@x7!i8)YsRx)Ujx#V`ApYy{0GnWY0y)${E=e8@cXSaL=S zWA=_#9;`JlXm&QJrll|FV)SJ>gpiat+|SRG#*~B$Prc#!ilo~*q#6S#I!00TW*yiy zf+i){kBwR+O0aG^+%MhrzjJj!tuo_AO~xzKcu?q(-ucX)necBsZujUY#~U3NgRPxV zny{CQzBE4O#X^!k{XrML#dSroZTlYm?R!5d`}_Rl=YMmbco#1KwVwY~HK>5<`#%y; zwC(xd`}puYKbkr=Ne}x*zQrD)7(JZNS;yBTymrXVX!MiocvsvsB;zL!8XoBQL?awI zmKcT3^{rr0`ha<#Cl3-wBC>yn#C`IBMz=1ZQ$nH#oR~f@Gk*ynf0paa!X9@@XzWI` zc$*K05qHe)Ulhke#QZD|d-ZSTd+ZE5b9ST5<&CoY=lSPL@}JiZUA#APxS#!$J^_;a zc}A`YYlbh}^5@`l;9|#1iI+cLxFg5AqU?IY4qy2!f5Y=T3t#Tk7g_$U;nSn!=nFT0 z&!+@e(q<^P*{icl0ATj7lhC&arR;4c;*x6|5zdJyo1lut0cB-hAM77qyym`eKiMS0 zj!S?3iN>=T4sU-x_#9x*76joZG5?C&<$}ceSMI>(3FS_7oik)MKa?k6#C*^Z6;6RwQq znhTef?^z^>XfZ#Cfp7EqKluC^4=O$k35`O>iirK-=M6LbNyI-Vt-d5MzP1JYYm6ze z*b_TA2gf1g=fQBkV3V1-B+S?w9(G-I?71@APM;5nramRvqa`6>Z#EK}T}E@*7B8`4_BPrI zBX73gLH3@A$G+G-Ix0-Lb^w$$6B51C;+rw}#3CGDG%_$Dz_1Uzu^(EF zH({I@7s>@8xh7sjxqbhPyLK>_udg}sd5U9tU#41skYar=q!J2N5O2yDE!U52VdDD} zm!$7ly8c8A(pN|q%xDfEN?3w7361z5#8%{3gz~wld`MVyo$}bT`Bdz=iQHqQ0}UE> z#w&0Wcm<;DU#GE0bEup~#|8lQ)M!e9+|*bSQ_s#ab{(K*ITR+GTnCkkw0)QAeDK zmx1<#ls&tX)_$*R*5=_z4jro@ijY};*yuLx(7C?X+e6N^2HO*w4(ag=SddA^<6df;MffYKd0;mkKSk}V=e(~N=gQUJM!N1k(xr4BO3EgNlA8T1J!^iaqiI&D;txKS(&o6A zU5ujk%r^P7?yfUP6ZudRS38@yx(O54iX$1tf$RD1S@O$^!{;wLn|2)+%F!v?Ny9Tj z18kMEU?pahBcQ}IZJ&)Te>`S~C~k{$?FsNAx21epF(o!fK3i@~oonLWvK_jNQ>kjU zkC#2bz)hXW^jnFe&CkGpTgNd>Oo{7wWJ5u;oZZmTpmiP%+9pPWzUc5bvt5_D_U~rL z?vLwx_0HC&Z@}6RDDONlpXmBGY4rbaf5`5`Ge5DT$_2A@hk>!rS^v)@`YQ(k03i7p zU;7U8*JIbQqKbF^fB*mg56w0tlC|hJ6F1E-B&5Yl3f=b_H1;q}+Gp^JvtTgLY7yva zwFqpj_N#6HZw+>9up2ShyWis7n(EguRak4P=}oS?vDJe2?*tRDi*Z}SMV-%tp-r3# z`+XYjeZhjQ&2DY>`#}a z5BFKG_6>{fmA3`*V18k4=>d%Vh%EDic(ouKFw#W>UE%kBY$;k2&SezzmmmI-R)syg zg>YPUtdY;240Wx~{uw<6`CGvd|rP=h#KNSOp zi>#%5u-FY8kL+Aa0#pQ)r+Y;Pu_ajt7!V>$V-1g09gc~u*z(vyP*I?Y%`voONU%** zL()y8+PY;}$kG&D`u6I~#?Q`%^V-(m-p{V@=Y6nqe~rLBO8Igr+sE0v06+YYe*MD_ zr8ffJ_}pdedL*1*DjfT-0Itt=i3M-;w!ok8EN(*yA7&Ae^h6e!HOd z3AV2Ar1B_4xgl<|FN;SYl7Ag~G{UY+Z0?eTG|le+%=x_V@8wVS62#JHqfbNZRQ|oP z%jRA8g~LI#*b;k}2Rs50@{*+G$2${)H;r zT%X2a#_Nm(A}X(-x>B@NnPQ75WG8UTjh%h9sKG+r{YaaI@NTaXZ*?8Jo_O}=!z=#i z@Xf`0e)r^@hfr0@8_cWAHdd2%(V`JI=(e(G)0)A=bXq&C4Ib)9Q!C?I5dbd_9o2~~ zCe0kt$PZ`5k)K3pb_Q33iXt1j_!QGApVV}MBWub-$QS30`1$iDB`d!J#*Lj~T@zvE zL?Kxi-_|wp@Qkq0o&51+u@y^)FNcsf3Nvw{X>6v4IA@OMhhoy7?3E)Y5)B2KHpaGw zp>A2gwjhvH)5N-JLftfguF1A!jK_27Hp8z`T-Wj9&w?LfD?53bIGsgRE555MMfWO6 z7~%+v2S;bSJOT*vP}Pi8wKfyARGhdu9AImj_H{H33AP!L7>0FTXG0}-5YRH9EZM+4R7^+=s9FeN zXw^EL4e;&aC+n(lD23&3^`x!vCAOIUz(uG$&&9cHZdWH(Wczo($XIx@ih*`Jj&m_eDjbeVZ;Z17-3hS z4w(^;G8d9vbW45~1A8n|ig`&lkO73iF0F-z(Km||hps?Lx^J@B=#|ySs*;;=ayiR^ zUM?qZ6lTf-D!!Lu+%))=z$HnB<%g_Viw#*wHZ*EiiZvFJGEn+2BnzSy^F=9EmHx@Q z?53sX$DYLo1QdahIRS*0xIB1` zUc9?_`d-z}_Me}eeUSIwKGo3i!QD5>N(t6n0YQL_L2L68<$59@01-?W>3u~gQ8tSZ z2Q2oFgCO$*SEl&l96<@{rE?#x#d<}FJ)hmp7B9};@Cwij9=3;ym&>nL9qL(K{mLN^ zmX!Qw5yQtWNhS&_i2sE>wCwTv(XCOvZ$*hA_O8B6HxRAmcY3qaU|YO)KX^^+jMucy z<27wPyrvDnYnm!`!E2h@?4w*9d)73-cH&CeCaDMwIayzFk3zz-yg9zdnepUtX)^0h zv<6VD_GVX#El}J7#Vt_$T>-@{N*jvOI+05~t6Q@%SDcPmF2BW~y)me6RKunl1fbo5 z|H)LOi3o~v&s~E#;r9+nbwlq6N%N8$grvHmuLDVSqxt+(X$Lk@DEm*kB`g^hk+m^` zh6xNy(t)YNv2KisB4bO@RZF)`)wD_Ne(qpyebF=2R9Rge?M#ae2C>Wi-<4t=5Uaqd z!|6dZaCgkoprlB$3BlN~F(CvIU>E>N#u&>$BM3sB$QT<$*Rcj<2sKSMH0$qwlJ?RK zdtnk|3(tI)4BI8UI|(*{>-7wi!{t@YP#*UUVxOH}?7c%5mv25??0|E|m`&I+xzweUq$| zU=65-U_acOlwYs9Ubr_Y-xZqGLcG{rjm=gOek;(lS9}toJHm$F5i~QFT7Ff@z7Qi> zcWTN?h>;c>9w)1b6m_Fm17b*uzOvS4qJa=Yg|?{^&9+QMwJiVuRwP}+x<1yhtVt%e zh@}t$plOW9(pXU>pkr)V`7xL)JiZ!u0_P5@{tAr{Qxejz)eMc54{Qi?EL%jAO<=<@ zHgpJVVkyAH61E7iFdYd<$y3gW7&a zk^4tx=ak=L1k6Cy1Jr*=lp}RUInrR1qpuF6q{Y@iIaNKnQhci@XY0wfo~*Mct6t*% zLwd66?deq|H+i}P$!neNK+QWDP5u%|irQiE$cnAuR;!KLmEv1?D)SEcqWFgnr~xVfwd_T(eAi zPmrogn(;q)7W_5g@MMO=t2iiG^IcWZ>L&9VsXvZxa7b81teHh?ioFS;H9oQ<(ZF6b zc&O;bb(2l?VgU^NfOs^fDSpfUF@Ht01bY%mKn8mhweGU?TD+RxFIbDUwm~slklp~+ z2=GA3S?lYGS;MP&W+{y;GoJk0aa}CZsekjyj3+F#;n+_MD3=4i-D!rtK9yK_zt^V< zioszDz(ZYK860UQY8=nO@D9pm^i9KmI z_e|TOB!kEsg-KS_6E6-XjN7@am8+`xv5^r8LdS~)2U{U4omhhipu89>Z7a26l{gn9 zZ~_v}u;YsCyG57ut1JQlWV!zO&>$v_f`vC$MHT8gHlgAXi9_N=i@J9yJ$OwfD^TsT zCQHjVS4Tae#3C(S0<`tNH;sAMF>w&_!PP_&!1krq?MtndRn_*T*6;hJR@X62_sX&1 zHjuFmWONE-v|G$Jm{HeYRx$}RjW9_mrq8|8!}G(v-J={o>pTQ&HCgM9D66^G9_pN8 zjXhLDQ9A=;ZkHX!q&)@rw^{KYTbn__%)$H^Ns+ zaPK$5pI%(NyLkTo^6=>G`^$F+#~0cg86EDuIC=SI_u%5>9&UuMl3=y}tbGw!!#K8`nb~HO&65SBCzDXA+Io>~rt*gt99aKDt1&y;DzB>; zGP)zL+xL(SlV$iB9Y#Lz7!9NCHw6?F-`*6^aqQ?w8#w9;%JmIj2XKhhCuChKpE!~D zx8TVn84AM0iT;Y8r0Dmr(Z>yHLB1-Z?cuA+6oY*g;teGAjir}}HsB~URUhIgG__x3VT0y9sJcG)XIc3*Mw9Uk zjV5Eg(bW9(-RiNi^1ZMIitl(dA*BqpdXa5M)6!@HJk%6e-NE0$KyDuZ% z&{_Mc97CuFjpdZI$51X2tg*)|%X0rc=7MO@0v!OA2OZPqlQ#KSu({v0aXd%r|5R%3!v`pPnv8({y zkW>W{d4r8|hawCNFGC)IuHogR?7Fj;0^y)QSBY{Hvlo;H&0er&_Fj%fO`Pb4n2fv} zm6|@WZA(=EF-*y}45$)p%22b2G1d&CYLcXxKmn^FU2Ajy15U({mn5`wNPEqRxYt9R za7f~@Ibr+xAZr@>Gbf&n~MK83H^L0Kh=(zGc4!C8AiXcJHbh}tg+o7p=ME5 zZ6Bk48FUJQb@m#h-k6|7^qp)ZNvH*4;#Xhyb-`6rmSGrouy*Y2WDR3*TsWm3>Y@#!PgJ->@a+YKe_wIg+F`UB%^-$m zWKpgRq#l$*h7vS*qyQ)_Clk8w(UeOv{2B%$A9w+X(e}CkG^hCXKu`OETSB&`YS_|& zObk=U*p?+lF-=`DRDe|sC0!xd)bMybR%8P!#L!h0jFScTznl=S^CrVx)IG2nWLZz@ zg_flgl}KYl8cP<^Ee!w(nUV%nq$0)EA%e0d%d#e8OE$Fr z#%N3|%a$ZdfvN&5Xlk|wR2^fC z?D_k%yKj<}6092vL_pyI0CN9OU_rTlC{Q-EAx9PxvQ2~n3DK|wW!W+egmj=o9RgsO znkf+l5M4oIQ#K64925%d%KUpcTnu;!05UedN+0;vhm^hbAxZ1M8&cu5xf2yhgROC- zA|W4orXr#3cc`MESRt>?+cJWAhqp7c@gZ&fq{P3Op{P^(g>4)=Irw7`} z$kxg2XBsFX|Lq>%ISyQUFGCRm9;(f#Xds!kkxjj1mDRKNh!S()%!Wi66Gci zndsV}LneC5)@$cuASG~MNRlKQx@O3hO`xq<7FM8cVtcF^iX>qqLnxc-c*tp!0oD8g zkDUM>X=-s_>ML$M3XFUpR$#Qfu)>_;+uL~fwoY5ffSrz0`!BHy%C%h{G!$q& zw9tS{qy_2vepf|k$l<<(>|5Ek{nn2od<&i|6=bag3E#|R#BY4x9PqNHsLM|&uDKew zK09XOn?xGL`yUh4C#sY9;GjCj$f{AV^IMBONA z>Pgq5dh$7NeJ4sO4V2%T=~%e!z~{>Q8>$Xfz2`l&lxD4J7tChJjgyRYkg=*f1PE2L z^{;QOt4A5sL?9&t4T7SJdr>tRRWitPim`9SX+j{=u|-2wkg{-?xTV}?!cBPt4?Vk* zkq)0l~7D z9?WE|wJ|h+1eGB-rpuJgBE$h}$+417Jv0z;7&(?p#8*g_WK}W1-{NTYDIG{p#!5!P zQY9q+OMaXY+lgmSPS4ItB5s)Tz$3E|Kme99+;3pH*W>NmLW<=M>_feQr#f^640)c@}Ir4Q=eH_1u~zSRv>97Wig&WINkTaieTI>3Mi z!VRDh6%C2eCuEJ4N7(hL<3+@EoeA-*6meh2u17*_I<6DleoD90oV{a=Ez!TO+qUgq zZQI7|UTxd9ZF9A4+qSXVwz1l_dHcWj*(WDA_k6j@lggNtnyJ*x$e3@vKa4W>9xrF_ z6g?LzJM!9oV@`S|w02B-gTvlpCkI@MH#Tf|UaCK=Dm_8J6n7G1q@(^pl3~C0m1bhu z)V5|Gp`GKcyw=ROTZj?vWL4Hq>s?=V^LRXe?Y_LOMf#i$&V|L+(&zO0=5KypH2&8E z0WLq_%EiJ6XJT>*`20L>ZXYL}@5bJpexB+R^x=x&N~AVPAJh(Y{45SWEcgPK+q{sS zzo}!2=oOwP+Xi9mzqw`!GcKIiB9Gf7kGtSIXn`heg(kg5$F*$~`vKt=#qZ=I-UeWi z$?cfQ-N3QtN@;Wd+xCC(eQe~SL$JtXb^O8UKZAyEi9(zC(f>w3aDMbCdeUZi^#4WH z$GO1VDyN>!f~f6+sBdEZ>N?ZIQf_w@zSzc3(dz#N{Gzp^h)rGP?W2e;seqPt;?{QJ zZ~t~;TtsneR8iai!B^)$t9{EK;@1Dd&rM9GMT5BYe_`v3DTdSo&e0-+>>=QFxbYG9 zgOB>AnD3~k)E0Tz=6~^F%bwCQM$}sOy8VROl1|k6Uv%cgY?Xv;{$Q;+>MFHy6ufy9 z{4sbCY)uHW5ghj){<>w#L9OwhwXFSWUHjFWDpcQZ9Ty#Bm>`agt`23T`LwNC;4Z(cj6fw04BHV?kzh#2^CDxfQ9fpotj zWu&1Dn}&zc$y8mt*|WlbihymxG;8GcHkNL>7yXX!S(8YyQ&3}@F>twKm;TFqJ7U77q+yWZK&`f4FNQCCklT(v z8BlSi1R?2+=y8rV=8S#Mk#d!banl>SW;@+Ie7zcbT{~=db@y!le%sqReCN2%*#Xon z{I}K8!^6F*B%n>u_4~(m z6d)i-^-@lrddQMVG=NM_C}shBlL&@s)Sat!c`L-G*;+*?X@5JIbPB5xmjjr?9!1 z^Qp?h-^LYsHi|+yIFuFu)+R=j9vrMV^32JS!%Ht?zV&ArC~|50Lb4t_Qmd{FJhGRj zu1(Yu5U)vbhYnf$A2)9+0=0DFu$9vp31KPvjPDXYaP~?gi50p3gDV6$c!!7f=d4Tj zkAngw_2{B|t$z?bAf087lSzdX3E+4~^eT`{f{Pqo#}XO@3ne@4Tl}ZaF)R{aUwl$g zyisDgZcM*H-u5UuE3ahY;$Bs2h|Lmt0;o@Hf@}A>BhYZgvYiuE}NV*oRZ@rp^ z6bQu#=TB-BWs-*smM?1@1z&Kk4$2&yL5{2WdU+xdMaO%u!+fDWwrZCz{DhDTp( z9eUSh_v`)Q!SEWtqs{yNpW*jD3;bm-pXbw)GQWpMUFj9y0{u0?Xid^?Pv*hFi@RJ$ z+amoEiN|&Eoh4>=RxgjAlS8@p>}>nP(^aN%F_={!8`!(SPSJ6~@uf zm8Ew}#En)!Y4?7TRO<{!2x2dZyD4q+S4D!4!S9Bz#iV3L5;}HXT~$=3v)}a)lW}N1 zCe>3Spa!8ZHcAv3Ht7+TT0lTm;vJzbK2-)9iPF}{Qbb^a3s|wm^#$UBBdZPUak{7f zKTR_y)UlSUytCR_C@ZbOY~>#CmaPDr5lC}*|4>o$AKT1|bW+{(^8oRWbA<<`S~6as z^TQHwa?>h~c&Qlwlp@NtItK>?i6SM9pTTroj2KV{QezWb5NaF33x(V|MCt!KS$W@kP;^T0Oqs$VBRW3rF3I7B9|6SL z@v|iK_b$aLMws$QNkm}OjKSD0wwviy=G%YWXdjQRIaud3)81H!b0QJ<6TY|b7E&NG z)m3ergtEiLS5mJs&jLw-bakxUHB@f}Uz-88RaP0^6u%8Fbn1I)cW`;eq*bCIw=0(<~i!+q^M9Q#IL@sas$`KIDB$wk8o7p)Qe9DdTG>Y(cJ z@t#D@oo$AuSZK*TciZ2Q>tZ9@^kgvpPsp9eqy6s`&B#Tq~$ zp&;ZU2oSSZtNhtgNyZJx*N6?UvBze&Kz+7iedR{Jx`&dVsQo`4@-hd zb9#IgyIzkTE$$Wa*5WWy8kj|d1@eaSFot|M-FZT&%OKtcwLC34`_ghYpirC?3ZDT5 z&pITEOsf{>Fm*Lk5-y6VVfq@~C`+lzi9i(sl-~7FBr}|(?6tV+(5W5ZvFV2Q@3d0w zcqD8lw;NzKvm^dKalo@z$8J=)nRcg-JDrx@tfyIPEYopYhXE8sz{LvU$n z=ccFI#m6HY(ZE2MqnAUtH8@nGf>MRNGW*``G&o+Xrc*nZEAeWBWdc+p4isNhkfC*k zD~vu^=j7nvVi39tS1Yq;pBCoC;Xg>zmGSq&)dB{G7>rnu_{?L&QnoE!W`45|BJgik z7Y%9R(jD7u24QFL6nVc0?Qk>}N~*qO8P>n~6>nz#GZOQyu`qhi1dP+x6DrDO^@mZ% z>#a4ExsFk2oZ|C~iOAY~-em}9LE7K+STH9k9;^{;PP{0(M*T28kuXMLX+t?A>fiMJ zk;B9^My*@(xwHt!Urm*OQMTGskYBfoGL9Wb4MG3HqKbTDryK9iRaQVRiw;*RYev|v zo4lP|k}2*rw3>L!bHBDD@iqHv$n1=D94x?j%58%3(WOqiDo6?&hU)rHq%C6FiKfwS z$(NJdPX}kzx~^~UPea;Jc?WGTKNjO#CZyNmlil~Vxz0xiu&V5r?*H)rFDDioGgBK? z&6w{YD$O8jPzxDIgZb<@{$JLzZjdr4@#o1poEt`8Nm&7HxqR(!^tl*nLEz6Jf(2-X zTB8ui*v38=>0#=6{2uiIIaA=79Dt$pv^Y|H zx`Z$?5V*O@O$$OQeL)E64K{;{prLq;sA$M)U0fhs_F}}GWPQLdERl1=5)%TO)wzEl&$^;4eG4@y982Y(u}$Z(q_0Q3x`9@u~}V zOe-xF6Y$Y<_hxb<@Ap=FzLK!m{Kb7cu$E61+scVIdT+G}H;|v```HM0IaWn#b2F{t6dxDf-G_Lp;uihsg?>jw6(m@4#2qw6d8tV)o4eGq~ zTZ(y*0F~f`_2D>lb3@MC&p%RC7AG^}{OVw)kpYB<+wc)c;TG6AzgL|l`0Fq_%~2;a zz+B46#x~3Z6yDu)^D`db~>&nh1cF*hKgwK zHBlkYh{v&{te`slSuhnz8voss63&*z?rIJ@l9WOs+O3>f~Og{AMJB%cZJH5BSQ3*oQ;&t7l1O4mS-LcoL5kK{M#;P zl4IvB5dl?rC9a4D1wF09@Bbp4Tct}|YZ&*=)#b>Pl?fI)}q$X_8vo{UUk2VTg-a4~hJoD0ER_nvFE{vl(?@d@Pzr zvBV7vRRko}vS^3P8rM6*BS!zfprqdP@XrLSL6yk?<3CZ=>;+a;t#8RrYpmiZvMCeK z1{EOx%2jfcw}ucD^)U>|sg^~-z=x&zf>1A1I#S87-}0UufiTI*(Q!!@hM8i%k*kk} zlRa(lX`;@N6`u2KDt?#6vF3}x=YlQO^_)YlWad17!$7TmUrY+gU!dT;_DBsirZQ~b zte;jM+v%o$e>qe8al5nl>6_@#+Y}_b?u@^ai#H|a(3 zs`SXi#scq^o2KnkeHbJ3izqojh2`70HO#dR*2*l4;WDb8oCYF&VJ-KM_#RkM|48*A zGxfTI1#u~|sCLDOo9(}9-tQ#Ul!ubgpvCrbjZQ`=utgs-k`V`+K+k2K^>KA24d&FY zYA9F6J*QEs6HkM2$L~~jwpLIxQAxpY=fJcw;vdYx=U!=B=HU!3(fX==W?)h70ZkG` zB^=Nn0^YWE8FY=G&&>HlgKV~nLZqCh&ez&m@xi@Ro~P$Rjis)0!IkS(&OxDGIdBCt z4IQfDzVF`R2k@e57i_d`-cr%YJ5{w|Z>B(f`;jCfQ2v|BIyP&|mPf}~4IX?BDTW7- zF>Hvmm}WV70{{RZ6e6{I+p~(D)cAsVT3nG0ptyq45V`~rENznC3XV zL9NBss+A_i(<}5%@NB&(R2(q8ycWP`?ko8N9;65>bU8nv>!eOn8LB8InN$=~wE(!? ziVUaBkBhO8Hrq0$d_>j}P$bE#y}P4ck<5084Uze>QV>Gr1cM#Jw_}p2r0?cYOP ztCL26LY*5L-97M*!~kPAq;c_Eb~iz8rT#n~DKq9=1R*~c?|LCkWZ5}1dtPHu#=#nc z%j;h7=EEvMr?Z0JFHZn9+&j4A>uvD98&7Hiw-7YOC>mY^qV{n%3 z&G)iA#h%PxSyVhb(z5Ikr4fSJyLGVW4kcl6GbyXu)o#=9)mDpLX{ z!@SID-8{M`Euv{ zr*&dP((Y_V1UoiQ4(d-51=JVm<=a2fXTnoVcIPG}ZG#`xsi>z7`?SnSV>d4<%GJarW76B}e zkxFC(jvI#fngt;jJYyu#6uz6rGVy4XIi?m6M!cAGC-d;tL_@!3&BCyq9}Cftzm**; z+g7{Jnm`qD|0#D@hxEnbrJiSEwi#LwuXL*icpWQlqiXgyXNyT`mp+$$qI1(_bd4%;w zD6tT1;VsrE3RY!BjsC<>W|#$~-@Dh5J8164w)YfW%jGJ;9xh>l(5SlSCIYmey!(qw zPJa3hqxQW|DvmBLPlJ|e_f`Csi7u|Dj#)R)qKxr@jqkwFskm%4?YlryZ$*@`_=7`( zf1>eJ94%^;NmZIZCHG=o{%Hp(D5tLXtO*Nk7;N=`u_LKb@@NVS6f2s(6*DnP{Rj{! z^RkTu2X%WR$DpJCEDMV4XldLB4l0gvBcUp3za!)Lan%0sad>(7%PT(Cv_MUQsxpC zq#oPtbSLxUX?Lk@OP$@{PaN0A9Jbc-Q$OEq|D*no4Mx8hdmTG_`jy#Q+R5;w+w1A( z`0;kws79zO+3=z3>wqXHSd)}jFQM99T9ks(SUG`!AT%bwHe6)Zd zVtaWogor*NWGs3X#Irsj{Fk5#PzQfzQCw_3S*?-+tCnWx?>Z)C>l~x*y=xs?Q=RO$ z5oOjktX&Q)L&V$AN&LKewt%o6u)5~3pXN6}5G(+zR+;0$brpuKk>w6eGfL{593cDh7U3_LY+l?Ymbh5s(;21|Ahikt&y8 zp_TByxlGw|$BzkZ6_eT`Gj!WwuIejO zRI*};?A;4WNV~6jMtlsWxqH8w2)|8rh9t#;joJ*(W!QELaYD}*`yL>~^cJNhv*Hh% zXvwlmL?L_20P%iY+6Z^(&KpMJ2KG~X^tta?$HrT3$3Zt)Xz|dZ34pP4z97%Ur_?R0Piu;(k%-Murv&3 zMLZ9+Bq;)4*5%%_rQWF_u~t*dH|6r&tt4u|JMnC(O;3rS6L8j93Xl&8wJYnvUo8P< zTXON)+C&uFlsVjR3C0brDAojS;;kZ@5k_dri_E_^lzDckN}pw?lX9!GwP-ow>DgZ+ zntz^0c2jzF#Ye8FxO({=&I@leC4$8h8p($jno@e66BD;@xb*Znt3)^RfWNUohks>e z`Evs;*Whx^oZ1aW#yCr^0Bp|R`sWyn+FMOovw^b>p!h<1BlK`fKw+Btke)7Gy#R)b z-Xpqfn#I`#Rw)h}>&}=UR?vB0Hy1>Y3KLKM-#AasBh2`6ZmiavC06C?i6i?RaO0OB zG*?A;bUXv{bRz%+Wx5I1X8HRlL8YJTdcmddkj9{?=>`~EyFh}yD44L6XpF>7m-NweNa#>de|8K_KG={+l69o zOkz}^8nOw^MSF2#`l`CgNX8zooj6i`*@5P>QXQ309G74lw*GTBE}_!R*vG9hTzOd7 zb6I~8z`B~2#_D4=pHg3S{Fn*aNSO9HGjoBe8BiivcpV2{SB!?lHc zj9?rl>u#>1=PvE%jP2({5)&P3=1O%uJyBC{pKtF|+2o9aSq>!iKX~(uz0>pK8QmVQ zDR?-FX>m97wuzJgeLYISS7W>s2RxC#u}X?Z+AG)sgJ0@)Tjcyj-nqy9IQE=hI9^8P zaMd-`JJ)af#U@M%4JSvO!)1yiBNcqA1}x@##UL)=)S8b~NRB zE3TGE&TSaQh{{1{cjsB3E7Jy0uua z5rd!tpNEBuClV??#RCOq133X%`}~)A{-#(dVP*?=u{$v-#I(|7(Y>D$rW5(>KM|x1)hOJh{Zgg5mqy4{%OfbW0#{D8(I- z45v$FmAw2-qX}Qu@nFUo+OnZYrIxZOY3HH>2$*K< zPENh7HoaUjtAOF?ppH)7sphsBJbMcY#I(~j`di(W9^JbGmE8i7-Lh_G=wBZ(#%CV$ zZ$RP=B93NdlQ!DR=qK={!L5PKH7=|BmI9DcerxUtr!eBZ;_hg7Z z>+@5b-stysD=gsmT5Z!)ziq*=)ARZ?xaKC1Ufaa6HN>|m*%1?{6TF*{{LvHg zD`{zw&i|Pjto6wodAAc*h;DXj_SxpbaHZuZu`~q|w5oiSRd}Sq`Qq2a^DKt2J>^*^ zS|HA5FA^H38&Y7VJN_6FB+<(;Qs4x%(zP0t<*Y6*+7_I9t?=x+3>3mRbd#pyYiJ~1 zl=6x)5ezNtMonZqFdt+_sM%Tzj-lRtHeK+p{GuBrn9SCCCsLLD)h{rP(Z%&ZPN;r? zFeGg_>25b7^R*4TFsd8fki70pq>I$iAhKlJvit}>o<+LM3e!=s{0QxdXJG+GkTN0w zn@lwi_@=M?PBD`6_g!z*qyn1J8=R^)4= z-gM$j>Uirkso!yMYJLr$m#Vj~qYsZuRO`XTaqP93U$^Ma_YR!st@*&09OQ}RX0Do1 z?NU|34NDTHFHRyrIP-^oXq#pGDWY;2v(otTvA;x|Q3_K1VvaapB|Q(?_;p?CDk~{SE+1i^~zSw@RbULj7VNOWrAV zjm3IPP#%KMl&g%)0s!_cXJ2cSQDtO_4%N^oHrp|b^dh4ZxWj1aYP`AuH^!$ZX|}={ zY0JZ*rQcykvi0$7D--jWkaqu&!>lw_0DH%`*2l{C`67%%pquH@jF5k`d%im*@ck-b z1)=Y|9*cJYP726xsQDYH$fy7w!Agl7(O>0Uhp?Spbi=xV*-Poo3Kpa-`wlZvBDnFw`WEQSS*9+jKFu+kcDzM?qB>JSYAY}j^a#t_{+XWrYE|QMH@ar z`9al_jS`GSYGX|d!iAf{)D#Ipe#Pj2Mo7p4GAI|Agzq@7oy1nSY?;_#AsM!(@=nMP ztP_k~v&`D49Wj-sCAKFS80y1m2R-3O_^*h%*wc)c-Xq*Co1>EjhIqSu&md)*`9U&t zj4~s4$}((xJ1y3@xIO3UvL~)uQm%j7A4^8$D?3K9-c-Z2ry6ala0AZTLMy{oVVo<* z-w{-dWk${=5L-Dew74IcOEyOAy1tGSzrUsq%RiqklE0>XpFib>GYNI|((JBvO?0ICecZ;DVxR7hXI%F8&abCy zeA_%fAKtG8yxY7V2jvLqXMEl7FHX1I#x!A6sY96XT&P1Ts?}TCPqZM#?7=`q(c9&+ z@s$BdsIEFT2Zb$&?IprKRUJl(Md^wOlcR|It?}n3-nG!I42ZZdqyToBUNfb^u zMEk1{IQDXkkvX& z#6lR2cjVQEsTlPaF$|SN=w|`BlN}a^+^NB73KwZ#Zn75kl+cGoAc+GJTcmd7Aw9ld z#{s6&M?4yrB>98gdOWd%6seYkei?N|CEfM-GkL)MFXACeIi;SQS)7pye${LyYM2AP zh5Et)P`~MUFbdJXp{nhFBFa$;nCX)!^D7mS$l;}~QBSE|`&TIn9Wh=PkP*gjzgK6D zDTh6Rhq=hpV#a^^mT=y23B>%A9r1;o4ITdUbG(kSK>xEx{*=iY3p&gQ-9w}jTLz)5 zA;ww)yDTsvl)6!YGw9VBctr=SFVhRopF<6@&&~-D*j`F=$z%VhRaWGo zqGQ+Xoyg9Lx5|g9HfU`nQ-If#&Q>0}+MfZ2Z#DSK0o#1ZyN3)s2i$Tdcscvc^U{;w z3PSnfyR~z>nVKORG@p$!0H3annrmiVYEDbW#)HldqNDXE4;+6(5K*$NZ>0OJG7iLp z>1bGE0SJ-rK+nuV*Pn5!KMR42;kJwid$47-B`c&U8CPZiM?aOzyi;qkALeAY-|1#| zEfR8O8@}|YRlwWtZR>F9e4$hTd-?v^46{~1eZ3Kr(AV3+<5L#L|2EScsDeixR9;Pcu;G;1*18t>g5gjx zGsY&bRZo>;l$Zz1|lJKhlww>q~7@JOnrluPYtxa8YG`4^vW_)LCkBOP~E)#fKd@XM@`mo5>N8< z#^dndPjz~SvwsWK?l@}jqr|lHdI&XM=jDC~Jdm5BJ>G%}oeRrU=%95iyJbaBR+N$4 zU{Ca1{S(&upi4b$+f&JNJ^zO8t>fYpp<EF++o(X~{TKyDQNA(J)$AjnOnakPHK4a*S_@5&~85Z6X4602~X zdDoNWJN%`ffGe#G-1Vh%yPe+G+dZ)fZ%c2#r^|`PQh^?yue(pV>&NTu&zCy_`eI$N zeou>@EHKTWifXJul;4pJou)>0tcel6PWRSuY{m@G;1NnFWZ*IT=7Fe$4DFMfz6U(; z%st#bk53I9?^|(C<~+aFe1jxgtuw9VHD0$WHh!hEGxSbanr*l>&}kGRs7Z)OubfWv zHo)jxIaqFF76m2}xgwR$p0(ZiG0yr#E~Eo0Rr|PneV(fk(r^26 z_P(8--n%XHi4fNQ%)rCdz&J@7AE(2%P;I7vFd`^r4;_!?6_)9duWQlBi|C)e_yfvP z7wal+W^$FH+Fs63l?sFSeAV3cHdn3)DySLuvrKq&Z4^@CQ|ue-!j@o_RYXhK*NH{6 zhTI-pG-?U0_>*llH!T$Oe#2hH+{PkF!4{?A`cKYEdXwrF(Yt!5oWd=eu!P?_w)ywR z2M}J$n;xXQ+X19`avu_`(=`;N&m*+7=2+JYrLtF~{6Ad|^fil@XTS_jOEoXm5DbTD)qZkfg{J|c3$;aCm5p_*31X4ZschMm z{=#Kl)$Rjx-+j*k3Z&k65W``A>fP>xgZI1WaB6dUrhUej|ZFyerp> zv)Y+P^>fzRHJB!C9WCx?{C1N4S|M?A`TFNw=NAu*MAidlntqNV8?JNj4Z9-a^Z_GQ zfYbU{eTi_`mCg%^Xh;Q2G8J(|m_xw<=WzJ0z5&}B@R;ZMDXD~+cVVMBRI|)V(-y-1 zDR&&72E>rPofS6PERZW?ZmQg0~ zo?3X_#wMIoW!y0dtbe@!%1D35UiaXDqHYl~cG)mB2yS1swQTdBl~`IgXdNE9RoVt^ zQ8V=VxU}@dYowBYhdVttx^cn?h$D=c zLo%ja|E<>Ub3V!vZ78{B7UGx#%F66#6{0EMI~4*#{p|{N>+gEwhlgnNf^0+B=(9y6 zQp@CRhMH1%TX+93F{8IF;LkT9CPIxt{Dn%aH?^9r0w1gp&J6KWBZ{}T=EPatWKvdn zioJ$$sQZmo9kLUEH`0V%aT%@=y3Na|+o(K<{VPVJUFGE1BowuVg*1_qcwxD&yn=5T ze#3l;6|TsQIDE=IC*N@VbaDYVa0K(X7VX45Var=*ESdsx5go9QO24q_;t03O@#3_( zDB#{Y7q~8FK56)g8+2t6uTx}%djc2_dW=Vsj3@cVId1rr;Kg}{8ye2boDmkQ&u>0y zX-U->%^EOLCjVju0P`5_TAjVrlF~U5#*U$ZpH98h>T+QNw4AI`@2dNsQ=Efc$Dgpp zC?9^_0j&a<0Sb!BQwH^0j;upCT>s*j2s)e^>>-~jg^8c4j3e) zPb0I+US%yWi4FmykE_ghTblZtJ%*JS2*hrk)s`9Mbox4;y>yAt8%PMk8?4r7X;2y^ zX9gpVAM&tqcHA`vt1VXmx;ig!8`qJ}1-yWo&Nb42t2_xVxkAA#fyUZ_Q6Vst4d=ya zPsl!-!w~X!@teq^>dV68l6=Y#9Ul2%nDl`AYx*>3ujjJGC&kPu=Mj1W{rL-sm zBa5gfJlHmt+FL2OAmL^(!#>=L&yBThREUqsFORd}lCslGJ*cHx3Cls_`rSAO|B88B z7FaXJM9oN*MD<$;k1Q>UfdO5n-g(RARZVAwcEK9UiGtRri0NKDzBpJbr$D4#XeG@x zyKnMcXN-#D#_AjW|4ZF-jA?e5AaD^G9jYFI{Q6?;NA3*t8-A(f0x>yKfud^kAr*~D zfd0&M)o$(~OQ1VoP)1)`%IZw)^+1X@Oe&=kSS@CYQStea3(9Dty(J`KqL5!%#n7@5 z;qX?_EOPy(?3c)=)TaMeaX!kwi#Ft1afK`@}Wmx&nb6b)&;itxdq?r+U*+o*0$}U-AL)q{S&{nFLIX?i=Zj__fPuPzT{BIfqT+zJmmlivyc>@g6M#uG{!vsO+f3$#jW8fR19{40+7Zc><%pSF9g(BBX+Jmm@&4crd)G;kD>YaNA7) z*GR^$luJvaA$ANl$xTyJMwA7<%{i{1lJ>7uz3c7;_V}m5&jxfa*SDy(S!i5u>90(a zIf7-U88#L%C6yVcb)_6~INRHJ&Qd%Pc7Ux#c*Kf)++R`kp(-mXY+La0`RnRIv;7dl z^sacul@P%#Hf=2oAun>02Zb6q`Jq}0E`rW6wLEG~=x z$rTuC=Xr~K!z2gEqVFi#j4;A2K;iAU0px=6%Si|~N~|*TVe^fM%gWhWH=&>S9onag zlS1t|>o2z$+O+$Yyuf-_37t`Szd9|>R1@XARq~fQFO!#xK@JC+4g^(LcF9x9MOXRK zi#hG=tWx%7!!GE5;4yX6$UIqdY>q|&G~VIDc)~O1^ngkTJTO9Z%(7R*%h`j?=CGd? zAhv9k!QQA)U*3>W*@F(w%1kWfm4}W(119=sgGTEffw)_)&kgi9YzCjc=ANxe`6hzT zM~9zOid&esg(|WTShsH*I*U|RDXp_ouQT1E_aBL1{vm}hQoy&+f2UaFY2w_cT%f=RMk#p8sq3HSI~3jYcNd)=gXQ znH92KH_s|2CN4JK>>Yy@AokOscCj;&>B`@(c<{82rs$#GG|FIO!Wnhc_K554tWx4k z6nfmQ_wDQ?oMm>dx1X!kqs8N_`$Ca|KzEO8dTquJ^oE%TJi-Xi|Cy6QA;aGnt=m6Y!;@fD8;887IYlm-I(Y z^3<%&hxMs5GKu6@M8vTy0b2Gg$V1C`)HVoiuEc%KD>@DfW^bf%4Y!hePQ7XG%q zM^y0bZl!!^=1BPd+39NIRXM6TrAgm**S&>NBMo$!uzt6-o1Fq)XHa|SxiN{n*iESHzyjI!@TIfd`NLt0%BHk^b( z?3E5`0Z;po%oGn0bHcw1<~-U)%uv6}lw@M8eSj5f7LLYgcfYN0un=KscF097FZ&x$ zMZ%tbz!H1e(ON6CV!gz}Ioi%{p7$4p7>qeJk0P}s`qQpBa6!iT{Gf|c@5crzXW+89 z$|6H-8V`Ev5E^z)J|#b}0!qpE%CC~U8z`WPr`%C|Ai?wz_*Yn_U+I>L~6 z#2=HWP$He>xUvv(_ZwuAc-{P;R8&CN{=-rD8Qndt2NwX<+Yta3L=Q)KY74yAjllFMxF#&`&X=Vys0KdPA$p8 z9V=l6IWzCzNQvEAe(77rS!hS$SxULk1vqz8pgh1;pX(=QEax0IrnEAMYIK|vLIX$a z>k?VNcX}-r^@iCy5#yMPyh%t5ZX=9xWG9Idk^S;9lX3(VW_9Np{whF6cOTDR=E}T9 z;DDUPeDTwU#5yd#qBag()E6NjP}dP#td7w0 z^Oo4?**cjCCnnYWnh@DttP}*D5g6oo)~zPi#i?mn7rVtyX!=oBnMfJ0*1+@YEu8zl z?dtK`ktGIN=_NR4fSQB;J0s%*667p&7m)DAlQryn4*FY%jZm3a4>0H!R9s1APrl`- zy|k0y)@QdD&Q6{d@!OIdsI)!*$ZHAThTzjPofHJoEaHVOv@y~!1}rWKr(&fnf(~py zl1GdwIIyEIq>_ep1%WWpvb5HH{*^^Z1<{Uz52)qpqkWzbZfK2BySw@$t^-pOqMb5z!1xn6Mu7El|Kae7`7 zA-&?HJyGus`%2xCR~?#ixmvMK<+tI2c)2Q(31C6eOfEEEjbDGX@(p6Cy>&)gTTa*N5w#x(&po>xZne0 zpQ(sMpx(s#Ier+z%FbhB;C}-F^|9A|P`y(xH1L2^?5=!2G|~Sih~W^L0Cu%mNLd<( z_fVSV%~JY}!1%`z&z}|^D)+(RfW#4G7Y2g5Q6dHePCUL4M9x-Yu66;BxAG5BtOag? ze{1mlGWe5I6bu{z4D=&Z9w`u}1)kX0feuEV@D16J3zeqRAD;MbnVf%EnC{r3K{+H| z!ySPIz;mP$PTVfU!aFJt3+2fZl(K2ft+u`kBd}~!vu5(-<}n3nvV0I^pW9&YRQJ$g zeLZykl7LR2%>1r0Fc@>+rTM+USW3}^eUHDge5J?}t6+QP80glEuaTG^uQYEjU?*Z? z3Rca#%*`5@>yaXz$|R2)GhSp3>RYRCVDt`ApTtwZ5&I9JjKERI?cf@J9dCia0x97f zwyj5lMi~f#%u|Xz0ul;R)}*rn?Y6rQqRSa`{f(a9U&NKQp$+=a8?hw=!wwXpOEs0x z2Qx_&!etH-@F;WR&}Sc-!8~!m@Q5WXkwGJx29z7Pz)x?Rapa z1TeX{ZB_uUyH&&>+M+BUQW?92mASHgos}%*NP5?lcUpaKtTmUtcCri}bYdSvd*iJA z&`0ay&B`!f+Dhs9(z;bI!W4{)eC{z3RQlAxf%Ua#Ru`}H^O?5KGoPQw4Kg$HzrZm&#iRtpqsgRJ6E;-ny$Pk*g&ZoM=!busW zt<{zVk8=@JL6Oj?Z;L`hJB)6T#{=vT+RsgaN=@QX2!}ZJCFtt|gMdtPMU`UWCfzwM&@PH6O zYv{qm1idT6g!B{L)5j&zz>-I``_}U3RXA%(gxN3)EaNkX!O4&<$0m?SE&7WXm$-x3 zQISjR1t7vnBE-pn9ex$Xbm;(r=a?{2+xrwbdv9JDf=%xwpmFw!8`bQH_vZeVKq5=r zj+x;*SlRl_a=^-e>)aI{Fvs@y`@?7AbK|VhB~E$b&enSXyImZEj@r{^*G zn!p0b;38;>FER2-tfG^Urz-^EKlOjqG_jou~N9@0GO&9x2P=RmI?MVxNy>X~Vq)0)QW@XGp zIH8-}f~ypiU&Yq-HZ6ta?v{?rQ!yZ*m?EZg6D)6X>1u-$mZcU4lIH)IuRm;^WU6RL zx3zQ=M|YtQ7#k$FUK-qT0(cs@YU)TQ{veEEJUZgU))s>E)62^bZ!eymfZ46WvJ$0v zAe#FcG3{s`;!!I z>#tyR!LRury`d}RfBy63(F1T+7da9`f|L2zc{;0q127tmj&L#;67B(bUlGOIFS?X2 z++m*1>Lr-Ya=t~NKp$9Fft-_2X$2=Bz_au*H|6odlmLzs+(dB)yP2{`&mY>DBX(?@wR7dwv3rJKD)1k5|yn=zb_|Y929)o~1X*4ax&>dj66EQ}J9m zq+FLC&J$cDZHVwt=G)VU(l+roC`LEK$`rBjP{f2=D#{<%#T0PH_kUR)rOZ*>j}hS;^~R)7(4~}dx5v%O z#Gm4zq{@8-cSgb9uqwaYp`QbaPDy zR|!xu!FgH|r6HsbJN`@uG%A?5Wjsu9QBdWjdQjO~K1^{^?Xgo*yx}V}n4xP72-OXk zu)+lh5>hReDflE*lCPtj6m-hG;IN;LBqWP_ux9N(mcfrf6t?P)2nS^H?YO6=E-0#j zkB(|WS?|f@*Uv>-xeff>35IVNd5#~>kbnqHR~;NIv| zv!gp*@LfICDAqC~j26CBQP!`;A76DiYqDB|U#ZwOAH!p@E#SwS)zZr|I%8QA;EL8* zC|Qi`w&A5yNHa#SmU=3m|M8C;hyVQN!xciqPZJ+!1sPXxicsdFWI|siRG3I|geaom z_yJ#dqGX~JQ(QfMbi~((Oa7C^TeKObGC-Z@DO=V3dp?Pct!mD3HyBjq=Uxb)t44s;_nMb8aBHY*WW< z)n#%@XrENAWDmZ{(=w}`gzcZC%(56$RzNX(Q8AV%cg7M&S99lWa*?LR>xj%y;ZHZC zdPenw#>`2Usn7Cg9>sVfTRw7(g11S0OY8kQiZPd`^+^^p1D{uL&xwy>p|aHoXb-$e z8R0dUzc3=LF>)2DVk#tQNeqYfNRVYJ5BSY|r`;(N+0zoq4(bnXP#4gucCDha!PQCYd7gTB>C|6QhKO>m z|5dPDtE=gip2yJ~Cv?+GCuYRHkpksKnJF2qo{S%@a;5XCU6!JNR{|BtI_Rcly0HLI z(I6d#J#UV_;}+T@zAb2g@dZsM+{lot-xoybJ*XFRrf6MGX<* zOIKwNVd9CtAJhL`)=T>%-sB7w(+Z}m>hZBSHl*r!^{cjv(thFkdd1X4-pei?Znb)C zBv8E!g&G-SpKfA5RXxc@;xQ+a*D+1wfK(WTn?xmzI&t@L4q%j@2-S*VLh&;kquWdD zr%6Cg093`>4CfJBWEY-O37M8f{lXN_Llnhjj<2RUCX`_Mra5a3P_z}V*VC+<+3VML z!tFKo1G{g+?(J^dGrxBu|GhE%C0`RZW_PicbTd1Vk?xt*1?~f*Z^Gzur|p@|yHM|g z$rqVf6VD$!;Fj+hMhO8?0j5+>1~c?Inw2w3mHCyfK7po6cZC#|u@R*blo{~2p*1Sl ztRUSps(<2G>d_I`SW(MIr@i%HV~YxKGmU(1I}Rf{HB#wGdo%JS0TNmu^1jylftx%k z3Y?6p>bRb`N=?i$GlcnAda0l+8q-~WoT5OX$J{nPlbYjpPf)Lh3i=<>8;%3+uQ5iD;jW~r*qoq9%nJW0L;)WGxOk| z%P8lfu+zV#!{K;KvbJ(N?r)MnwW2j~%RggjnUrt|BQkTr1JVJN5Dn{83JTVAkkn!+ zrXb41k^e~MqGS@|%L4h=kHI+;wa-cviw76HG4&IMH_E<7vnal;tgI4>qqcq)Wgw(Q zBPKYI>=MN+L=71)&*#Qt`hQEVB4P&x;Gdm+$E~*mI!%(Pte3VHsC12z1nQt6snoni zw5}DeSv5<0jlJ)T^992p>9mF=d;qhW3W)MSf_7sftxicrjE;mAneFQL0wI){08xp4#>N zus$lJnArh3ZD2FgDoRh5)I#ALMTPfzt&rL3`z08EEeS4xd_nvB$3KsxT6>jMQD%s? z+7#VQT@`rx)z!+CY`D5wbwNv<*4}z6WohLXzoWidyW(}r(yEp_*H`P#U8S&|mPHyz z$+g^f+#gRCij=t@11~M6jcXX81TZR4tLKGcR~G53D7jwl`}*iVtpb}+QoD$OSri2E z4a%`Rf-L*tYx)MWS4%y^W>Xq+XkMn0YDJE47+uS6t{uXi6*A=G$_1MeT*pcX%-pk? z9Z5EdYSRNUPTET-%P`#$Q~dO|sJf}E_GN1z`Abn>6BbjCWb4SjrnQ-g4=ZniM=f$F zjcHi`<_0DFLuOU&I0=-Jh;=wz>{}tj6u@si@eql8nPHl`{}jDGli8{|V*h<^j;h70 zy;xP#j(LQgfMgOSpL>cHF;S4uocHMjI{t%ixAweItG3~yLz%1G5YhUe+Bgx}p^D|} za{2y7LRdS=9kYQFL-63i!dg5{Nztss@|wopG?SE*{vstT5{ePkKBcc#Xy!95XsgL4DOIjoT zOjSxLIU4xe697lhP}C(%+}r(}1;DpnN@lR7nyO{8W&YwTU2U9fSb z@?n^z4by@GclGLWkzGdMDP6F+D=G8XrQ(ru79D|1xT&G`=itgm*NGS@l*nR*wgGc@G`h@j>M5RCS|$ZuWZzvr1p(&q2s`QV61B^^Jg=cw zl^@p9yCQC(_D%|G59t9r4XNz5TMdrlOOUd7qW--`9p_8g%deea*X%cH0=sq`H8hXh zS_t=RgSPS=fOVmQZP+eNfgz}ifdCZO)H5#Jxmo>(rkeRg%%l!~ekyA=gA3-NzSuRWey{Z<|@p-=7JV{}Wo; z>qf`*#9C-?pNh9UNYZi3(#h-z<-{z;=kL!Ri?1)vAA@Y}KL&V~6}Qi#{IOW;9yhb? zF3rs2n8ia&DjzkPZvii(f~ zTJlTfOR;(qxhAhH+Ovc|e@!Xk6*A&@fDL#6gj478$wm~)XqyuT295*ffuwLRWC~k( zXfFxm4Q(mBzSX9b%OcIu1cS3WG^Y{NEdrose3>v~ zF%G~(iHt{#H96{}jN`{3Nn4nhI?5b+*ug5DJJYnbRCKk5*D2%R+bBh5b>ZK0gLnvh zj!PDl1MugFFb?%&6wMwtgDxC;>i2ZwwRR`c*-};LjN)LG-=<}*Fq9Gv?}YKtPm_OD zxu}`(;!_L3r;(Ia00B~Z3U`l6NX3@*o*-x@Y-NpSp4mB1CCOr?>#0MBQX!?swhw|V zKDqKVLlY5!&=QNMEZ*gHDklxA1Z1(my006fW-3&ArYG}Q%~=}YdI~jWe@{5GiQ(hp z8sPl@Cy;Jrj^{YW4TTD)kW_&?3Z;T@V?3&xb^S#Tj%krYNWSN^yg60#Gam0vt)byh$h5JJ1!U{3^;9rT&-$cNk=5IEYGSy*%c5KaQK#41r>ng#`z+!a&e1m&`Q$H`0lfI4cfT^FC$$>A1^Tm;L zEWngX)+t#UakZGmr8ZVeO7plR`PhpR5T^$_di(4x5Xmyx7A$23l^>YzyBDXdBbI2R*p-sxiWe<1TrGo=lx;hgq*AqImv_#Q zKjoh7!mL5dEblr;^~sFjS<#y-_uxX?AGiar105){eyXbav^ZOi$MjWI|M51Q@MqzI z-;tWqC?s`QGV#LaG% zD(h1ZUsXrfLs+XSTX{^ZyI@0xu( zM_jnqtRHTXNp9F!^TO)~TGT#plozocMz~Kv1&x5J9imwu&E&HgsXtqy!?x{CStmw| zdtfXN7JJ@!6kg-o6HpSI*9Xv`_RE{yDw8}dv+?X!sf!$~IrfsSdl6jLI0Sr>yse@n zh~`mHqL_}%b#;FN%ezDhl=ygb#Cw<>pjBx*iO9Uj{8m^JMcH~ppR$MYLC|sQBz6jIW75Bb++wp5GsxIT(2rudS7-=Kc&n~48vopbtAj50+$ zQ<$T#==C?0FZd}O?QlO$NRgw6r8wVc5#tFOqhzAsId{bwBSNA{!jdf|X@JKM5_W4F z4`F?DM1Nhj0$L@$BLIaghUiwJi6@WVIDOv`(yH1NlmrS&ib$!RJUXhrbr4ykSsJI4 z+slkj$+I0Pts>M}U^t;D4i}z!RMRjj=}s z_#K_A|4WKIN+$fx%@il^5`v0|ge-UB!h7Zx(+u1Ha!LKSg@j@S;s&Bv#JQ0@j2Xkp z#;3u{`k=04Az?Jt&rjnB5nMaJ39St$MIP~|V_f)S?$b(pE6b?Ze|cUxL-Rsa3eml! zjzmGA2m+KMWju%rUtu&TRN}F(3gVQHA00{UsK+(Rq`b^<1XYzwftpe-$rNy0xwZP~ z?6`V%b8|ClJ#XiqtP&(tN7n?5`K39eCoSOUsLrWyas(cL4;YlBWS55I*iUCOoCM7O zNJ>uAR=p=$w)E1Ob* zPq;rJ0eP9wEwq#zROA_sqoRm0MO_o}7?9GR(#l^)NkoTtR5^wOY3&NHCS@D8J>Itwlm~zP-rfTj1p^`~-ys&cT;W zAAdPwiQ?#p@O9VE$`fFysyY(~3^R6to%2n^vTX5Dl#0TIf~NX9YVs?J>$`<7rtrcb zfZ#dKQB0?XLN~!xDn{<^QfJW%m`{)Jds^vliGrZcWxlfJ+RO9(`5RIF2)rx?R1L(n zS}eXUO2YK9un44O0sfJeIo;$FKABI(Z1#?>9ipH@nWi%~JH~05D^1@0>IQM8x^-Q2 z$M`{g#jrBZl5WG0l!N>TfO#edB+9xnZ6~|0uIsKk;nelGzM?tJfqcDjeNUYzC`SOU zz6P6@>yJ?v6*hZMes~z*q=*prq7;d7E4vP@?6Q@{gUvbxJ*sg~MON6Ls-)}uY%47% zRs2GwE7oQfP?v3-6|bW>zPyPFe<~T~@n?2pL?DtTlaDXY=SJ93=>4(eGxQR+Oz*vbmrI>?x33H>*sB#5`mXIFP%O5NO; zx@1nJ{dIiQu{H>~+p#*x7bJ73%=A9)S;$@Ve}AinMD&m~qq+HdIgMamCdqP7G%_n{ zt|05M;?|+eixu{!WEPtM8;r#chd9|7&hEtSnM=#}-l6 ztL#k*vx@L5DuO8If%KBQXq<}79YqSVoLABsj0%y@GMn>;u{#%Q^NgaPvX(CjNYX@- z0*eGlZ;pja{dhDdw8rC}v_WE<0~q;JRMg{2l?S^1PjS*FxuEkyAQN|uG1qbKW{t9} zN_)+xMHP(A91+m8zLz-4Ng?r+WRGLG1zpdgoTrAAl_DNC65k4c1|cyJ_$Df(yFRI4 zr&J7Cm*UQzO6gk&#FfQilY*j& zrC3}bMr&8(cG@#0a3pT80}U2ZN>xg#oYZMqcsGSk0Mv91N>95e0CLy)Tk*^6e(x0cNec{t6!zp5qm+IqwQ>QRcDr9yfdjoNVx_epxU@aE8?_@5UdkN z2qlLCjK3Pu0-gJH(QxTX8g;XIk>G+%Qy!98&5JxODGRX2Nqxx^yK(6zDyB^5I8TGU z&5eqNRdb`J^Ded#HS&EdTN}fJ2S*|&H))REcuH~>e@B%vUL~a?JMy790%mM;(5P) zzZA<{h7x{zJs0+juadODA}sse#j8tk&9Jm0&>?vClrnFb$I^k@1r8#zd9!i~HmpUg z=>0ZoM)^AMHgA>y9M&*V_`aIP!;I@oh{hkAE6vZ-pt;a|RAlkcI#g9v zEyG}cRaIU5tLc{c7iehEHZ;?K#$QxThnn>lpx$lM`KP2i?7yfx*R|NVKgj3TU&mh^ zF;QFRD`A?yI9~MP5@&go@I*J$=6d@q<>}=(Hwc#`ko-fSORrw<^vqeE(^owbRSm^u7lj<()8Y@4b zuI^hu2BS74-yaSK{?C7o6h%2gStRxgCqSZZJl8y2Ab4~gCBX^knLB*qWd4w3jj#8cMTNpS@7@L7$EmGLokby3(V5)l3pxQ83`2>2+-&C2%0hy0$m`$ zMIQNbH+M4~r~K^v-Mb=+qhHuEbdGbMs!0=Eb%!EsBNyUCy3&Tl&t`8b?yb$r`U$V# zbdGa0!BQn_dUqW~v`IJ#M9L&{mDZ`hPDUw*HIz+l%~`$1XO8z}7yU-~LJW*KBK4I(E=P;Ih%mwyz;^723a3Vg#8!dEtOlmzmgKqRdHYAovv z3+orVepxJ79e8s*6BhbPjai9}?glSqjDKX&vUdL0Q3u;gfi?3VYEWO$|5eR^hxvaW zA2$Cl*i2r?xL8kyDmPr^x*;wB?wi0h!}LvKeusgSdJ;)>v}Rt8k_iT1P=Lqaizfc% zaiZZ`lBIbjRRf5cvfi#d`P_t9-Q3 zg^Plb9qh zTX?CyuCg3)eQzHlVulKT`brv_Rf99CU|)5NmBrCld@ayR35D!Yi zoqg7?|8=VAtrdVZ>%VT;i|0S8VQYu=|2{t3tp7Df>{kJ((GJl7>cR&V;7_0e6QPSq8NEGuDhUB!AXZoApte@&(P<0&2v8Z zEA)sqMox{4>ykbhfTiO&tm*B8GI~%(|BIB-wfbM>wY|d`;9C7pUpoJ@P5q$%-N%O+ zw`KePOA!pP()thjlsLgHt4;sS{k8)w|5bp3WcRNgEm-|4Ztb!8i`SCHzrxdH?+>b! zNXwRdt~R8_0?L*#U#JhvF8^>*%v6Mm+h~u$7mpsTvi`RzUu*kUwln_M!`H5FsNuf> z2kn~0a8fb)`7!vSh@~M|?80JM#77|*)pyp(FGagrM<^#xz(Y_eV*fK&{%3v+j*FN# zD!`vXyPubMXWg+(SDi~$vRYSRTuae{-m^4MUu$;S6a9`!mC<_$Rk z|2P&a!0|uj<_^V-S0H{~;oSzYAX!;eK}Gpv(9|_-k?fgD(nbl_Vc?A>upUYQMcVL% zfGSd%_r6HD4#DEAS}&r^TYAw@9A!`A)W7b1G4i7z2Me3H%mYvOoo}@>x+pFs6NrMG zn*#eW$@SpRKF(Tu3;v{S)e>#*2U3PxAG^0}%TGEso`B1q4Ec4AQ1A#m!gioPPxKWCI7n6+?mJIDrqaYUBz)IC{s{c2+5y+(%_wibG;v2;j8s7bh& zyM7&caz`xDD7_p?sEluOYPVn=dG#2?G!novyDYtIGs+@H#wzv0g+;O^UlJ8cZ=u%y zxEi!RT8DB|AN&q{w6cdb;-Hn7_RTv>ywuW5c)Y$SCgpMI)kCaaJ!Gpzt!4g`vYV`1 z)>?212=jEdw6f8MhqdjnwjI{C!IJ5)wjI{CKl0jkuS;9Y&iGr~9M{_a>S(t+^Z(Z^ zebN4>>d-vc|L)_%?0=WoPm=)Uw{j3D6{(dWKTc7A^ToJO#xuPpKPgPIbr{SKn;9Pb zxxjgX;+IK*^N?k8mrj9uj~SQ2j==~>Gg1YuKu?jjsUrby6!x4y%i-}X5BsRe8Ymkl zL7$5bGlw=XwZ~zH*l8$i61cCVjCOLBzWjKR&Uu!wi(uM^H=X3ovt$@ui)rdM=(Y-U zc&Akm!$@1q6t)3r73gr%Du^|tJuRa+Xd(h;5}^#TX#GPN#O*a{4EH7NA@$MXK|5odCH`HaI`@#@$CpcmS?ZpFWd-*Q zE?-;wdnLWZvm*CyBLX|B=S~XC*g9r)|CD9gB8q#dT0S&tAA~J6{=W6W_4?o3zvKKL zP*d%t{2%rq{{LP+OY#5bO+IyTeJ8sQZrf}CY!&Ku2F&LES_i<&W9ne1LuCw=$v z!eT_VR$97Vs~+N?!NWR0fRV%AbD_u{JQA*a3``^lWQ|@j21)fwK7^DwWzibIFfNrJ z9PPhc)1sRfcO6@|QCYAwl`OJF z@&@8AMB=`Ji!{c+qrgE%cspe9*Bt@|`)b%Y-fu}-FXLoadD7SHOLYX-?}{W4QvGe-L6l4mqqtc$c^YGp2oz<}H+foSD|-H@N(w5^n~h!KN-i8u*pVy8ciFN%Fe29= zZCfke$ioPl137*ydVyn%2p+wu9xtgLeVtp;+LY<&SFKl*`Qv#GuU-H7MtLUXQC%>xcP&FP|m*Pjw&dmiC_7th*`zw7TbN zX#8h&xt3%BsvfniKUK-T_$u*QvfWg8w#oNc!S-Z(Y+^)P)eesltr{~lMzr0!JIW7P z4{*D>p=P26yi*767OzKwOY6wL>Rg(%m~|afu8Q`%tXOhgu-^(^TnzSG!;DM8el-nu z6zeCEzEtI^P`?UJ4)t5;(%&xBuWrF1(r=s3(Dfhjeb-iMz&ickUOfNNpspSAf8EPR z(*NcC^~U>vwkyH1?XF#7#4)bfH?&Lyo%@GsbzWLJmo^fQ`Y1_uziXw#n6OaElFg>m z)-x#a)}A*Y>*s&twy^CUV9oqDbPX>0|Iy-y`F{_eE%N_e3Xa%!2H=*1j41NOyjIo4 z)T-a)+{jnm+0-)nbqSVs0zs(}zata!zA^}|LcB*=^gB%g*vehEOD4d#$uk_|JIn+q zPo)8=083Wghh_I$moadZp}dILMVtb6XTHC>RPP9`M*8bLCgKwd^qUQ*`|A9C zOVh3|&0a^Mzuswg$h_B#+Ppb(zN%D|#rVD2XK3yh@-Dp#R^~ifJ`szFaIRU{&(D2X zUF?ABDj;=$vcxd*y?+&=x&!6@0^&;1*J*%T!80rY?};e6i%o`e!l4|0bVx`ak!TA4{r` z+{=gS|CQ=rq}8o%3&ApJa#UUWR!!kCh!T+&2sc*zp6lNx(Htl1?|xf~n(6QY>W{~% zY<=Uez-g9IdBC?HO-q_<+Jy-p1p!k*P<&Rss?$CGDsG7q5FPizF48-yOY_w$%+ncL zB3of763&)=v$h9IEnOz=m{qFCowS5-$*?;93cM7w^Fxg+PH(@%x8l%OSY7cfD{fn@ z7bm1cn!bRuxnZ}lhA;T!H~5#GM!Q-djj4d+OL{ey{8xMUM2U?W!2Q}T>wL;RqbN|X z9zxksSp>seGCr}l`1lxnF-=J!=MEOw>0{D+#`lo#C>Zc4 zL&cN;^^wG#f?Ii8>i#&UbR5@>dDL@|HgqnmP4ByEE=b9JcbE%(-+ya8=)d)|o&GP> zjsK6mxBqV2#ui2AXa5zrYIJlVru1K^yw36p;;;x8ZvhASqo%$M`LV=@ID4pTcdry91;3 z(T>6%V6=XP@D`>c3z^1eS(}@XvR_PT;)UCaxkxK4=rJp*f9AC{W6TFF3{7UTZe6hR z6J~Zovkhx%pI4v7sWN8(Mr)MD5ldjRru1VP!j|ix(spyeiW6B!pz`)Pc(!JUEROxw zGT^m3NV{oB1apy)lvN1wrB3;*wqoi^4XkTP8k5+M!y|Bga?nB8Pn__P=Q!TsAq1tV0x-E05s|o+FdnI5C|L^rCX8!j8sL z|Bvxx{Qpe?qjwkQz)vAvHpmOHFtgx{`}2_BHMoDlDAaz0o!s;?LgoNbb_Up1H~Yig zODNU(bz~H-D{wNhg=gt7OuizdfuJ!&f%>g1_(|pa!k#AdpY!bpr2m70{@0&8-T!!$ zC!_zuoV}aE8BAg1qi7E1h~&b}o}mN+6p>gtK;dTd8mBvUi~D16h}yCqXM~nS4mG4j z4kL3oX#hc2+zfbC99T5wr8y@E$^La5z$4HfjVTi#a4C3O8{EQ8Ca-eyW?~azpR9U+ zwx=Tfmyz%48~-ZM|M9RO{|~!Q{{N5iWb{7^q8M)_y74rZ(8p=^UH zK0d!?kS<^^3V4Ky{V9s}@q+!`_Sru;gfIapnxP1h&Gt?|u#x67KDFt8Hpc3gLAKEU z?qpQ7|BRpRe>}?L^8Zrf>OQ9PR~};5?fO*++-rCI%7*Y+yuNH~?lb#*<+v&J_^Kt0 zSKR+HC^M7)MCj88lmCW8^ZwUhFnr4Y{U}c+|79`0`2^Rr`DS6hm0;HH4QvYv?ljq+ zFo>_cr1?Fqwro(d+19ey%67A^Z@guA1U~W;9j3TT32;G3auYJIzng@eCLVSVy5i$J zO?>?$|H5Ql^*+c9g^&+&pDdI8>^p1NetXQsZW!MpDG&J}f>D<7XO)IWS~ef^s)nC> z2^4$1aKpmg-W=z59e#_aH`y$8jH?aABgog`vpj>$Va&MT5XQb2E@Diwx8}7MKpV5Q zL!X3GhsBL{|~JH_xnZte=vTc|Bvz%>HmH8f0Y#!_5X|# zTl9bVZHxY|7ptQG>oxAF|JP9J6+ZW8RO+)O@lZ;=ijU8))Nk>+$vRWn=Z3SZ4&}@* z_95|es;Ef?t%75V9E>a`AQjw2+%R>=k>aNmdcm70+#In?b@%qnso;xKI=_D&`^Ufg zQ=9*1bNpcTpWb9(#{U`gpW^>L&f~KGs41Tw)BclZf2yHA+U-B8M*HygADfu-ne9J0 zZff87%hYoBUBA3Yr7`Czs|o`ZV6=heuWMiSGc6PMzx9`mWBs|V`Wc-5vtRgYti9Hz z|8<>zD%k%AeN+GIPr6U{KOW^N_5b0E_kkRLtedXQ4&Q`aAA-;Dpz>y5fk`~NW>m;5JEkv^vA$I_81QeT}krysIZl&v^{5zlPeI5BDt z0@wwVtg$H6Q*-2L)U_@RUOJn@<@>uEy&A2|NQ zU@|uSe}>(`lmGXlJcaw8_dWi#P|5uCSA4V`{)$gq&VIF0RgQkO3ik{4P{Z+CzPb9J ztDDzvPT#(IS>x20V(-s+U`*G~L!A{1EPVcBV#gr^ZT}X9;nf`?{z7l<`?JfJKOet( zrMA|3bKX*lT)ugG{qm-#mFP|So!+?9?R58h{gyq^HAkjnQM~8Qc;`HaJia-*SP%7{ z@n%1KVB(gDV%xXj#WCgCl-Lns>%lm${!D%sS?=+A%u~{2C9Eg$TgK*w{Q`hpC1BWp zeZ6j3%XPq>ImQP;{@8;2v4QuDF7YtFi_?H(21e`e z(|E~!6}TKHl7xconK=!ctfcWu=ZpRjir0hcr;{5rI(XrwFz93jB^r5W_}7w^su(=9 zIm*l=1?LMY+Q^z!oE>P{5UpVZF}_ISDQif3QPtm}y``1U=}pl@{(Io~AKh`UU-18X zivRmK&u57LVd{?U&y^kYnM!V|dUii^d3L|MIKMf5d;Q}PkEm|2l`15+8oB)lrsE-u z{4c}JsmA`#%+z%)fLr(fxOo5f$^YkZ9+&;^XF1sqVgVE+qnvIi#~^m=Uf!pB+V?V( zUBNxl=!s_Q+xrX_K4r|6?{q!r{5RYG^(;W!>_6jy$^VCg!IS_0qdXb^&o|e7EkM@Y zliPr@&o(Pi_Hm0H$S7CE5@b}VV+$IM4-9J%e{*kpP_CC;y}UTSJidN&saXvEtMz0u zDw>S`ls2QE&R)H``uXhoC4mem)AePx%}zs=Ir9#u&|tp@D1Gm>)W9!;%;or^s8wQ2ct0t_F*#X%6^;abX^pA zOFmr*?g5kNa%2=*ps(|?BniQ;1h=OdFNIu ze_5!_$<8We8xzemVqpVGl+Ns5+U zy15d${*GRNxpD>~QvenYT(Sf;yt;AB^2}S2_!Ww79~i6%cYT#7fp;wt6Y<6{3lpG! zFPR8S7mD*?DO8~ab1@ZKlZg>2DouDSQ;;QYh@KHsBoxZfE3P-M#lA3r?(H>L%e(d! zsD6;E0~om<%~fMxG}||eb&j-6Qc|2DS>V{{kU(C zg|a5{3cYLHuBI@JAc5FVgBIA+`;;HHRP0XHmHRfFtHrvCY)s?QHG}4~EUh!LtT`FW zYV)uxn}X#%u)BmQ_J)-TDjC-Wb|qqzU(Wu2rI({ot3gpRMH@}HMUn6 zuc^CPT*RzoFs~yBA=mGOB$BO2MOOjC%8{ZV_QRAs+44a3qW zZRK*DC-R`0;hY8dwJv;ht!H$>_)cqIv+R5yKID|}B84;bzQuvl&o;1yo&hlR{970W zN7~Enod7arzFARaP!iFFx`1WaFIEL0S}mtA<<;|CwS{qLl8w=$^X={9d|_>E%0!uK z3)VZ-czP;7mF>UD+HVy6r%L|!t{MNaI~qLY|9F(Aw*B`)Isp+L_v<9|(DJibgOjzA z4$xw%Rm0yXVS~zTwGKfL-{zy=1H1GK^%h zvqh_;{8HMaiG+MKnMEZ|HEG0X)m|)zMzuYzs9Bes>1SZq;$(9wp5ioXJB7qUQO#3* zWr(7_)Q%P~Tz2qcU%Gy^6XsytIs&&4CbmQi_t$^Q#MXwnF1D(xwKX!&_aVlw;{awE zC7BM9jXL|T>Yta;3w}-!fo~!ow%FAvMW)mI>i~;H1{G}ylQ?DW<%%MQ(Lc2Y4i681 zKrK@vEg(vO;)JOMb^$kbD>S2(Z`*koPra}Oo~Z^BWyx@7%Y0GhzqPI^#ccP4AMA*@ zGXIxi`GcSTb|;gb$^W0ue;@0q&Hv?@%IDztVvUt@eN`X5563t4+FIOxN7a7+D3-6a zU*zKIS0^M>g28K_ske$5o&_;fh^8_-;*?K2P878s<`|LxvA0+1TPRkfLjq9Ia9=yF zLCQ_0D0!msy^KK?M2rtvY{^{>znvtFN$kg=J{5bQ_2c#R#Z_jZEjQ3gwDW{j82bxI z@w6Z$!48uq?}=O&X5+77FZj+2y~u}Y)(1KfVL0uqB1Bt(9WvYZ!Z5yT^LqhplvEBU zVe8d)fvJ(bcsEYD{459CItf>p!1U~*wFh>25HP0)Vd~p-Od@Nl&-KfFG{i3P${V!{gn^Jvm9${XBVw4B`piW(Jyl|DHSCi z^mkh4ZNxb6LmEvaUKWkc!081ZnfgPm31x>ANTgMLCROk5acU`=i6-{whh7kB_inL zr+co?lmYGuDiuPX#OaZZw((DnU7~*$)Wm(i!$nop8FI_9S!=J##ah>)%N9w%DU`pA z0`6$=&|-N3HF!0}P+na1GLo6yxfjA_k-BHgThf}E)TWHy@TP4vCnqKcUG?nCy@%{4 z)DLtxR@eS>!!@>AR-kS7KL>^UpZ#%v{AB-mjEC8OE+JW^kw~`0R8F>Zxy?u9aM0~O zm2EkuhOd|}#D=+GJL>2Kx2opf?fbB!?ZbB2Ml`(cv$#BZ!+g8BJ@FlxAG%;Sgpm$w zPu-?0_{FX?%ACiX%rHxt>>x$2G(-Kp^)>!`>wmQ}{|8DL-5#5T^d7X;e{sZ{FaEWY}Q8DwapkoRY<|asK`7^54+@PeDk5LS6 zI2SlORR!24>?=}?iqwbkq zK>~`!cq9jPM4Fsvbf^KGlI10|ceWSIouGU-h$hjEG+J*(H?^ZF-4^3GM6x$xJwI|b zl-L`wHFIIJx9Re0_Ek{PmP^alg4$&rQ|GNnJ&EouQ)mo31KfcuKU-$0GFB;@PH7!9 z=T=!12Gz9yc~&3=j?I*0A-*({Xag+#uM2?N?eUwoH8&mI@?(6H?&=(k+P7627Oqzu?eBlRKKgpi zee+}&c%vLV2eh|6)LT(4+9v;pXu9vilpsPQeU!&0 z|HG7M!P}*`OLmi{va?G@P4sYBFeN|6VW34iR{VHeg?0ZJTk6)tosBL_Z|$LwUumZ-Mr2WMXDn0p?C;Un`0r5*wA$@9cK@Vw!}~2b>AEk;*9N(5O;jRLF|ZNr@;PCaKjPt5s>(bq$rx_`2{q_LLuJ5 zO&P>&ol|sdZPcY>+qP{xC$?={C${aJBqz3Q+qUhT*iLo6zeo4zi@vCvU8BaX{f^r2 zuDRy3=0dCH2dNDDyv3Ry&&`?rS~>*84hY)C0(Nj?Vc&Xl?|TJiNN4?(!B&wJojU{{ zLMCJ^@TL=PkfD$;geTRh;kLpBA!60>^l5KdqE~Mi$g?NWDN2zjD4iOVs?51HlD`|f zFws^rL!>@&fk~i`9YTli>=PGQwksn z*vUOIaH8J1M|XIbo7Mm4cjXx%-i%+D$=#cAc0pySGL+C={UMHjOc$G`#Q{vQ@+Z!A zG9o9Ep?-M2>##jZB`&jyyV`egw8vO)8M}S%&{kuDeYC<|RTjf4gNlp;dE1+O=t_#~ zGbva4p75*1zfg05UZc&nE#2>64K%A@LcUhYdKcfo zc75>35!0O)j7r7esKL^X6Lwm?@1uo9uYLEUgjV?JBWkDG`!hc2#gQ%fA*&(k@LLuu zxXQRc1p{PP)&SbJ)jVK^l>mcYoi#vm>1S^I{Vkri5!P;CuDS}9ttrW&#?)0Fa175( zwL@&1TV}BG_F~bg&FQb|qNdHntI6yNAeL)-oFGO;AFOUNsY5a`Rgdv2zp3q+7=2wE zRcpLN?SG7)mc8?FT|1r z5A9@iwPe&!@J9z$Q^SGH%_UI@0=*`?tS5EcB#cytTD;(aA7!}?QY0XiKAns6XrN0~ z<^a4U4(Js7ApAOw{1zN2obW&Baps>_$Z?vRraa8816Oe#PV>cl@y;HlNX?|B`FozF z_>*2lmiU;ReNQ$Ld)kab*Q7a&u3ZRaaW1xl2XR#{NkcswRC7;dDaPVW?(n_^+6d0p zRQC2k2OKI9h?na3 zDDWkkWa=G9Sn&D4X1h~*Dnmyf(DWS=W>@N?ozSBXFCS(jvr9dk*9CY1yES&UrOqnb z?d7r=#POeYC+gA~T?Wo~SD`~Ixxm)5P0vg&svQO21$;%OYE-VnbwgIWO)`YuWYtA* z_f2{+>4fe>eD>Unu!*K9kwIrB%*@Oth*}&&+Xc%bK&YH~)4~DAr6o{1W>q{`Wf5aR zd`>7uq(<}wl*&k8UCMLXMk&nJT56$9YX$9e&&;gD6=i`s5|M_uHvD-LP8IRD;U#qT9xsLXuI zy0Y4iYm2}nsYFNDIt!+ESeo&|I>rIjk?x>+9-L}E*TIc0i<}V(3*a4K8@M7@ zDd3w}$THr6q!sTgs4o_h1STy!AraKfb2@UZHr3+QkAMhMGM%Ga2~H~9AL=*@&b|;V zjge}PQApLPpoE;TXjrhF5Q~}~hP&teTWL&;#M2xvkqtpKy+M(76GKw{-78rWj#^qk zSxNqN8j=b6aGHfTid|N?G<25mF@WE`k3e?>ISirg@&dgI9s@PLZ=J?8z%HTo7clOn z+jz4!2w&Z^2pUl1^mgr?{^T+#u9_Q*B~LAV4+Q|ViRTiq{*{K2{zdR>Q*-A=IOS#` z3+6W!dRY^)YSP%v_Ex-z<0&2HX7$RR;#~83( z$qxJzke{?)GV+~vM?|>xy-D~R()@dO$MNw9@J5B0Y=7O{edXhz7tvn<6$z43G7c5t zDV`tT1mpg?=DAPW0(c=r=)0?Z*(B|$$ zG!>8wrv$7e1J{F;I?XXBi&<_LRTQ@Udfz3zj!xYZS*AjFSD5wuNe*c3RzyvHN-vFJ za&JwDq*x1_%PWH}O#p2n^J9q^9YzLwf7+g6Ih^)Al!S!InOwEzl#MoK`BP(@o=sv$ z`f~-Hp1aJlV(w}yqp7$5#6~p_WsZsO1^)(%@QF2NZ(GUnLzOS>XUBu0E2SnbEjdl9 z-p_n-$LT_>V>WUHkc7j(j82O6 z{<_MwPc)ZG5E{NLL+iSc&?jeDXVLlr6uW$Clen0r^>YzN_zaevu=?0H;(F*Ml>==1 z5gFe?O{ff5FrLfFD#rt~?7dGum8Vtnl|9oZ)Zle1Hy9!{du@)2-ZRu&%))H>Ut@lS z7Edda3>&E(ppnm2CQ>!XYF4o~N{u4@_8YKHd+Oh?2veafWx|;Z*)`s6%tM_KQ$)&~ zQi$hxLf1rvY*a&O9I$0t)y4p7?8ND$nYzbVA){EM$g!eVP1m+F4h7X0$Yx>rGf}0; z<}g&Hx@W*qm_%A76lN6;W2$LP52`92BxYpyGoMxXWCk^~x~TQFdS)ltx2EML%8nnc z-BrksOPLm@E>TNj6JD}vLDKi0hBHc7yLmO&*P1XU3uB)jiW=RJ-n41WkRK&Ov_@XQ zfQ7F?rj#ng1q%pc2`&+S8EwxSa-wbhAmf7kz7|*)u=mcPpg!!-usR+!XC<@AM8Z_O zSQR707EW>jg~ysb)c=Qh9iwUu^0|N-&E$!I654kV<#=9ry0N?tsJu1dA&BF0vK+LV z;mlpQ7t5{36LY=z{Accg{ianzx*d4LH+*>BYBtx$$>=0?RGS4iW7E7&>Y2 zT70;*wIxg%_LIV02F`yXWb&(G#L6U^fjSi8=GgaW@?nclIc5ylLdy%;D7u3=1*fAf zvntu-^O#qUR?NV3H|F)lev9PuwRIHln;2q%p2~t7ZRm_SlcU=GJQ!({^?yhr2(%`e zcUr3NAl`0(v6X~YlDh@cv6lhIL2YjCo;L0uSMy?`-R;xXuBFVfJ=57~}W6Y}MD<|RXT8soM>yr%OD*zaEqyu1c~7J$+A2**cW+&0R2|Mq9vBXM0F}_ zs&(5X#t{|!u5;}nZ42}NJGsw0f{*Zxv@XR>ZN0vDzY zR#w%q+iWweNlgh)FQ?nT5$fnHFhd!LcBiDb(GZSia^F>Nc#ggpguWS#rr*P0robf7 zIz#T^#Y%!rXF#4ziKxY*gCy#=QSqilJMJ+zh?r3+l9eYzc7w43#>EKLGfoIuq3i#`RBQ9}Lc5^jCof{n+9UQ}yh4Q=H5^HQ{Se4mgR zEz>YU9jE#ZqXP24yqNBmq}voe!^CQT{D&;uQ_j2k^e^qik*#G-rl3%8Jn*WE?Xuy06975J8T+>+<4%Qa`b7q>MKqEZS z3v3yDs8Q<%BuQ)@+0ZCEFoi-AXp-WzpJ;Moj+81TM3C9F`eBenOZ|{*Ho?5||QO8BiK^#&R)4dc) zM|S{D)mSwca!0l_2%3N0vt$zh`nVw5NTdJ6yv3a4%G*5!c$WHu5(G3pee2?O;elFvHYD*o>vY$kI(+Z-2>pB4HUaMs9~sVeAm?m3mmkefZ z9%!z>-4^b6!yq+^LP?<6FGLf#YkkaopLf+A06n}#VWCYxbiNOnLO8dCfUVXqCh8uPN_U)HfnLR6-DE+cC(SMgv{u$z~QngfJ*-e2!@=l+aJYVPeJcZ zK^HpQD%M-*_}-wF6DRX77vk$%<+E49Q{a}@YE`x7K@qIs?T^L`NC3%$d80G)H2tWO zBP9w>+5y@?9lt-^W>34WvAUtb{h6d!>=l_DV{_qs0{8Bi}LdU{9VoC>^~yu>SinqD6sLwk!^h4HmX^Ij+N z{#SF5dE4ffcJBTD=NW1Z;tXN`Lm6J} z=ZEhEXmn-Lnn8Nvk>Al~d>U`BJOH<%DS6+$iRY#O4Y!u*A&A1KM2ZOAE`DBg-UO}Y zCr{MHx%}eC2uJRaRt-i*himww9Uy%|gRdrhFj{q(!;^o3zlGe_++hczg&Xnqa7)E;J4^C(}kt zIUQyUzGkP7GdV|eo4x2eI}66DdUSq!)37;xUtd06zMgEaFR#1T>hEOr__({>-%nUt z;1?1(NE6pUr2LE>a{u{i@^OrDy}aJ8ZocXPN1^$}v)EY|z1$Z6-W`UiVtIBWRxrel z|D%jfxbfJAi5>_%-E4gJ;wl~|JMyB=Ak#YJ3p3r6Uq4`qnSkiAs+DjgWTZ`90OA-l z(b;GttaXnlbT&W=&>Q3m67&o-7?-}UL`aWSn!4woN#xhZgSNQaoTw@hN2~O%=@2FQ zV*(q*6NQGjYd;pWRe*Y1GF3)nS$(7}>n^K*CE3*pylDW~9!rEd&)EQMdn?`A7Hhs% zQL04+VH5mcvT^b6swVe04CG{cA-Bq2jwIq%*eyPdmVk!V6w{pwea0lebiD;}rJ^GC zO+U)h25m&kaZ(qOA(G?uPrsl{87`Ii${s=G6ABwj!bFJR8(Ei_gT%;ZU018sYPIE9 zQkr)b?wWb0r>~Z{O0x?$-OA4HLkg|m_WhtQB#d-g^@@f~=5ayqBudw0mLr~bQZX9e z3mnlMSxpD2f9!;q92J)Yew9_MfX5d{pq>@3hq1TK3QrxNt)++1Bf35Zf58_v>s|~W zn%*f1)&Lm;(?plSH)y=Q&#Nowk9Jrt4Z~DjG+k*Hd(rA>l*Z}O3cCyy6mHjY>_k07 zRXd%ukW=O(-3zpaK#fktMNF7!^rXwGz-8r%D#4F)GxdAhs+$+1rxB>HoU`SKc-OM_ zu6#MT10fO&&cf6#qVoy%fM`&T*6M>`A5sBL2?}Nm`y@1(-ob@A-{9x9a~~5Pm+M6j zGn>WrfFr+{xK)irRa_f#=S@{|_#bm2H00v*+xS^Nn&ISLZ1`g`Q$+s6wFa;IcXrQ@ z@c{@QbMO5HW*){)0snClc!5A+2|`Fi-}JJ9gpA2pqTi{Z3o$-WbAaLs&;$!@phTJ( z(DnNz_?h(!!OybHB3jLhPY=vJ_-84o4R^yZUaBbQ3_Bi~o3Ck@!N-$01lR-2!tXkN z#{_(r7Q>7Y>b`_J6?3KPX2|bD!Iq$uH=x^SrCI~z0xlb0#AoW77Y!~m(F2vOR2ADk z7!yG1z=9075C^2ialG9Xl2x80eipiqg!6m({qO98;er791Q?14}$pcMP6L4_wLC|645q;tU} z`e3`lIN~2l{|?4%#~~Aww!M18Nk#5X8$;0fbP<&~kSLv3DlYRV6SH1SMaJ|1hU)4a`Zz~Fyp*pwtTy#u8nXC>ihEfhw6ccp{L;*C z*onjOT}AosJTz!xKKvE_NRdNH+3A#9%|1r7NfWx|SF~aJ(%4;RU_a315`D{X9kJgQ z0BLT=L|xs}3C!kYev`R)kDv zPTaqXoA7e2ziBOyxzV=uu+a3v9-e;@eUQuzM23TlG6sy2vT62E+pS%u8P`$}ul+gY z1IO~7x^IoO!N3yh!P%jBSc1)SWv_bW9JQwMvuneN3b<~>iJJSaTUNZ3?!lqkuIk2t zVZx~ivn4G5y|nhWQ981zAMD)AUmN%i%GtGo=-PULZ(Fyl2DE9u!g$+@vSRj%&C?ck z{fz-8J9?+v)vw*xEgz!M#L=G}p4+c%5zvrxifZ+x>;Ds@RbjUpHHvov9qy3{TkpyH z2R-2s$unIhX=3(+)?Nv(k8bg_RDt*3&4=iVxh$!Lx5l@xe;Jwl0aK1cP0|k%CWU8| z^;o%Kdqrd>OL-VGwac3MJwePYe#6DwjE3~@1`Rs4^KD#CI zk2%2Z1u&Z2BL$EMF8%z$_Z;76DbQ~_RjJ~Hux1ktV*kN%=3n;sCKVK?*_-P7d6C+K*U$dCg*1}nkdt$?&3zykg`)U6O!i7cfJS(-=+FTnjh}8qo+@Iv&rBtj$-h3 zu2hWNY^qIHNa*doBKH|%^x~C#+cgsN&(!J-%*9Y_2AsFZ-)0~7b*SPf9+SpVqma9q z{jGgjne3i{N)_!?)|T07_4rpZ-(1FDkaYh+=tn#K0^itC9QSi)0|gUkOVrwX&qkTc zohE%ES`hzL>E^gy{a!0{7#*h4mK+ry9a?c|Q^;Q%cK-!~HS{WlctPJP)v6 zhBp>A!jku(WD@k7Rey_%*%FyE-5hoZbfzGlPs z0j|e_%ZU{gXl-KO7l<9CivSmvEWUC7_&X-_C;Zl$R862PPl0TNeYdG_cEI8(=%fSEe#fB_3acGOkJ{0d1>$<=w%oyr zhGUuaT>+nJm@tGwIFvhC>rtM<4_6pv3XYhuZAoh*#$pe?YMN}1oi6)h9CBJ&%g!~K2dj3Asw_$hkU)qJ zY(I|@I3b-^fFm381K@>nu=Im4{+{V$*6rJ193usP8|T?Z3Q0}=1_OvCmd5{z$+c3I zg>sX^LSx?%qW0I-pNZ!U!89%MmTfQ}^#r=dnjVStJj)rVZuyg+!rAD4c56S8)IMBE zUvz*z-gHAW8&(qCN80){rkPxeT(s2Yof*pZYC7d}858Zy^K(=`G|7W*xgnlM1Oj$YS*0Cn ze7pPj=3SN8SAxjKXiPV_w&UM~X=>@GFY;aM zeGOMB1@Pt&U~P1|&^IG}h?-%U7P!c=a7||zn z5#wC+*O+nBm)5^+X4OIrtnIC+?Q@0~ck>ijl2XCR$JOhV1G0~W{kj#%hh-HCW%L+K zs_*au8qJUwMLZwi&{P{1ge@QgJ~<6?x!*L1bgGB&*t;+QA3i#IdiQiSxcxf%qr&P6 zp027fk}dE=!_FlTb%YWV&P{CtG1~=B=Ob*+pkujR&A%qjJYO?p$I&ka_lnj}7v{&6 zSGCx@fh^snk(zzUKJkP}nHCu3=%&;Sok1e0G5So>-)%#sH{lUq*r zZjfUu0}ymw>|g{?hG%w$KvV?V?oBe+o=2tGF4BxtqZ1+3t{)e!v@f?7j~(O{t*RDS z`7)AY7@@*G){Ei~Hhc8PC-J)LBVvwU1a0aO24D`y%#da#wLkeQaSFYiZ+Fw^h&$>~ zil&HsMXt*VMgffqbQ}sOUQ`8|4Nb0ZC(}PO;_sH1XB`+62pg0l+u7ozc>jkZ?Q{M3 zl8KoScv`A_Vv3*ciGqUZcMkSP>^6)fnbV&a4tg$lx(wzC&(+S$rn+I%^|uZL6LYyG z1l%FzG2M;905GA914N-v=Sux0>dav6y*YT}$HicnVQt3Mhu5@pEHw#6(_hAvr^9d4?fu_{=Tl7B;3~G8v zj;EzSo!7oO7VQh43tw}Q6LkZ125hdS7~^XTUWkk!Y8xW@fGyrJ1@t6MF*@|ZFvSjP z5@p1)@E7P4vU6#BqX(kDQ;k<+{Q9b0l`yCU%&uOvSRPw4oyDyuR<`#K^*S)idJ1vQTlv=V zSZ8|;WqM(Oa05b>Y8IHHm}^!i0kKYPF`%y^A!uHY`mF2pkt!n4f9GArCp8te!K%?} zV9k9Ud%;z91BUeXcSZe%bNAO8AP692nyNWa3vILa2nq5*LE5Te4;C#h!8jAUq`G!B z98ZJUr;7tprccGh6Wq{I`iafSta;OAgvnSGVV28asv4z5=Zq_pg36kSaGQiRzD=4$ z-D`@oVKQ5cOyUChJ%atZWJM(Nc2)=_?=M_)?WMafa-(&rzpRUFd?OWnzZ7tSD{z5Y z*8%S)ivWkU%%8pv@03%-dH{OC@Y2e?GZY7H9>}gS)KqWk8pwml@rh8Qu08VSqUPwO z6>Pf|-QQiJED^@FfM*>;{MLI5@lQctkSlOOffLmC^JMEekle+Br^hAFYf(TY4p8eH zz^OI?V7G+Nzy4#vyfs|<R(lK+B5Xv_pV%SGg~Lt}}scfLF@t{i)DpmpFs>{vZx%6;#`*)#2Cfp{v$;_I)S(u4Y<0nl+hD- zdRPUtggL*O$hn){s~UR5N7KGC?wPdLZJ6$aNbE??QM-S0Y1C&c3DwXCC&@co1@5=g z#oKI~K?H!;BMR`!g%}NJ6rUvZgG38WP=3IaiNf#)j(;_C#29xwMM+Y_0Y=>O5Env& zyw!xDoP7wp(sZ_`rVU>iz=t7%E%bopq@R2Lp3YP!AaqI_9<%dx_gOCh0CZ%2N&c2f zjKkQV3&qIlXAA8=rxBa~jI!t#ng6sU7+$|fyUFi0HZonC#?gls7f7LekcoedPP<7) zyJzG57uhYFxjpYpH%BR7MulH0u}7z@|6oLbUeFpjHul+w5ZN-wAg7J$j%lB{Bg|%y zKsvX0*2EkS%LsqX9*@>{nk}&dQcY4@qMj?xjs#$rP4he%6`a*go!a52V8~?cSl7uL zcAvEP+n<_~iTjOkH0-)k;zitrvwTJc^e1}YK7&<<(KYWL2S-%~&kPs*N39hejmJ78F zl>a8C)j11M4vn=!MC0AaVms9=&D6H%D+#)=;$&%<&OGYJh6&_tyWY{VK10{sQh9vS z$3!DZHJz7FgY5CuvP1%idf@D?uhha#!riRpU9B$8ZM2%xD}rK@)bf-#_8@ z7;&SI23HqqTPICKk_zb@h>%6nN{;8> zvR`W3AZ)~SX?gMJtQQEj+jQR^ylMyCgJD!{*}v}Hrpv6}SFh}vkD-XptUAG{Z0MJ6 zSqi=?8AWFIkU=D}qUyTc2ZJ}0aY$w*&;eBD|KwS0cXR*@XodjzFR}o@j^mc^0)X(a zyaZ6$6i7!Tsayf)bZSQ=DP;s2@ig#l6{tt>S~={eKfn_fXMMsYDk8+!9r6RYb;#e8PHY zxPMS4oT`57TE&iKeo?`lb_r9s3QMST{w#N}@muc5PaOuh^A(t3|3_%r58V+P#$aDU zFiGX#AYv(0JkE>(W$lV#u3T*e_Ngy!~Z1jk-@j#)YOUGA$c)yK$<&5U(8rs^biW{$9jiXXd>p$ zu8?PuK<|2fLfL#TKQBDin>Orme)^2hS+`b*{fd{$YM_mCh3?~c^Jk(P102q)eE*!| z-z0zr&~qRIk`+SGa&O#jt|`)-1x%aBdSxAe6TzVYAw-?azA=GP%#TW_N$J_5$c|F? z&WuWVh%TjW-OxToTcIex%5^!g`_nMF5PjA^K)!{U_w=%|t3w|h8YtY(!|nIf@YQ-# z3uoB})k2$p%z%I9tD|bk%2#K&EHviS5kH!<-htj^)0c54@~FoKs#-NxVg}Mj!qzx^ z#ZG5uZawjVDm^|_d@&nYZMX%hzjUYTK=asvz5>V^1t7jN^po(b zKlu|tr9l6!fUY?;Xk1G)t4iF!dP?JIaZ3Muayv!=e?%KWJJ>GNr@tu%{9Mt{pl3Tk z6!F_b``$(X>yRvrEdP@vUN?Y!q)Xqdm2}qKgD#HW`-*Wauwmr8_hA7_?BN|Ffc~R* z6(4T;YZsqy_`jZxk#E4?S;5<6(Nrl@l$S znxuuqPzm@espLLh4}d@n*s^)C7r_5IYe9H7a1lQu!RI?NJDPTCaVm%xIO(HG6cD0Q z?*0R+Rh(-L0UrSSKj#F8L~=CQ3F9Eo9*Qn-WrXAYXboTK6c8cfy=oIQwE75O~dORjeKktUpylOy4M`PkbSu#dvr8xLt|()qPo2Y3`OEPdD=_3Qz`Bp_yr zO?UmHz}=?P2PLaP1xKYO%?C)$HoWu!Uy~E=lJ?l~=?XA{DzhK;^;2Z?M^MJ{0;?vL zp(*ToDKI>xMG{UNbm9DwZr$O)h_=tY&pZKUFtMcS$!^eOOyI;(h8CqRUal@;2WZzm z;PPuY;5YI$LIKKMi+@QQX1`}Udl&zHvu;}e(ikxweBTA%P-_dn@aC2t95kR0eLYS$ z5qf0Ydah)Oaawq1!ZP4@Yg>soE zm`Pu_OJVZnid$mKCAMwVV@S_rsJj6oT74w7gryP7yqVx=@bV8_;{}d+>p2r* ztdiSJGs#I&t3IBVe~%Jkp_pKXf5K#&@+a#TE``*a-|C2Lib!p$h$=a$iK355(R<|izCk68CSn0K4Don+1ngJ$iZ}OV zU6X2VE;n@>#>py6ynJO1nc$aR-o@^k4H{txx(JyE&UuH-O!tOQC<%OQ-KFuM>rFz{?)5E+BT3rm0)$M&H zvxPJ@u9?U|*L6D{or6htJjcx?hwR1du3d+=LHQDE&MYxZ$ z4U5M1LaYHmlpu+@I8s)z1OQ`AEqIJ4rVSK_ujP+BB^kz5 z+Vl6UUh%vV5T?Uw#72-;uCqG+NuKoU^q&jSeMY!oCeiLOo#OBs7i1%FS;cZuz<(Ii zB=pNFnWOxzL4uPmmh3DNg(v9(G88dD2lC=dGFd$LMlb8&c*a zC|9Hd>C8f2rW_|7pB36?N!iKLlTu)$#+Avw3t?o02kYV@&*9(@t8uaOqPL!o>NAX9 z5MU9Ezm)YE=zTw0Gfv2v^O;yd=p^~i&>Nha7%HHZ#3`achvy$x{!;D`kk|v7@zm&6 zt=U+?akdG8Rx{Rj{#`ocM!G~4$)dvx&R-8N$na(;o*!P&9P$B|-Q15f_$?OgWYyut z8kgraowE7J;J-^npy05c8WM*v!nKmE+Kh?BkFkO7Zt@vV#~-p;O81C`J78ak&|u{+ zb!Vy}-(R>_gD29A4J0S?>!N};#F1J(OP}YWXaF(4+(=oRUTzrVuP)_+h< zE6gz310?9fd*RWoKt_8;F(;~0CRpdoTh{!X?F1c~OLffAI5>3HWp!oxgNr3QM|nF8 z>3AtuAdt~G9Og=*!D8^}7|S*7y~}rs9!8x z;zs*P!eX_C`V5gpL&Yo)m8e=T+3*AK;N z6uO5sRo=2wsCq#$r3lz4#zBM05ZRKpY88^!(ekc4*+=>4a2tc?5O7d80);Ihaq{hWPW<>!Sk4JEC~0M5Kv}75Z?I5;3b-LyU@&>d zksbPJfE{XkK!J5h2|J*JgN+e!R4xOB>mhN5?cJg_G9PX5gXZtaVMm0QA!EzEdh4WA zD|Q-{p9pty>ffS>+M^eBawby{TXL+jQY~=Md}iTnta~&k0G6U~wyh^1mmS5KJvNI^ zxDFjX_2=*JCA51929yY#KU3jQ`amk0yMO1rWkd*aMNi7f=R~EsmQ>QX~tvMnDgu-lT0Bov^@1vAu-&FZnzzF0M9Oofu>wd`vig{;j=z0zDlpDKI%XvCw zvX@DYtn|nw(*Jw>KApY={MlMzFOT32Ut#O0^#aBI=VO~S{jHrDj+^{VS@&UgSyphW}?6AmhDYiHrUs!HB5doKE#9X>Q2(b%}m@Je~#B|u%}CE99Fm)kR_y^iT(e)18OoQ zYBmL5O;G66&CZ6CHV@MYB=q0*xQq25g#QpY3`E+^5k##ZC=p4ipf)n9bE9a+=0;F4 zH`6|{sffdM`RG03@v(Bp(K#S=Od1y@dxNw5dl$QX+uib1@70ou`seI=poIMBgwtf9 zO5Hlx|EyA%!_ABt`hYW7-eivh1cH-_yOrSD2$i z>A*=(60q~IT^7mc`gt{r_c_zAygaq!P6%8PM%~~e{o7Xcf+LxWKwTwg1|tRnnKFAa zs{EGdi5L0PBv)m|!3|0XRk^#Br04T3&dxZ;b|fX?iri@$_OSQ1Ti z5n}MHUe(mUz`oaZu*FaCzCWviNBn2ku`j${;sULNPHwPC1W#O13ZrEILSmAT>}7tj zKV;QX!tV^7ep{bze(Cd-*Sk9A>Qw%R{0kPQ9eusWJ$zW zC$>-5B@K$yybprPc>v=LYDY=lPBxjg{;~(0Av=C+*x(?G;nUH?zM~>YRSAgTrNTtO z@}-u+#ou(=SieR!tUjLpzN_1tBc0Qb}Q>?vg=q9i|_q&sw8?2&@@ zJQBa!c%zQ+y{-H_9_VkWtXOdQ;QZ4A^ICpKZGVEG2_A?ulo^~!^Ds*eWr#J-S^lou znN7oeqjM#x4IL4uzjC_!krsX7)K(^m$z*Y4%3L)6@Ocoo-T4skDUHJA5C;%=!`5xe z3Im zga>}yALSpG{i{2dS`Osy*1G^Y=3ZWBfhKmuT@T-&Q0B%zfx_nM@Xy(#U!H-OlHHwe5kII#=L4Y9_V% zU;IpVy}mcJriT(z6!edmv!8cTT_5^7!ySaQFlnN~W|!Dq$*j|N>%Ep(-=3njPjlzo~m`}MX+LaiRj-dMD9=BCtYL z9|Re?CG9Il;1IeqQrr@QNApxxF3rE7_AjwSS*K>6wUSYjJb*lF{6PO1f?aJKScP2g zqN^lIV2{RYMMc@r$xU}-HeOuL_qPNODuL?=4MVlS!l&jpm(**UjXpS5TP;WoUe)iV zls`Da6yi9vuARj=sGHU8(jDZLMFxyh1oRFY_U#s63Z_FblwEYau{76@`Igrr_1Tl0 z2-ZeJO;}dC`rLBUMILyp_tXQJ{l{n}M3KyYOOXHsL2Pl*l6)~Y2W*b9{WD{@kmXFq zsxfTh`cGrkg5{LukCgIK!{|u`PQPGCiH0Rjj#4#2G;~>aOn-s_dt@qj1XoS1iLDz4 zS^thj6CdUgD4h|eAc6BPI^b0dM5r<^r1yYhUzX@15d|HL!3JWIAexN539u5I3WsCh z*mDv5V-EceT(rN4VxH$38k!ptU5$clcTxJKsf=XA8Hjl!|N6LSkV(k+d#Eg8Z~v2v z$68tN1>9-X_ut5BIb;~)q9d$8T(FRQFB9*a(|ttx|7}dB<|^?(9;~GVdEQQ42%N09 znp>;4GUVcbR~;?U@6?&sUn5*)jd&iF4?gQVzGkyLyB@NZj}ay)3$F6mTdF%6sQ34^CmQZs!3lAfmXWY8Z9nMCS;C8inReq|p%iIP@}B^1oEo zg=DBL6E>+W3*1L%SL`n6xav{i#XOIBc1b*n0FOJ9#%u+eCZ<3WJsdY=!HwhQu+9;B zcFm2t&s6vlo~CD~+EjMK_MThgv@v`&hgaRLVo}A_u~u~9ho4wU)|yrZK<;!uLWws5pJm;``#d8OUD@0hsf^euTe- zL%Y=U`DXO^&Uls)`~@9Gbf*mRJ{ySX0nM9fXoO#WE${!zq5w50=Ai7*`$R!5Alsb* z3C{1QXxKRSuzn!5sfbrE3Vndgr4vdVHpGqV7U)06BnS1QXv_<1XTm%&d{HQI^DK_8 z&}M|C;6A}&Knaw0jU))#d`cnUeM>dvTn>L6K;#B&GfOQ5oAz=pe_FUG=}MoKUtE+8 zhNDziQ}a0DpH$@<4_L*g0^-dPb{Hb0ak#g= zuVEI1zA4d9u4$b_uE2AYpO7cP!J)Do@kLy2_Kd*6K%2RxpBFROnkYKFm^b_K<%+(v zRg@-%ZXq%CV=8eJ5md>K9>?-|l*iP_g~Z%g%NFmm!bX0gO`G%5S@Cd9R@}10o&j>+zO4yb!>1^0Ke54;XX%5bYy}e& z-%4Km(f;x0qGzmd!ZBD#U|n70Rd(PpsXJ%Ut8#vJz0D7ne7%-x_3wNs2MUPY!-SNY z$0^fVnHvm{lV%4TS|+k|z3U_Qro+w%y=_&W7eqvxbBpkBgeThruRqz_XMhueg3 z7+Ec-YG#~)ObjI?!wjODM2Utwv}ZWQB8sMLj`~HRbo%-nB)C(^9cM=}+{nUtj7gU)t&VuHLkYe!mrL^cJIB~T4EQj-VVwJErz^?8Js3gsFi;~e`r82s4xXl&u?eF~?8XQl!rYjrSWXO>Sj+d^n z@;7O7+d%6_V{Bbt`hcY|MKY5(bpR6rKiGdj?ewQa&F&q}jJDkSEPdzuGe=mge=&0) zgq37x+eE>I1VZ|S?4xv{SnjVYc&TRHsCD(f0_guUC8@fJsc0W5IgMJsV=H4W`zaG4g=GIC{({@W4g7MwL z7M{6U`h(p(e~IClw6!kUx4Op-BIy>q1sT#r_y2|mor73?N5Rx@_D4xIDh0q|F>H!F z^$4O;75_K^b(|SkkN#VkvN>k}6TXx%r%_#Lt&N+tteZ=!3v8o=qKKMg$H53kp-86W zJ`UUMTtWkANPX#TUS7cwcSrce(>;W!i;}J?%&?$ulYmG}aDALxbx#?5M+~Qi+~Sb} zq`4&OpVlZk`gMU$G*N00&J~%0F-Z!Y<=lt1J5R#!GJl2>Z? zNZW$IOxuO}*|i7!N05sW(DfJ+hjXSp_=4|6V9HM$Iw6UX&lqZ{B`Dq7}B1<6o$N26cwj1U)m@V zx%dKS6KmT(W4Gxy07h$+#u1}ZYsyxqp*WgSn`3*<3H}wIfNUNZ;;Gn?0~FbUVZcG% zp)jQDjO(`~7IwO9nuI}28KxArBuVAS7qYrilbb_XKA}*iCX^)CK7ctQuKoQc;gp2) z0V?wI{o;Wi5CLf}H%~V#`hbX}Bj7UbaAovvpH!1dhEg`NQ z6wOnJafQ9;ML-l*jLRlnbu}aIds~{Jg1p*F7F(}=BX@Cni=z1{N_8afw^ZgzVTzJ~ z5jW;gAogUOzz7E7YL80L2$QVNW*~|QzvjeOg_k6}vXpSdeqP3_h$P-Z?oy^WDU^U8 z=f9?<)X_wc;6)r4He~~*mx0PT9!cXBUD)ik$b6f{LP2D~w(mt8ROE)1e%GSuSr4}n zbOm}da-Owh(sC8@15xsgvVZ{op&YDx;m#;Ymdb2f`wPdb274ieExvZ_4Yc8u-bIoeS*IMF{1?CH6&Td4~W;n5P0J=pMmPkRpy?jLhy<#Qus_P`GyyOkVBwO(BF3vMv z@$nWtWRokV-ausghi-=h%fE3zeaKefEi$>bXicf&P6gl96<-H)FA~0V7Q#hk*f~2e@ ziFxaMXL)4NVT&_2M;m*P?luu6q|jYE(Wy@un9o{0nn3qPMRFi|`aneN^Y@iXcNX%I zYdkQb5JhKwV`bZcb*QQw@q+`Cik+lXJs`*nvG9n9Xscqpw5cm0?C!F?!m?hpy*=u}dBxKRK9;Dy&8jgR_=Fc=IEx?UH;;b1oLX5)k2 z3_IPpHMMk+ zsAeGdLNS0fTP&)2YhN*DGc{I?0=z=Qw#JHUXxQm>x^fB44#!?^=1mX!;~?-3W(TnA z_q(I+)bnPrKbrLY-eB4vb^D%w(DjGCK0KVlpx>MHW`_sk!{UN2_DZfJsfm;>B~fS> z?`>I7x$B){37kkNG!Ip;SX`JuOL=IAE<458FG~tpmUGtWCYO1YBZFJG$&T*@Gx~;u z_(t@pqxV&aPo3PE+je|$tbC>VW1v_!Wzc;q*uW#61zui@6=0sO5i!m!gwJQ-=jM77K$4sfyZ8etSiKO#&i?JKloCVByAz)a&D{uR4X!%Kq&FAhRp-hdf1 z|CG1P`>>OEDM6f4xuwEB8OREi{UzH!0Tmo8W(^VAC<$f|uGr{FYe8$YMAHwvUOLM7iznXzkEaECo+ zTGM*TtqoUV60V>X(3|KKhLFHw^&E5uoU$cKK>#$5n6A1&xUlCeVtqD>mSgZv*npQYkgYAKsqPZLNDj(C%;-RGm2d@(+z4D-n8GIU7@cEBYm-*^5-NLK}x7pAwRB z3Ry1econe|pto1wWzMh)e`ja>Zr08}D;!;oCCmmFVLl84#Z+(QG7sjc7Bks8`h|aN z9kp0^)7JAATYRmfRwpQ9uY_Uj)-DD!H}#Hv3i3DTO?kwS5Ku!2#G=KBwS$v)9+D=NeiGE zv*(;=haZ5+18f^pd|>n>p&Wha!8wJK(w? zo?WrKV3JlGf#W@J{kJ3V_WA^Tw+AkcudaSRJp$i+_y9VWB33{1$Nco^8*q{rU=NJe z->30X`~slUk#oV`7udV}c%6inamcUCVMx@smw8WM8hPPaL|{7ed|1>k-(n~{qL8@6 z>k-0SbJzg`^Q7SW9!Ve_>BUL+_MMl)BfwmtrkjLE2fsbQ*&>krNWEj5ddpN%`T^yH zM~b5PAqpj$(~VS6I^ZJn7Lz26cahR7+TJ{jr(W2Zt-_EJg-r1&VUsW-D241w0&NFH zx!53}AuNb*akHq!sx;_DAeKes2zV;l?D$o5ok6BsnS~g4%%A#QNb@3r8jMJa_}hI* z{C!#ygEm-tNkY4Ic0o(05R0nxJEO7p-@9HAv_x|lx82suWlfPz77R;eyu8zYnzLUmaW;2KHDJ4QA zuO?lGC@fTF-4HPCrVCVNu+VC%WwMH<@juAl}xFpiBIeklbpD5;M3mO!hD!f>lOAurg}ny~ax^o@km zQM=lqpSEbf*-?{SGrePnKvZ~`()nY)|ADQM6^SWBwk`eR6^TRoO+gH&&eH#c<)VsH z@|=4GG21-Ld{0*?Pr-}T+LjJ*-uFFv4};ez2tr7yJGQ9CnOG1@Io*pg`V5w|uBd8n zqLzIlTQerCS+S$Jd!fJZP}H7!82Q|}kcq(YjQ37d5J%}G_23NMs$VD%W0WxQd?=|Z zouH*hkk7o#PMFAynarHcc8+%y8oNK4Brpm%WPVeGHJZ1AGhdvnCjY4LyOoSLpeqEj zfBE{`#W11L8r;)5LVFjlm^W68g^atD?ZPNvj+8}AGphYd_aE#Jopi7**@o}EWfH

F+X!3s6Ux9@lKC6lcK!TU*OR8ikaa`+zr6b;bNSOo7K*SmZ7z{`+llXuC zYI+U~P9CBZIb}XrCNb#lxqEuLf88HHTlgrNOz78DHPrk7?LYp9}#jpCq)XN-U$!alq8EF;sZ2JFiEz@kcjMhjnxw2 zAz2aW9+Ir07UUw}unDR}3&KyMd!{i3th-am2ZkKy90oq|HeS(J>g%ke7iT49=dy8F zxVMwpJ8Lv;`B=+DQogqpg*vOG$_(MPUf)NX33=bxR#^8$2GHfZwt2)hw|OBZFNSSzPwyUjx$02 zxIeHF9`${`}GPFmQKOBummNnQSk32w1 zkKe}L$=r$SyC+Aewtp_dFK9zcvK9P}i(Qkay+_~37q>AiGbwcstSzbRoq;vLeWz~` zJo0Sp^nHTuF?O+Sk4EljNIZAwd;QVSw)?K<*tqXt)azTGWA%_T9+Z2hAduEQU*hDm zYRWAq?0oU6ZK6c9L*(f_zuPgjB~B#flPCmz5(vejKxY3#V4-p)l9^%QVWRPoR6Yxs zWn$98v{@3`5%&r7JX0=+_$z*BlWgaVVys(YiYx2;7&A3I6d8szf3c%GibdeY!X@E0 zIN{>fILUYLJk-e?wggLGJ1-0}GgEQ8=h*Bq+r@irPJB1sC4O5bzU%eTVCeQddonv&|~4M)Cfc|B|5_s3R$IOy5L#eI8-{T>?O;n;P019##%W4CYZCY7B2xjVFNlV30V zFb#1>HyssOp>Y--Ds|Gzz~`c@W&dqjN4mpRjCXP21Y=$kgg+)hNz!!i%3b*Ct*iDg%*-22cKLzv;~1?q*W81;(np z3Trd|^sKfmnw_E8(KGK5HU0Hc6{{wBz(TI~Cg|&Rq(zY7Wr%`B)$#L<59aDcXVR|@5OaY#u>Hsm2N92J zgOiZF=}F{yxrSk_HG_3ksGPU9_Y&OJm!cI!Gk%1VSS}Vogue*8MgDBj$z4{@y8mW% z{1p42(mDCWU;J^_Qnw;$Z2YVJFX3H4b?WXa%?}JM!mzdvj%<>Uv$}>`LJ$Ve_KM*x zm*v3MD^-f?Fc^(?cF3#XLW4gFLuxXaybe@Y5#k*a`)d7=l}X6&D?(FMqskSlj;o%j zvdUB^c<};xbVfz{jSshNY#_8}Edy^NvxePP^jKujmD>ixYyj8@JOW(W zZgDoH6{Kd6QjTX?BVpOcYPt5Lb5(gMhvFsgs`D(9cuV~EmubsbuDzB)7Rz*V6(lWT z2y11&r>zVZlhdMptC-FG;0hd9#GcQyub0gJ%&g!XGiZ@hwH(P9Y z+4cf0%jZsQ7tPvHv^fudI6c$yEjt~ct1_rErAep>fM#Yaq zh{BE4{Wyo)ZZoAYrb_xlgg>1NSi`87fIt&nl@rL+d64rT%vFV^LQrfGpiN|ll4xkfoc{m&v81gPNKR_ zz+`=lPS82j7`FbN_~A-PYlh2HkCLiYQQk@x7DW(YuO(42p(LGZ35{y}e&9A3G*dnM z5%+`h=JA(^r(uE2&XugV=C$+Szk%XUI0rKM)Ib$7Jj#TqVE4S|g(mQGm>!xqk3LH@ zUirzQ2FT+~nH5crq#3Me@=a<7q6O+UCsD0q%ty(oQB%nCd-Q?M&!l@DEd?4{^$8+R zuOn;)!Z0m@PmwVnB4?_5H8~@kcA(E>CEs6g4`_ktP22OMc|Tb;uYLwQ0Z}HfLR%0^?;BeY9(5< zEMH0%^&$QT_c^RqWU-7nlACC^D&AE+C_CyIbt8!SY&&s{5`lE~P0U>(?(?6#Qqbqz z@yV)ITYZN8o~)v8WX20&pKI4YI0F2LVcW|XUu=a5sle=zP?q`k4+H?wh`rq%o1^sB z{;(SwiJN+ev)P}fPhT@d+dLl($1VBo5}?PqlazUGet^7m?*h6&sW&%UCZwy=--93S zC`rV3J!2J=%VOR0?!!_zLrNz{#Z*-wNl{n_*$ArUSABv?zkKmt`PMcg+T<}J@K*9+ z=DcBnu7*Se^k{mY5c+!wP*$#b)2u|Jmvctx2_2m?rj3qvS}hxV?Fz&WbGOr2RlC|1 zx$NO>m%X~3Z568u2WY3$)6lgBJr582zGY7)9v-1de>6Z7-?#e{Jg|w6-HC(x?s$O5 zeFtH8>{x@b-?N?J#2GpSZI?=U*(E^?GrK9y>5|`G$+Cv0oG7xW*_7?cfI=V;M}@nl zaNp-4Ep@|UhikAD(a*3u^O+AWpK4>*eh-5+i3p`_b|MVme*hl7TDG|i^4<)-bY$^5 z$==H6P`+xc=IM0g?S92k7M7QQAMv?WF%Ujq0iA>DB6@5ibFfOPQ(#`jZY!WW53tBp zqKZy2AkplaTn|9TFSoZ-@uu`Rk`OmA2H5j1`{zcXB%EoHb@H7muC#D*TFh?(&;5Y# zgyyWTX=d>%LkH%Xt0O(?xLYH^#*FvPIe>@EM8Y&qeIAFHN?H;uK`hq=s#WzUI+vKY zms8e$RJoQw^FcAdwvXaeSZ~!$eW`EM0IqAHYl2a*%ivU$jypOP+0yXL816Javzpd7 z!qbk>jO~$!Xui#kHb#qNE35J-qf{)ebxm|59&Z_;g358nryyDyos!v3W0U48P(kHM z$E9R?$R6zX=+NVzFK;1Ks>tE75a~$^3JH?CJ7?zoo zHO^kg$q<3|Ke5i{dfM#O7))+8KV!E1H#1nRN4BP|QkF@neo zR}v)xx$&BaD>W>aW8``2_A?Zn+E z04)PosSO}IW-5F!d6ishW(5wH#>O&Uu0p=vi1G@ALTr+-2Xc-b8P&6O~m-MzcG`ET>Qm+P6Sz+kweBr)Dx886ujX9kJZ?KMgaiLMiFa!ji2ec%-` zO@eh0l6&$K^-u`IT-efDrVaqghEEwuv}G>k`&hju?}4x5IQ>}}y=77qun)eE!H&p( z+s77IfhZtxVRpjqQuu#cOwOv@!;rfq!i_HI<05zEm~7LG%L~71%p$2^`7>GsVNiiH z!xYtEY54LvOs(u{pNF@oIOI3ewbNq%4r`fgsuZ;w0IIl2k@vZzr36c%mT7#n@-1Tu zF(+3m6p9}Ne2@C2EX#30dvc_Y94=PdXFOZePV?eM2UiLrKTZ~W%PY+cPV~@eF;CNF z)3gBUhYntjBh^4MiZPkifKBBbVq`h)k|o!Qw=u%6P>3RrB(Nd8m*r#^h@kt2f>bIj zSw;^c;#nom8tYaEqID}9CgQm1jWqT|JOa8~;Ern1j)V|(Xh(b`)FOFcAzpTrBU zKWCW6@C3{Vvy9*jf(&IEDq%#>$Cq55go9kRS8JAq!u9uT351~&06af#H4y_0KP@9l4E~&Cb zD&?3=aZGzN&3R1dtE9eBFP0&B$re{vEUss*+*;c*6unlq=4xVG$n#yJMWW&`n1BD^ zyew+g*OL}N_O-5&OmX@$C#=tP@KixC)28Ifwt_`X_O#oQhi9HPKYey&QeFza5LhDb z3yk)bfjE(X%0-J{VZ=*yU}%MQsR_8}9BkClfozJw1-{gjR}xw+YfH^(h-cM~v5~AI z4mm0)dzVT^EFo$$NM z7`NAU_f#RNo&8plX+bDO_oU8a`H=-`+YKVsf=fS{P;n@>(~7LPQolnyC?YHQQ1Bw4 z2pR1%s^WG!jhAs4-*0Y~>`;8E0F%n%$!vUeZyb`6PqrO28E-d9zDA=1B)VjU>-~7Z9X)EU3fWQRvxF=MC`pu_!uPQHRN_|xcA7DI_%;j zV^n?fQQ)!1)rWd>E6)l(75+9ItJAZ3wl%RGg>N-N#PP?LJ?@VOV}ghM(Zn74V}CUC z$HaGh+jT~c+w1k*u{9VGYht^|avd`8hrP*UvQ;vE3vzN1hQ@VpKToM~&C|bNqYc~b zZL%VlP+w!3#H=GvUVQ&NuaCfz?B+5_ccsO&v%p8-VOf?nbR76=Syu6{<&3Nsw$rmm zPH*7Y&I`*P4DG=S!#V=*t)CT5QS!oiFt1|ezL8J6-9DKIn4F&&M%zeZ?}Ytwa+=wm z*$HSJkS`}E|ArI?^Mv?6m~!LI*0fHX+;=~*4IuEkX%ehA9gk8IjyXS=Df$1j3*QqG z{$SE{6B0TnBsGohk0&Rmr-1$2hUJ2NJv}`&ZafsRHDwj1^yK8^ + +## Helm-Chart + +##### Scan Results + +#### Chart Object: filerun/charts/mariadb/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |

Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-mariadb' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of StatefulSet 'RELEASE-NAME-mariadb' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


StatefulSet 'RELEASE-NAME-mariadb' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-mariadb' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'mariadb-init' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-filerun' of Deployment 'RELEASE-NAME-filerun' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-filerun' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'mariadb-init' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-filerun' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'mariadb-init' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-filerun' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'mariadb-init' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-filerun' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'mariadb-init' of Deployment 'RELEASE-NAME-filerun' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-filerun' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-filerun' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/mariadb:v10.7.3@sha256:63743b10ac562b8f63abd3dfa246298c6678cfeb9e7559c65265f5066385fcf6 + tccr.io/truecharts/filerun:latest@sha256:cc7b8c11610fd5cde28301fa4f68b7d9609e61613fbfbc277c0491ad584a0256 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/mariadb:v10.7.3@sha256:a449af8351ad73fb2807057028ddc2f25c350a59b89686c6ac0e6170f6787005 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/mariadb:v10.7.3@sha256:63743b10ac562b8f63abd3dfa246298c6678cfeb9e7559c65265f5066385fcf6 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | 2:6.1.2+dfsg-4+deb10u1 |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://ubuntu.com/security/notices/USN-5324-1
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://www.openwall.com/lists/oss-security/2022/03/24/1
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/filerun:latest@sha256:cc7b8c11610fd5cde28301fa4f68b7d9609e61613fbfbc277c0491ad584a0256 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apache2 | CVE-2021-44790 | CRITICAL | 2.4.38-3+deb10u6 | 2.4.38-3+deb10u7 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44790.html
https://linux.oracle.com/errata/ELSA-2022-0258.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2 | CVE-2022-22720 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
https://linux.oracle.com/cve/CVE-2022-22720.html
https://linux.oracle.com/errata/ELSA-2022-1049.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2 | CVE-2022-22721 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2 | CVE-2022-23943 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2 | CVE-2021-33193 | HIGH | 2.4.38-3+deb10u6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
| +| apache2 | CVE-2021-44224 | HIGH | 2.4.38-3+deb10u6 | 2.4.38-3+deb10u7 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2 | CVE-2022-22719 | HIGH | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2 | CVE-2019-17567 | MEDIUM | 2.4.38-3+deb10u6 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2 | CVE-2001-1534 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2 | CVE-2003-1307 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2 | CVE-2003-1580 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2003-1581 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2 | CVE-2007-0086 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2 | CVE-2007-1743 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2 | CVE-2007-3303 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2 | CVE-2008-0456 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-bin | CVE-2021-44790 | CRITICAL | 2.4.38-3+deb10u6 | 2.4.38-3+deb10u7 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44790.html
https://linux.oracle.com/errata/ELSA-2022-0258.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2-bin | CVE-2022-22720 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
https://linux.oracle.com/cve/CVE-2022-22720.html
https://linux.oracle.com/errata/ELSA-2022-1049.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-bin | CVE-2022-22721 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-bin | CVE-2022-23943 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-bin | CVE-2021-33193 | HIGH | 2.4.38-3+deb10u6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
| +| apache2-bin | CVE-2021-44224 | HIGH | 2.4.38-3+deb10u6 | 2.4.38-3+deb10u7 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2-bin | CVE-2022-22719 | HIGH | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-bin | CVE-2019-17567 | MEDIUM | 2.4.38-3+deb10u6 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-bin | CVE-2001-1534 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-bin | CVE-2003-1307 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-bin | CVE-2003-1580 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2003-1581 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-bin | CVE-2007-0086 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-bin | CVE-2007-1743 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-bin | CVE-2007-3303 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-bin | CVE-2008-0456 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-data | CVE-2021-44790 | CRITICAL | 2.4.38-3+deb10u6 | 2.4.38-3+deb10u7 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44790.html
https://linux.oracle.com/errata/ELSA-2022-0258.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2-data | CVE-2022-22720 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
https://linux.oracle.com/cve/CVE-2022-22720.html
https://linux.oracle.com/errata/ELSA-2022-1049.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-data | CVE-2022-22721 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-data | CVE-2022-23943 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-data | CVE-2021-33193 | HIGH | 2.4.38-3+deb10u6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
| +| apache2-data | CVE-2021-44224 | HIGH | 2.4.38-3+deb10u6 | 2.4.38-3+deb10u7 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2-data | CVE-2022-22719 | HIGH | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-data | CVE-2019-17567 | MEDIUM | 2.4.38-3+deb10u6 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-data | CVE-2001-1534 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-data | CVE-2003-1307 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-data | CVE-2003-1580 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2003-1581 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-data | CVE-2007-0086 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-data | CVE-2007-1743 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-data | CVE-2007-3303 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-data | CVE-2008-0456 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apache2-utils | CVE-2021-44790 | CRITICAL | 2.4.38-3+deb10u6 | 2.4.38-3+deb10u7 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44790.html
https://linux.oracle.com/errata/ELSA-2022-0258.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2-utils | CVE-2022-22720 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
https://linux.oracle.com/cve/CVE-2022-22720.html
https://linux.oracle.com/errata/ELSA-2022-1049.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-utils | CVE-2022-22721 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-utils | CVE-2022-23943 | CRITICAL | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-utils | CVE-2021-33193 | HIGH | 2.4.38-3+deb10u6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
| +| apache2-utils | CVE-2021-44224 | HIGH | 2.4.38-3+deb10u6 | 2.4.38-3+deb10u7 |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/12/20/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20211224-0001/
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
| +| apache2-utils | CVE-2022-22719 | HIGH | 2.4.38-3+deb10u6 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
| +| apache2-utils | CVE-2019-17567 | MEDIUM | 2.4.38-3+deb10u6 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-utils | CVE-2001-1534 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| +| apache2-utils | CVE-2003-1307 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| +| apache2-utils | CVE-2003-1580 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2003-1581 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://www.securityfocus.com/archive/1/313867
| +| apache2-utils | CVE-2007-0086 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/33456
http://www.securityfocus.com/archive/1/455833/100/0/threaded
http://www.securityfocus.com/archive/1/455879/100/0/threaded
http://www.securityfocus.com/archive/1/455882/100/0/threaded
http://www.securityfocus.com/archive/1/455920/100/0/threaded
| +| apache2-utils | CVE-2007-1743 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511
http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
http://www.securitytracker.com/id?1017904
| +| apache2-utils | CVE-2007-3303 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| +| apache2-utils | CVE-2008-0456 | LOW | 2.4.38-3+deb10u6 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| binutils | CVE-2017-13716 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils | CVE-2018-1000876 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106304
https://access.redhat.com/errata/RHSA-2019:2075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
https://linux.oracle.com/cve/CVE-2018-1000876.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23994
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12697 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104538
https://access.redhat.com/errata/RHSA-2019:2075
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://linux.oracle.com/cve/CVE-2018-12697.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12698 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104539
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12699 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104540
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-12934 | LOW | 2.31.1-16 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17358 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
https://seclists.org/bugtraq/2020/Jan/25
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17359 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17360 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17794 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-17985 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18309 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
https://sourceware.org/bugzilla/show_bug.cgi?id=23770
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18483 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18484 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18605 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18606 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18607 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18700 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-18701 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-19931 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23942
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-19932 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20002 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20623 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20651 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=24041
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20671 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://sourceware.org/bugzilla/show_bug.cgi?id=24005
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-20673 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils | CVE-2018-20712 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils | CVE-2018-9138 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
https://sourceware.org/bugzilla/show_bug.cgi?id=23008
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2018-9996 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils | CVE-2019-1010180 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
| +| binutils | CVE-2019-1010204 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils | CVE-2019-12972 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-14250 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-14444 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-17450 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-17451 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9070 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24229
https://support.f5.com/csp/article/K13534168
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9071 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24227
https://support.f5.com/csp/article/K02884135
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9073 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24233
https://support.f5.com/csp/article/K37121474
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9074 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9075 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2019-9077 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils | CVE-2020-16590 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
| +| binutils | CVE-2020-16591 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
| +| binutils | CVE-2020-16592 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils | CVE-2020-16593 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
| +| binutils | CVE-2020-16599 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
| +| binutils | CVE-2020-35448 | LOW | 2.31.1-16 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils | CVE-2020-35493 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35494 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35495 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35496 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2020-35507 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils | CVE-2021-20197 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils | CVE-2021-20284 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils | CVE-2021-20294 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
| +| binutils | CVE-2021-3487 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils | CVE-2021-3530 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils | CVE-2021-3549 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils | CVE-2021-45078 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils | CVE-2021-46195 | LOW | 2.31.1-16 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| binutils-common | CVE-2017-13716 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-common | CVE-2018-1000876 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106304
https://access.redhat.com/errata/RHSA-2019:2075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
https://linux.oracle.com/cve/CVE-2018-1000876.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23994
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-12697 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104538
https://access.redhat.com/errata/RHSA-2019:2075
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://linux.oracle.com/cve/CVE-2018-12697.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-12698 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104539
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-12699 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104540
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-12934 | LOW | 2.31.1-16 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17358 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
https://seclists.org/bugtraq/2020/Jan/25
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17359 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17360 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17794 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-17985 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18309 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
https://sourceware.org/bugzilla/show_bug.cgi?id=23770
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18483 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18484 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18605 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18606 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18607 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18700 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-18701 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-19931 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23942
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-19932 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20002 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20623 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20651 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=24041
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20671 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://sourceware.org/bugzilla/show_bug.cgi?id=24005
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-20673 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-common | CVE-2018-20712 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-common | CVE-2018-9138 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
https://sourceware.org/bugzilla/show_bug.cgi?id=23008
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2018-9996 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-common | CVE-2019-1010180 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
| +| binutils-common | CVE-2019-1010204 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-common | CVE-2019-12972 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-14250 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-14444 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-17450 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-17451 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9070 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24229
https://support.f5.com/csp/article/K13534168
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9071 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24227
https://support.f5.com/csp/article/K02884135
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9073 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24233
https://support.f5.com/csp/article/K37121474
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9074 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9075 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2019-9077 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-common | CVE-2020-16590 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
| +| binutils-common | CVE-2020-16591 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
| +| binutils-common | CVE-2020-16592 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-common | CVE-2020-16593 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
| +| binutils-common | CVE-2020-16599 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
| +| binutils-common | CVE-2020-35448 | LOW | 2.31.1-16 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-common | CVE-2020-35493 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2020-35494 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2020-35495 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2020-35496 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2020-35507 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-common | CVE-2021-20197 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-common | CVE-2021-20284 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-common | CVE-2021-20294 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
| +| binutils-common | CVE-2021-3487 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils-common | CVE-2021-3530 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-common | CVE-2021-3549 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-common | CVE-2021-45078 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils-common | CVE-2021-46195 | LOW | 2.31.1-16 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| binutils-x86-64-linux-gnu | CVE-2017-13716 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| binutils-x86-64-linux-gnu | CVE-2018-1000876 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106304
https://access.redhat.com/errata/RHSA-2019:2075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
https://linux.oracle.com/cve/CVE-2018-1000876.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23994
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-12697 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104538
https://access.redhat.com/errata/RHSA-2019:2075
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://linux.oracle.com/cve/CVE-2018-12697.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-12698 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104539
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-12699 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104540
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-12934 | LOW | 2.31.1-16 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17358 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
https://seclists.org/bugtraq/2020/Jan/25
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17359 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17360 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17794 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-17985 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18309 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
https://sourceware.org/bugzilla/show_bug.cgi?id=23770
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18483 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18484 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18605 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18606 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18607 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18700 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-18701 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-19931 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23942
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-19932 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20002 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20623 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20651 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=24041
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20671 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://sourceware.org/bugzilla/show_bug.cgi?id=24005
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-20673 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| binutils-x86-64-linux-gnu | CVE-2018-20712 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| binutils-x86-64-linux-gnu | CVE-2018-9138 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
https://sourceware.org/bugzilla/show_bug.cgi?id=23008
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2018-9996 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| binutils-x86-64-linux-gnu | CVE-2019-1010180 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
| +| binutils-x86-64-linux-gnu | CVE-2019-1010204 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| binutils-x86-64-linux-gnu | CVE-2019-12972 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-14250 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-14444 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-17450 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-17451 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9070 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24229
https://support.f5.com/csp/article/K13534168
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9071 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24227
https://support.f5.com/csp/article/K02884135
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9073 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24233
https://support.f5.com/csp/article/K37121474
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9074 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9075 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2019-9077 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| binutils-x86-64-linux-gnu | CVE-2020-16590 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
| +| binutils-x86-64-linux-gnu | CVE-2020-16591 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
| +| binutils-x86-64-linux-gnu | CVE-2020-16592 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| binutils-x86-64-linux-gnu | CVE-2020-16593 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
| +| binutils-x86-64-linux-gnu | CVE-2020-16599 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
| +| binutils-x86-64-linux-gnu | CVE-2020-35448 | LOW | 2.31.1-16 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| binutils-x86-64-linux-gnu | CVE-2020-35493 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2020-35494 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2020-35495 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2020-35496 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2020-35507 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| binutils-x86-64-linux-gnu | CVE-2021-20197 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| binutils-x86-64-linux-gnu | CVE-2021-20284 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| binutils-x86-64-linux-gnu | CVE-2021-20294 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
| +| binutils-x86-64-linux-gnu | CVE-2021-3487 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils-x86-64-linux-gnu | CVE-2021-3530 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| binutils-x86-64-linux-gnu | CVE-2021-3549 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| binutils-x86-64-linux-gnu | CVE-2021-45078 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| binutils-x86-64-linux-gnu | CVE-2021-46195 | LOW | 2.31.1-16 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| cpp-8 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| cpp-8 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ffmpeg | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| ffmpeg | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| ffmpeg | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| ffmpeg | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| ffmpeg | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| ffmpeg | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| ffmpeg | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| ffmpeg | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| ffmpeg | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| ffmpeg | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| ffmpeg | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| ffmpeg | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| ffmpeg | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| ffmpeg | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| ffmpeg | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| ffmpeg | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| ffmpeg | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| ffmpeg | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| ffmpeg | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| ffmpeg | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| ffmpeg | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| ffmpeg | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| g++-8 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| g++-8 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gcc-8 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gir1.2-poppler-0.18 | CVE-2019-14494 | HIGH | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494
https://gitlab.freedesktop.org/poppler/poppler/issues/802
https://gitlab.freedesktop.org/poppler/poppler/merge_requests/317
https://linux.oracle.com/cve/CVE-2019-14494.html
https://linux.oracle.com/errata/ELSA-2020-4643.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AHYAM32PALHQXL3O4DKIJ3EJB6AKBOVC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLAQBLBIIL3A5XZQYR4MG3Z4LIPIC42P/
https://ubuntu.com/security/notices/USN-4091-1
https://usn.ubuntu.com/4091-1/
| +| gir1.2-poppler-0.18 | CVE-2020-27778 | HIGH | 0.71.0-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1900712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27778
https://linux.oracle.com/cve/CVE-2020-27778.html
https://linux.oracle.com/errata/ELSA-2021-1881.html
https://ubuntu.com/security/notices/USN-4646-1
| +| gir1.2-poppler-0.18 | CVE-2013-4472 | LOW | 0.71.0-5 | |
Expand...http://osvdb.org/99064
http://poppler.freedesktop.org/releases.html
http://seclists.org/oss-sec/2013/q4/181
http://seclists.org/oss-sec/2013/q4/183
| +| gir1.2-poppler-0.18 | CVE-2017-2814 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0311
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0311
| +| gir1.2-poppler-0.18 | CVE-2017-2818 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0319
| +| gir1.2-poppler-0.18 | CVE-2017-2820 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2820
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321
https://ubuntu.com/security/notices/USN-3350-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0321
| +| gir1.2-poppler-0.18 | CVE-2017-9083 | LOW | 0.71.0-5 | |
Expand...https://bugs.freedesktop.org/show_bug.cgi?id=101084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9083
https://lists.freedesktop.org/archives/poppler/2017-May/012230.html
https://security.gentoo.org/glsa/201801-17
https://ubuntu.com/security/notices/USN-3350-1
| +| gir1.2-poppler-0.18 | CVE-2018-18897 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18897
https://gitlab.freedesktop.org/poppler/poppler/issues/654
https://linux.oracle.com/cve/CVE-2018-18897.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| gir1.2-poppler-0.18 | CVE-2018-19058 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19058
https://gitlab.freedesktop.org/poppler/poppler/issues/659
https://linux.oracle.com/cve/CVE-2018-19058.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| gir1.2-poppler-0.18 | CVE-2018-19059 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19059
https://gitlab.freedesktop.org/poppler/poppler/issues/661
https://linux.oracle.com/cve/CVE-2018-19059.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| gir1.2-poppler-0.18 | CVE-2018-19060 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19060
https://gitlab.freedesktop.org/poppler/poppler/issues/660
https://linux.oracle.com/cve/CVE-2018-19060.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| gir1.2-poppler-0.18 | CVE-2018-20650 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/106459
https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20650
https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7
https://gitlab.freedesktop.org/poppler/poppler/issues/704
https://linux.oracle.com/cve/CVE-2018-20650.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3865-1
https://usn.ubuntu.com/3865-1/
| +| gir1.2-poppler-0.18 | CVE-2019-10871 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107862
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871
https://gitlab.freedesktop.org/poppler/poppler/issues/751
https://linux.oracle.com/cve/CVE-2019-10871.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/
https://ubuntu.com/security/notices/USN-4646-1
https://ubuntu.com/security/notices/USN-4646-2
| +| gir1.2-poppler-0.18 | CVE-2019-11026 | LOW | 0.71.0-5 | |
Expand...https://gitlab.freedesktop.org/poppler/poppler/issues/752
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5JWQE2WP4W4F2FEYPYJQBPQIOG75MVH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/1508/
| +| gir1.2-poppler-0.18 | CVE-2019-9543 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543
https://gitlab.freedesktop.org/poppler/poppler/issues/730
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
| +| gir1.2-poppler-0.18 | CVE-2019-9545 | LOW | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545
https://gitlab.freedesktop.org/poppler/poppler/issues/731
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
| +| gir1.2-poppler-0.18 | CVE-2019-9903 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107560
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9903
https://gitlab.freedesktop.org/poppler/poppler/issues/741
https://linux.oracle.com/cve/CVE-2019-9903.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| gir1.2-poppler-0.18 | CVE-2019-9959 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/109342
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959
https://gitlab.freedesktop.org/poppler/poppler/blob/master/NEWS
https://linux.oracle.com/cve/CVE-2019-9959.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ZOYOZTGU4RGZW4E63OZ7LW4SMPEWGBV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6NX2XPMMV7O52F4NBNCHGILGJXM3OJZ/
https://ubuntu.com/security/notices/USN-4646-1
| +| gir1.2-rsvg-2.0 | CVE-2019-20446 | MEDIUM | 2.44.10-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446
https://gitlab.gnome.org/GNOME/librsvg/issues/515
https://linux.oracle.com/cve/CVE-2019-20446.html
https://linux.oracle.com/errata/ELSA-2020-4709.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
https://ubuntu.com/security/notices/USN-4436-1
https://ubuntu.com/security/notices/USN-4436-2
https://usn.ubuntu.com/4436-1/
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libaom0 | CVE-2021-30473 | CRITICAL | 1.0.0-3 | |
Expand...https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578
https://bugs.chromium.org/p/aomedia/issues/detail?id=2998
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2021-30474 | CRITICAL | 1.0.0-3 | |
Expand...https://aomedia.googlesource.com/aom/+/6e31957b6dc62dbc7d1bb70cd84902dd14c4bf2e
https://bugs.chromium.org/p/aomedia/issues/detail?id=3000
| +| libaom0 | CVE-2021-30475 | CRITICAL | 1.0.0-3 | |
Expand...https://aomedia.googlesource.com/aom/+/12adc723acf02633595a4d8da8345742729f46c0
https://bugs.chromium.org/p/aomedia/issues/detail?id=2999
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
| +| libaom0 | CVE-2020-36131 | HIGH | 1.0.0-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
| +| libaom0 | CVE-2020-36133 | HIGH | 1.0.0-3 | |
Expand...https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
| +| libaom0 | CVE-2020-36130 | MEDIUM | 1.0.0-3 | |
Expand...https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
| +| libaom0 | CVE-2020-36135 | MEDIUM | 1.0.0-3 | |
Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)
https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libasan5 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libasan5 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libass9 | CVE-2020-24994 | HIGH | 1:0.14.0-2 | |
Expand...https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
https://github.com/libass/libass/issues/422
https://github.com/libass/libass/issues/422#issuecomment-806002919
https://github.com/libass/libass/issues/423
| +| libass9 | CVE-2020-26682 | HIGH | 1:0.14.0-2 | |
Expand...http://www.openwall.com/lists/oss-security/2020/11/19/7
https://github.com/libass/libass/issues/431
https://github.com/libass/libass/pull/432
https://security.gentoo.org/glsa/202012-12
| +| libatomic1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libatomic1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libavahi-client3 | CVE-2021-3468 | MEDIUM | 0.7-4+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://ubuntu.com/security/notices/USN-5008-1
https://ubuntu.com/security/notices/USN-5008-2
| +| libavahi-client3 | CVE-2017-6519 | LOW | 0.7-4+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1426712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519
https://github.com/lathiat/avahi/issues/203
https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
https://linux.oracle.com/cve/CVE-2017-6519.html
https://linux.oracle.com/errata/ELSA-2020-1176.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3876-1
https://ubuntu.com/security/notices/USN-3876-2
https://usn.ubuntu.com/3876-1/
https://usn.ubuntu.com/3876-2/
https://www.kb.cert.org/vuls/id/550620
https://www.secfu.net/advisories
| +| libavahi-common-data | CVE-2021-3468 | MEDIUM | 0.7-4+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://ubuntu.com/security/notices/USN-5008-1
https://ubuntu.com/security/notices/USN-5008-2
| +| libavahi-common-data | CVE-2017-6519 | LOW | 0.7-4+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1426712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519
https://github.com/lathiat/avahi/issues/203
https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
https://linux.oracle.com/cve/CVE-2017-6519.html
https://linux.oracle.com/errata/ELSA-2020-1176.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3876-1
https://ubuntu.com/security/notices/USN-3876-2
https://usn.ubuntu.com/3876-1/
https://usn.ubuntu.com/3876-2/
https://www.kb.cert.org/vuls/id/550620
https://www.secfu.net/advisories
| +| libavahi-common3 | CVE-2021-3468 | MEDIUM | 0.7-4+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://ubuntu.com/security/notices/USN-5008-1
https://ubuntu.com/security/notices/USN-5008-2
| +| libavahi-common3 | CVE-2017-6519 | LOW | 0.7-4+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1426712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519
https://github.com/lathiat/avahi/issues/203
https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
https://linux.oracle.com/cve/CVE-2017-6519.html
https://linux.oracle.com/errata/ELSA-2020-1176.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-3876-1
https://ubuntu.com/security/notices/USN-3876-2
https://usn.ubuntu.com/3876-1/
https://usn.ubuntu.com/3876-2/
https://www.kb.cert.org/vuls/id/550620
https://www.secfu.net/advisories
| +| libavcodec58 | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| libavcodec58 | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| libavcodec58 | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| libavcodec58 | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| libavcodec58 | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| libavcodec58 | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavcodec58 | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libavcodec58 | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| libavcodec58 | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| libavcodec58 | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| libavcodec58 | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libavcodec58 | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| libavcodec58 | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| libavcodec58 | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| libavcodec58 | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| libavcodec58 | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| libavcodec58 | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| libavcodec58 | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavcodec58 | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavcodec58 | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavcodec58 | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavcodec58 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavdevice58 | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| libavdevice58 | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| libavdevice58 | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| libavdevice58 | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libavdevice58 | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libavdevice58 | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| libavdevice58 | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libavdevice58 | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| libavdevice58 | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavdevice58 | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libavdevice58 | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| libavdevice58 | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| libavdevice58 | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| libavdevice58 | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libavdevice58 | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| libavdevice58 | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| libavdevice58 | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| libavdevice58 | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| libavdevice58 | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| libavdevice58 | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| libavdevice58 | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavdevice58 | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavdevice58 | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavdevice58 | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavdevice58 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavfilter7 | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| libavfilter7 | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| libavfilter7 | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| libavfilter7 | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libavfilter7 | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libavfilter7 | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| libavfilter7 | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libavfilter7 | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| libavfilter7 | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavfilter7 | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libavfilter7 | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| libavfilter7 | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| libavfilter7 | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| libavfilter7 | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libavfilter7 | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| libavfilter7 | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| libavfilter7 | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| libavfilter7 | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| libavfilter7 | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| libavfilter7 | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| libavfilter7 | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavfilter7 | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavfilter7 | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavfilter7 | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavfilter7 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavformat58 | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| libavformat58 | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| libavformat58 | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| libavformat58 | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| libavformat58 | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| libavformat58 | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavformat58 | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libavformat58 | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| libavformat58 | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| libavformat58 | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| libavformat58 | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libavformat58 | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| libavformat58 | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| libavformat58 | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| libavformat58 | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| libavformat58 | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| libavformat58 | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| libavformat58 | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavformat58 | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavformat58 | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavformat58 | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavformat58 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavresample4 | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| libavresample4 | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| libavresample4 | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| libavresample4 | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libavresample4 | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libavresample4 | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| libavresample4 | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libavresample4 | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| libavresample4 | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavresample4 | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libavresample4 | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| libavresample4 | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| libavresample4 | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| libavresample4 | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libavresample4 | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| libavresample4 | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| libavresample4 | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| libavresample4 | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| libavresample4 | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| libavresample4 | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| libavresample4 | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavresample4 | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavresample4 | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavresample4 | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavresample4 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavutil56 | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| libavutil56 | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| libavutil56 | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| libavutil56 | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| libavutil56 | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| libavutil56 | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavutil56 | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libavutil56 | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| libavutil56 | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| libavutil56 | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| libavutil56 | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libavutil56 | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| libavutil56 | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| libavutil56 | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| libavutil56 | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| libavutil56 | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| libavutil56 | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| libavutil56 | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavutil56 | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavutil56 | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavutil56 | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libavutil56 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libbinutils | CVE-2017-13716 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| +| libbinutils | CVE-2018-1000876 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106304
https://access.redhat.com/errata/RHSA-2019:2075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
https://linux.oracle.com/cve/CVE-2018-1000876.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://sourceware.org/bugzilla/show_bug.cgi?id=23994
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3a551c7a1b80fca579461774860574eabfd7f18f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-12697 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104538
https://access.redhat.com/errata/RHSA-2019:2075
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://linux.oracle.com/cve/CVE-2018-12697.html
https://linux.oracle.com/errata/ELSA-2019-2075.html
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-12698 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104539
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-12699 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/104540
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-12934 | LOW | 2.31.1-16 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17358 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
https://seclists.org/bugtraq/2020/Jan/25
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17359 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
https://sourceware.org/bugzilla/show_bug.cgi?id=23686
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17360 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17794 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-17985 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18309 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
https://sourceware.org/bugzilla/show_bug.cgi?id=23770
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18483 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18484 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18605 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18606 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18607 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18700 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-18701 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-19931 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23942
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-19932 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20002 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20623 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
https://sourceware.org/bugzilla/show_bug.cgi?id=24049
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20651 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=24041
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
https://support.f5.com/csp/article/K38336243
https://ubuntu.com/security/notices/USN-4336-1
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20671 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
https://sourceware.org/bugzilla/show_bug.cgi?id=24005
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11fa9f134fd658075c6f74499c780df045d9e9ca
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-20673 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106454
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
| +| libbinutils | CVE-2018-20712 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/106563
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
https://sourceware.org/bugzilla/show_bug.cgi?id=24043
https://support.f5.com/csp/article/K38336243
| +| libbinutils | CVE-2018-9138 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
https://sourceware.org/bugzilla/show_bug.cgi?id=23008
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2018-9996 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/103733
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
| +| libbinutils | CVE-2019-1010180 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
| +| libbinutils | CVE-2019-1010204 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
| +| libbinutils | CVE-2019-12972 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-14250 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-14444 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-17450 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-17451 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9070 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24229
https://support.f5.com/csp/article/K13534168
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9071 | LOW | 2.31.1-16 | |
Expand...http://www.securityfocus.com/bid/107147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24227
https://support.f5.com/csp/article/K02884135
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9073 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24233
https://support.f5.com/csp/article/K37121474
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9074 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9075 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2019-9077 | LOW | 2.31.1-16 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
| +| libbinutils | CVE-2020-16590 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
| +| libbinutils | CVE-2020-16591 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
| +| libbinutils | CVE-2020-16592 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
| +| libbinutils | CVE-2020-16593 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
| +| libbinutils | CVE-2020-16599 | LOW | 2.31.1-16 | |
Expand...https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
| +| libbinutils | CVE-2020-35448 | LOW | 2.31.1-16 | |
Expand...https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
| +| libbinutils | CVE-2020-35493 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2020-35494 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2020-35495 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2020-35496 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2020-35507 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://security.netapp.com/advisory/ntap-20210212-0007/
| +| libbinutils | CVE-2021-20197 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
| +| libbinutils | CVE-2021-20284 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784
https://linux.oracle.com/cve/CVE-2021-20284.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://security.netapp.com/advisory/ntap-20210521-0010/
https://sourceware.org/bugzilla/show_bug.cgi?id=26931
| +| libbinutils | CVE-2021-20294 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
| +| libbinutils | CVE-2021-3487 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
https://linux.oracle.com/cve/CVE-2021-3487.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
https://ubuntu.com/security/notices/USN-5124-1
https://ubuntu.com/security/notices/USN-5341-1
| +| libbinutils | CVE-2021-3530 | LOW | 2.31.1-16 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3530
https://bugzilla.redhat.com/show_bug.cgi?id=1956423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
https://security.netapp.com/advisory/ntap-20210716-0006/
https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
| +| libbinutils | CVE-2021-3549 | LOW | 2.31.1-16 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
| +| libbinutils | CVE-2021-45078 | LOW | 2.31.1-16 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| +| libbinutils | CVE-2021-46195 | LOW | 2.31.1-16 | |
Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
| +| libblkid-dev | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid-dev | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-dev-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-dev-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-dev-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-dev-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-dev-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-dev-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-dev-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-dev-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-dev-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-dev-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-dev-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-dev-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-dev-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-dev-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-dev-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-dev-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-dev-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6-dev | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6-dev | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6-dev | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6-dev | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6-dev | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6-dev | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6-dev | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6-dev | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6-dev | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6-dev | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6-dev | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6-dev | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6-dev | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6-dev | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6-dev | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6-dev | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6-dev | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6-dev | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcaca0 | CVE-2021-30498 | CRITICAL | 0.99.beta19-2.1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1948675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30498
https://github.com/cacalabs/libcaca/issues/53
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/
https://ubuntu.com/security/notices/USN-5119-1
| +| libcaca0 | CVE-2021-30499 | CRITICAL | 0.99.beta19-2.1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1948679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30499
https://github.com/cacalabs/libcaca/issues/54
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/
https://ubuntu.com/security/notices/USN-5119-1
| +| libcaca0 | CVE-2021-3410 | HIGH | 0.99.beta19-2.1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3410
https://github.com/cacalabs/libcaca/issues/52
https://lists.debian.org/debian-lts-announce/2021/03/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/
https://ubuntu.com/security/notices/USN-4921-1
| +| libcaca0 | CVE-2022-0856 | LOW | 0.99.beta19-2.1 | |
Expand...https://github.com/cacalabs/libcaca/issues/65
| +| libcairo-gobject2 | CVE-2017-7475 | LOW | 1.16.0-4+deb10u1 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo-gobject2 | CVE-2018-18064 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-gobject2 | CVE-2019-6461 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-gobject2 | CVE-2019-6462 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-script-interpreter2 | CVE-2017-7475 | LOW | 1.16.0-4+deb10u1 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo-script-interpreter2 | CVE-2018-18064 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-script-interpreter2 | CVE-2019-6461 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-script-interpreter2 | CVE-2019-6462 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2017-7475 | LOW | 1.16.0-4+deb10u1 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo2 | CVE-2018-18064 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6461 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6462 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2-dev | CVE-2017-7475 | LOW | 1.16.0-4+deb10u1 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo2-dev | CVE-2018-18064 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2-dev | CVE-2019-6461 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2-dev | CVE-2019-6462 | LOW | 1.16.0-4+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcc1-0 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libcc1-0 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libcroco3 | CVE-2017-8834 | LOW | 0.6.12-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html
http://seclists.org/fulldisclosure/2017/Jun/10
http://www.openwall.com/lists/oss-security/2020/08/13/3
https://bugzilla.gnome.org/show_bug.cgi?id=782647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834
https://www.exploit-db.com/exploits/42147/
| +| libcroco3 | CVE-2017-8871 | LOW | 0.6.12-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html
http://seclists.org/fulldisclosure/2017/Jun/10
http://www.openwall.com/lists/oss-security/2020/08/13/3
https://bugzilla.gnome.org/show_bug.cgi?id=782649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871
https://www.exploit-db.com/exploits/42147/
| +| libcroco3 | CVE-2020-12825 | LOW | 0.6.12-3 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/13/3
http://www.openwall.com/lists/oss-security/2020/09/08/3
https://gitlab.gnome.org/GNOME/libcroco/-/issues/8
https://linux.oracle.com/cve/CVE-2020-12825.html
https://linux.oracle.com/errata/ELSA-2020-4072.html
| +| libcups2 | CVE-2020-10001 | MEDIUM | 2.2.10-6+deb10u4 | 2.2.10-6+deb10u5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
https://linux.oracle.com/cve/CVE-2020-10001.html
https://linux.oracle.com/errata/ELSA-2021-4393.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html
https://support.apple.com/en-us/HT212011
| +| libcups2 | CVE-2014-8166 | LOW | 2.2.10-6+deb10u4 | |
Expand...http://www.openwall.com/lists/oss-security/2015/03/24/15
http://www.openwall.com/lists/oss-security/2015/03/24/2
http://www.securityfocus.com/bid/73300
https://bugzilla.redhat.com/show_bug.cgi?id=1084577
| +| libcupsimage2 | CVE-2020-10001 | MEDIUM | 2.2.10-6+deb10u4 | 2.2.10-6+deb10u5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
https://linux.oracle.com/cve/CVE-2020-10001.html
https://linux.oracle.com/errata/ELSA-2021-4393.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html
https://support.apple.com/en-us/HT212011
| +| libcupsimage2 | CVE-2014-8166 | LOW | 2.2.10-6+deb10u4 | |
Expand...http://www.openwall.com/lists/oss-security/2015/03/24/15
http://www.openwall.com/lists/oss-security/2015/03/24/2
http://www.securityfocus.com/bid/73300
https://bugzilla.redhat.com/show_bug.cgi?id=1084577
| +| libcurl3-gnutls | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl3-gnutls | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4-gnutls-dev | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4-gnutls-dev | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4-gnutls-dev | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4-gnutls-dev | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4-gnutls-dev | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4-gnutls-dev | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libde265-0 | CVE-2020-21598 | HIGH | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/237
| +| libde265-0 | CVE-2021-36409 | HIGH | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/300
| +| libde265-0 | CVE-2020-21594 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/233
| +| libde265-0 | CVE-2020-21595 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/239
| +| libde265-0 | CVE-2020-21596 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/236
| +| libde265-0 | CVE-2020-21597 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/238
| +| libde265-0 | CVE-2020-21599 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/235
| +| libde265-0 | CVE-2020-21600 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/243
| +| libde265-0 | CVE-2020-21601 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/241
| +| libde265-0 | CVE-2020-21602 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/242
| +| libde265-0 | CVE-2020-21603 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/240
| +| libde265-0 | CVE-2020-21604 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/231
| +| libde265-0 | CVE-2020-21605 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/234
| +| libde265-0 | CVE-2020-21606 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/232
| +| libde265-0 | CVE-2021-35452 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/298
| +| libde265-0 | CVE-2021-36408 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/299
| +| libde265-0 | CVE-2021-36410 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/301
| +| libde265-0 | CVE-2021-36411 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/302
| +| libde265-dev | CVE-2020-21598 | HIGH | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/237
| +| libde265-dev | CVE-2021-36409 | HIGH | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/300
| +| libde265-dev | CVE-2020-21594 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/233
| +| libde265-dev | CVE-2020-21595 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/239
| +| libde265-dev | CVE-2020-21596 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/236
| +| libde265-dev | CVE-2020-21597 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/238
| +| libde265-dev | CVE-2020-21599 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/235
| +| libde265-dev | CVE-2020-21600 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/243
| +| libde265-dev | CVE-2020-21601 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/241
| +| libde265-dev | CVE-2020-21602 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/242
| +| libde265-dev | CVE-2020-21603 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/240
| +| libde265-dev | CVE-2020-21604 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/231
| +| libde265-dev | CVE-2020-21605 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/234
| +| libde265-dev | CVE-2020-21606 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/232
| +| libde265-dev | CVE-2021-35452 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/298
| +| libde265-dev | CVE-2021-36408 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/299
| +| libde265-dev | CVE-2021-36410 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/301
| +| libde265-dev | CVE-2021-36411 | MEDIUM | 1.0.3-1 | |
Expand...https://github.com/strukturag/libde265/issues/302
| +| libexpat1 | CVE-2022-22822 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22822.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22823 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22823.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22824 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22824.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23852 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://linux.oracle.com/cve/CVE-2022-23852.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://security.netapp.com/advisory/ntap-20220217-0001/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23990 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://linux.oracle.com/cve/CVE-2022-23990.html
https://linux.oracle.com/errata/ELSA-2022-9232.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-25235 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
https://github.com/libexpat/libexpat/pull/562
https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
https://linux.oracle.com/cve/CVE-2022-25235.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2022-25236 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://github.com/libexpat/libexpat/pull/561
https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
https://github.com/libexpat/libexpat/pull/577
https://linux.oracle.com/cve/CVE-2022-25236.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2022-25315 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://github.com/libexpat/libexpat/pull/559
https://linux.oracle.com/cve/CVE-2022-25315.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2021-45960 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
https://linux.oracle.com/cve/CVE-2021-45960.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://security.netapp.com/advisory/ntap-20220121-0004/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2021-46143 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://linux.oracle.com/cve/CVE-2021-46143.html
https://linux.oracle.com/errata/ELSA-2022-9227.html
https://security.netapp.com/advisory/ntap-20220121-0006/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22825 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22825.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22826 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22826.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22827 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22827.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-25314 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
https://github.com/libexpat/libexpat/pull/560
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2022-25313 | MEDIUM | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://github.com/libexpat/libexpat/pull/558
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1 | CVE-2013-0340 | LOW | 2.2.6-2+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libexpat1 | DSA-5085-2 | UNKNOWN | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u4 |
Expand...
| +| libexpat1-dev | CVE-2022-22822 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22822.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2022-22823 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22823.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2022-22824 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22824.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2022-23852 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://linux.oracle.com/cve/CVE-2022-23852.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://security.netapp.com/advisory/ntap-20220217-0001/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2022-23990 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://linux.oracle.com/cve/CVE-2022-23990.html
https://linux.oracle.com/errata/ELSA-2022-9232.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2022-25235 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
https://github.com/libexpat/libexpat/pull/562
https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
https://linux.oracle.com/cve/CVE-2022-25235.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1-dev | CVE-2022-25236 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://github.com/libexpat/libexpat/pull/561
https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
https://github.com/libexpat/libexpat/pull/577
https://linux.oracle.com/cve/CVE-2022-25236.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1-dev | CVE-2022-25315 | CRITICAL | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://github.com/libexpat/libexpat/pull/559
https://linux.oracle.com/cve/CVE-2022-25315.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1-dev | CVE-2021-45960 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
https://linux.oracle.com/cve/CVE-2021-45960.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://security.netapp.com/advisory/ntap-20220121-0004/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2021-46143 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://linux.oracle.com/cve/CVE-2021-46143.html
https://linux.oracle.com/errata/ELSA-2022-9227.html
https://security.netapp.com/advisory/ntap-20220121-0006/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2022-22825 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22825.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2022-22826 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22826.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2022-22827 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22827.html
https://linux.oracle.com/errata/ELSA-2022-0951.html
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
| +| libexpat1-dev | CVE-2022-25314 | HIGH | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
https://github.com/libexpat/libexpat/pull/560
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1-dev | CVE-2022-25313 | MEDIUM | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u3 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://github.com/libexpat/libexpat/pull/558
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
| +| libexpat1-dev | CVE-2013-0340 | LOW | 2.2.6-2+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libexpat1-dev | DSA-5085-2 | UNKNOWN | 2.2.6-2+deb10u1 | 2.2.6-2+deb10u4 |
Expand...
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libflac8 | CVE-2020-0499 | MEDIUM | 1.3.2-3 | 1.3.2-3+deb10u1 |
Expand...https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/
https://source.android.com/security/bulletin/pixel/2020-12-01
| +| libflac8 | CVE-2021-0561 | MEDIUM | 1.3.2-3 | |
Expand...https://github.com/xiph/flac/issues/243
https://lists.debian.org/debian-lts-announce/2022/03/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWXBVMPPSL377I7YM55ZYXVKVMYOKES2/
https://source.android.com/security/bulletin/pixel/2021-06-01
| +| libfribidi0 | CVE-2022-25308 | HIGH | 1.0.5-3.1+deb10u1 | |
Expand...
| +| libfribidi0 | CVE-2022-25309 | MEDIUM | 1.0.5-3.1+deb10u1 | |
Expand...
| +| libfribidi0 | CVE-2022-25310 | MEDIUM | 1.0.5-3.1+deb10u1 | |
Expand...
| +| libgcc-8-dev | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc-8-dev | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgif-dev | CVE-2018-11489 | HIGH | 5.1.4-3 | |
Expand...http://www.securityfocus.com/bid/104341
https://github.com/pts/sam2p/issues/37
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libgif-dev | CVE-2018-11490 | HIGH | 5.1.4-3 | |
Expand...http://www.securityfocus.com/bid/104327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11490
https://github.com/pts/sam2p/issues/38
https://ubuntu.com/security/notices/USN-4107-1
https://usn.ubuntu.com/4107-1/
| +| libgif-dev | CVE-2020-23922 | HIGH | 5.1.4-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceforge.net/p/giflib/bugs/151/
| +| libgif-dev | CVE-2019-15133 | MEDIUM | 5.1.4-3 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15133
https://sourceforge.net/p/giflib/bugs/119/
https://ubuntu.com/security/notices/USN-4107-1
https://usn.ubuntu.com/4107-1/
| +| libgif7 | CVE-2018-11489 | HIGH | 5.1.4-3 | |
Expand...http://www.securityfocus.com/bid/104341
https://github.com/pts/sam2p/issues/37
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libgif7 | CVE-2018-11490 | HIGH | 5.1.4-3 | |
Expand...http://www.securityfocus.com/bid/104327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11490
https://github.com/pts/sam2p/issues/38
https://ubuntu.com/security/notices/USN-4107-1
https://usn.ubuntu.com/4107-1/
| +| libgif7 | CVE-2020-23922 | HIGH | 5.1.4-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceforge.net/p/giflib/bugs/151/
| +| libgif7 | CVE-2019-15133 | MEDIUM | 5.1.4-3 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15133
https://sourceforge.net/p/giflib/bugs/119/
https://ubuntu.com/security/notices/USN-4107-1
https://usn.ubuntu.com/4107-1/
| +| libglib2.0-0 | CVE-2012-0039 | LOW | 2.58.3-2+deb10u3 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libglib2.0-0 | CVE-2020-35457 | LOW | 2.58.3-2+deb10u3 | |
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
| +| libglib2.0-bin | CVE-2012-0039 | LOW | 2.58.3-2+deb10u3 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libglib2.0-bin | CVE-2020-35457 | LOW | 2.58.3-2+deb10u3 | |
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
| +| libglib2.0-data | CVE-2012-0039 | LOW | 2.58.3-2+deb10u3 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libglib2.0-data | CVE-2020-35457 | LOW | 2.58.3-2+deb10u3 | |
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
| +| libglib2.0-dev | CVE-2012-0039 | LOW | 2.58.3-2+deb10u3 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libglib2.0-dev | CVE-2020-35457 | LOW | 2.58.3-2+deb10u3 | |
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
| +| libglib2.0-dev-bin | CVE-2012-0039 | LOW | 2.58.3-2+deb10u3 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libglib2.0-dev-bin | CVE-2020-35457 | LOW | 2.58.3-2+deb10u3 | |
Expand...https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
https://gitlab.gnome.org/GNOME/glib/-/issues/2197
https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | 2:6.1.2+dfsg-4+deb10u1 |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgomp1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgomp1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libheif-dev | CVE-2020-19498 | HIGH | 1.3.2-2~deb10u1 | |
Expand...https://github.com/strukturag/libheif/commit/2710c930918609caaf0a664e9c7bc3dce05d5b58
https://github.com/strukturag/libheif/issues/139
| +| libheif-dev | CVE-2020-19499 | HIGH | 1.3.2-2~deb10u1 | |
Expand...https://github.com/strukturag/libheif/commit/f7399b62d7fbc596f1b2871578c1d2053bedf1dd
https://github.com/strukturag/libheif/issues/138
| +| libheif-dev | CVE-2020-23109 | HIGH | 1.3.2-2~deb10u1 | |
Expand...https://github.com/strukturag/libheif/issues/207
| +| libheif1 | CVE-2020-19498 | HIGH | 1.3.2-2~deb10u1 | |
Expand...https://github.com/strukturag/libheif/commit/2710c930918609caaf0a664e9c7bc3dce05d5b58
https://github.com/strukturag/libheif/issues/139
| +| libheif1 | CVE-2020-19499 | HIGH | 1.3.2-2~deb10u1 | |
Expand...https://github.com/strukturag/libheif/commit/f7399b62d7fbc596f1b2871578c1d2053bedf1dd
https://github.com/strukturag/libheif/issues/138
| +| libheif1 | CVE-2020-23109 | HIGH | 1.3.2-2~deb10u1 | |
Expand...https://github.com/strukturag/libheif/issues/207
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libitm1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libitm1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libjack-jackd2-0 | CVE-2019-13351 | LOW | 1.9.12~dfsg-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13351
https://github.com/jackaudio/jack2/pull/480
https://github.com/xbmc/xbmc/issues/16258
| +| libjansson4 | CVE-2020-36325 | LOW | 2.12-1 | |
Expand...https://github.com/akheron/jansson/issues/548
| +| libjbig-dev | CVE-2017-9937 | LOW | 2.1-3.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libjbig2dec0 | CVE-2020-12268 | CRITICAL | 0.16-1 | 0.16-1+deb10u1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00034.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20332
https://github.com/ArtifexSoftware/jbig2dec/commit/0726320a4b55078e9d8deb590e477d598b3da66e
https://github.com/ArtifexSoftware/jbig2dec/compare/0.17...0.18
https://linux.oracle.com/cve/CVE-2020-12268.html
https://linux.oracle.com/errata/ELSA-2020-2897.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00023.html
| +| libjpeg62-turbo | CVE-2017-15232 | LOW | 1:1.5.2-2+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232
https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182
https://github.com/mozilla/mozjpeg/issues/268
https://ubuntu.com/security/notices/USN-3706-1
https://usn.ubuntu.com/3706-1/
| +| libjpeg62-turbo | CVE-2018-11813 | LOW | 1:1.5.2-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html
http://www.ijg.org/files/jpegsrc.v9d.tar.gz
https://access.redhat.com/errata/RHSA-2019:2052
https://bugs.gentoo.org/727908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813
https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c
https://linux.oracle.com/cve/CVE-2018-11813.html
https://linux.oracle.com/errata/ELSA-2019-2052.html
| +| libjpeg62-turbo | CVE-2020-17541 | LOW | 1:1.5.2-2+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
| +| libjpeg62-turbo-dev | CVE-2017-15232 | LOW | 1:1.5.2-2+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232
https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182
https://github.com/mozilla/mozjpeg/issues/268
https://ubuntu.com/security/notices/USN-3706-1
https://usn.ubuntu.com/3706-1/
| +| libjpeg62-turbo-dev | CVE-2018-11813 | LOW | 1:1.5.2-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html
http://www.ijg.org/files/jpegsrc.v9d.tar.gz
https://access.redhat.com/errata/RHSA-2019:2052
https://bugs.gentoo.org/727908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813
https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c
https://linux.oracle.com/cve/CVE-2018-11813.html
https://linux.oracle.com/errata/ELSA-2019-2052.html
| +| libjpeg62-turbo-dev | CVE-2020-17541 | LOW | 1:1.5.2-2+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap2-dev | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap2-dev | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap2-dev | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap2-dev | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblsan0 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| liblsan0 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| liblua5.2-0 | CVE-2021-43519 | MEDIUM | 5.2.4-1.1 | |
Expand...http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount-dev | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount-dev | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libmpx2 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libmpx2 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libmysofa0 | CVE-2021-3756 | CRITICAL | 0.6~dfsg0-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3756
https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1
https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1 (v1.2.1)
https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1
https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/
| +| libmysofa0 | CVE-2020-36152 | HIGH | 0.6~dfsg0-3+deb10u1 | |
Expand...https://github.com/hoene/libmysofa/issues/136
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/
| +| libmysofa0 | CVE-2020-6860 | HIGH | 0.6~dfsg0-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6860
https://github.com/hoene/libmysofa/commit/c31120a4ddfe3fc705cfdd74da7e884e1866da85
https://github.com/hoene/libmysofa/issues/96
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/
| +| libmysofa0 | CVE-2019-20016 | MEDIUM | 0.6~dfsg0-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20016
https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f
https://github.com/hoene/libmysofa/issues/83
https://github.com/hoene/libmysofa/issues/84
| +| libmysofa0 | CVE-2020-36148 | MEDIUM | 0.6~dfsg0-3+deb10u1 | |
Expand...https://github.com/hoene/libmysofa/issues/138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/
| +| libmysofa0 | CVE-2020-36149 | MEDIUM | 0.6~dfsg0-3+deb10u1 | |
Expand...https://github.com/hoene/libmysofa/issues/137
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/
| +| libmysofa0 | CVE-2020-36150 | MEDIUM | 0.6~dfsg0-3+deb10u1 | |
Expand...https://github.com/hoene/libmysofa/issues/135
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/
| +| libmysofa0 | CVE-2020-36151 | MEDIUM | 0.6~dfsg0-3+deb10u1 | |
Expand...https://github.com/hoene/libmysofa/issues/134
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libnss3 | CVE-2020-12403 | CRITICAL | 2:3.42.1-1+deb10u4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12403
https://bugzilla.redhat.com/show_bug.cgi?id=1868931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12403.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4476-1
| +| libnss3 | CVE-2020-25648 | HIGH | 2:3.42.1-1+deb10u4 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1887319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
https://linux.oracle.com/cve/CVE-2020-25648.html
https://linux.oracle.com/errata/ELSA-2021-3572.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libnss3 | CVE-2020-12400 | MEDIUM | 2:3.42.1-1+deb10u4 | |
Expand...https://bugzilla.mozilla.org/show_bug.cgi?id=1623116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12400.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| libnss3 | CVE-2020-12401 | MEDIUM | 2:3.42.1-1+deb10u4 | |
Expand...https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-12401.html
https://linux.oracle.com/errata/ELSA-2020-4076.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| libnss3 | CVE-2020-6829 | MEDIUM | 2:3.42.1-1+deb10u4 | |
Expand...https://bugzilla.mozilla.org/show_bug.cgi?id=1631583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes
https://linux.oracle.com/cve/CVE-2020-6829.html
https://linux.oracle.com/errata/ELSA-2021-0538.html
https://ubuntu.com/security/notices/USN-4455-1
https://ubuntu.com/security/notices/USN-4474-1
https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829
https://www.mozilla.org/security/advisories/mfsa2020-36/
https://www.mozilla.org/security/advisories/mfsa2020-39/
| +| libnss3 | CVE-2022-22747 | MEDIUM | 2:3.42.1-1+deb10u4 | 2:3.42.1-1+deb10u5 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
https://linux.oracle.com/cve/CVE-2022-22747.html
https://linux.oracle.com/errata/ELSA-2022-0130.html
https://ubuntu.com/security/notices/USN-5229-1
https://ubuntu.com/security/notices/USN-5246-1
https://ubuntu.com/security/notices/USN-5248-1
https://www.mozilla.org/en-US/security/advisories/mfsa2022-01/#CVE-2022-22747
| +| libnss3 | CVE-2017-11695 | LOW | 2:3.42.1-1+deb10u4 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695
https://security.gentoo.org/glsa/202003-37
| +| libnss3 | CVE-2017-11696 | LOW | 2:3.42.1-1+deb10u4 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696
https://security.gentoo.org/glsa/202003-37
| +| libnss3 | CVE-2017-11697 | LOW | 2:3.42.1-1+deb10u4 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697
https://security.gentoo.org/glsa/202003-37
| +| libnss3 | CVE-2017-11698 | LOW | 2:3.42.1-1+deb10u4 | |
Expand...http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698
https://security.gentoo.org/glsa/202003-37
| +| libonig5 | CVE-2019-13224 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224
https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
https://linux.oracle.com/cve/CVE-2019-13224.html
https://linux.oracle.com/errata/ELSA-2020-5861.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/
https://security.gentoo.org/glsa/201911-03
https://support.f5.com/csp/article/K00103182
https://support.f5.com/csp/article/K00103182?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4088-1
https://usn.ubuntu.com/4088-1/
| +| libonig5 | CVE-2019-13225 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225
https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c
https://linux.oracle.com/cve/CVE-2019-13225.html
https://linux.oracle.com/errata/ELSA-2020-5861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWCPDTZOIUKGMFAD5NAKUB7FPJFAIQN5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNL26OZSQRVLEO6JRNUVIMZTICXBNEQW/
https://security.gentoo.org/glsa/201911-03
| +| libonig5 | CVE-2019-16163 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16163
https://github.com/kkos/oniguruma/commit/4097828d7cc87589864fecf452f2cd46c5f37180
https://github.com/kkos/oniguruma/compare/v6.9.2...v6.9.3
https://github.com/kkos/oniguruma/issues/147
https://linux.oracle.com/cve/CVE-2019-16163.html
https://linux.oracle.com/errata/ELSA-2020-3662.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWOWZZNFSAWM3BUTQNAE3PD44A6JU4KE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW47MSFZ6WYOAOFXHBDGU4LYACFRKC2Y/
https://ubuntu.com/security/notices/USN-4460-1
https://usn.ubuntu.com/4460-1/
| +| libonig5 | CVE-2019-19012 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19012
https://github.com/kkos/oniguruma/issues/164
https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
https://github.com/tarantula-team/CVE-2019-19012
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
https://ubuntu.com/security/notices/USN-4460-1
https://usn.ubuntu.com/4460-1/
| +| libonig5 | CVE-2019-19203 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19203
https://github.com/ManhNDd/CVE-2019-19203
https://github.com/kkos/oniguruma/issues/163
https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
https://github.com/tarantula-team/CVE-2019-19203
https://linux.oracle.com/cve/CVE-2019-19203.html
https://linux.oracle.com/errata/ELSA-2020-3662.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
| +| libonig5 | CVE-2019-19204 | LOW | 6.9.1-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19204
https://github.com/ManhNDd/CVE-2019-19204
https://github.com/kkos/oniguruma/issues/162
https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
https://github.com/tarantula-team/CVE-2019-19204
https://linux.oracle.com/cve/CVE-2019-19204.html
https://linux.oracle.com/errata/ELSA-2020-3662.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
https://ubuntu.com/security/notices/USN-4460-1
https://usn.ubuntu.com/4460-1/
| +| libonig5 | CVE-2019-19246 | LOW | 6.9.1-1 | |
Expand...https://bugs.php.net/bug.php?id=78559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19246
https://github.com/kkos/oniguruma/commit/d3e402928b6eb3327f8f7d59a9edfa622fec557b
https://linux.oracle.com/cve/CVE-2019-19246.html
https://linux.oracle.com/errata/ELSA-2020-3662.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
https://ubuntu.com/security/notices/USN-4460-1
https://usn.ubuntu.com/4460-1/
| +| libopenexr-dev | CVE-2021-20298 | HIGH | 2.2.1-4.1+deb10u1 | |
Expand...
| +| libopenexr-dev | CVE-2021-20299 | HIGH | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
https://bugzilla.redhat.com/show_bug.cgi?id=1939154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299
https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
https://github.com/AcademySoftwareFoundation/openexr/pull/840
| +| libopenexr-dev | CVE-2020-16587 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587
https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a
https://github.com/AcademySoftwareFoundation/openexr/issues/491
https://ubuntu.com/security/notices/USN-4676-1
| +| libopenexr-dev | CVE-2020-16588 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16588
https://github.com/AcademySoftwareFoundation/openexr/commit/74504503cff86e986bac441213c403b0ba28d58f
https://github.com/AcademySoftwareFoundation/openexr/issues/493
https://ubuntu.com/security/notices/USN-4676-1
| +| libopenexr-dev | CVE-2020-16589 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16589
https://github.com/AcademySoftwareFoundation/openexr/commit/6bb36714528a9563dd3b92720c5063a1284b86f8
https://github.com/AcademySoftwareFoundation/openexr/issues/494
https://ubuntu.com/security/notices/USN-4676-1
| +| libopenexr-dev | CVE-2021-20296 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
https://bugzilla.redhat.com/show_bug.cgi?id=1939141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
https://www.openexr.com/
| +| libopenexr-dev | CVE-2021-20300 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
https://bugzilla.redhat.com/show_bug.cgi?id=1939153
https://github.com/AcademySoftwareFoundation/openexr/pull/836
| +| libopenexr-dev | CVE-2021-20302 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
https://bugzilla.redhat.com/show_bug.cgi?id=1939161
https://github.com/AcademySoftwareFoundation/openexr/pull/842
| +| libopenexr-dev | CVE-2021-20303 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
https://bugzilla.redhat.com/show_bug.cgi?id=1939151
https://github.com/AcademySoftwareFoundation/openexr/pull/831
| +| libopenexr-dev | CVE-2021-23215 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-23215
https://bugzilla.redhat.com/show_bug.cgi?id=1947586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215
https://github.com/AcademySoftwareFoundation/openexr/pull/901
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr-dev | CVE-2021-26260 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-26260
https://bugzilla.redhat.com/show_bug.cgi?id=1947582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260
https://github.com/AcademySoftwareFoundation/openexr/pull/894
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr-dev | CVE-2021-3474 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
https://bugzilla.redhat.com/show_bug.cgi?id=1939142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com/
| +| libopenexr-dev | CVE-2021-3475 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
https://bugzilla.redhat.com/show_bug.cgi?id=1939144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3475
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
| +| libopenexr-dev | CVE-2021-3476 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
https://bugzilla.redhat.com/show_bug.cgi?id=1939145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
| +| libopenexr-dev | CVE-2021-3477 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
https://bugzilla.redhat.com/show_bug.cgi?id=1939159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
| +| libopenexr-dev | CVE-2021-3478 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
https://bugzilla.redhat.com/show_bug.cgi?id=1939160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3478
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com/
| +| libopenexr-dev | CVE-2021-3479 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
https://bugzilla.redhat.com/show_bug.cgi?id=1939149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
| +| libopenexr-dev | CVE-2021-3598 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598
https://github.com/AcademySoftwareFoundation/openexr/pull/1037
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr-dev | CVE-2021-3605 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605
https://github.com/AcademySoftwareFoundation/openexr/pull/1036
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr-dev | CVE-2021-3933 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3933
https://bugzilla.redhat.com/show_bug.cgi?id=2019783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3933
https://ubuntu.com/security/notices/USN-5144-1
| +| libopenexr-dev | CVE-2021-3941 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941
https://github.com/AcademySoftwareFoundation/openexr/pull/1153
https://ubuntu.com/security/notices/USN-5150-1
| +| libopenexr-dev | CVE-2021-45942 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942
https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
https://github.com/AcademySoftwareFoundation/openexr/pull/1209
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
| +| libopenexr-dev | CVE-2017-14988 | LOW | 2.2.1-4.1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html
https://github.com/openexr/openexr/issues/248
| +| libopenexr-dev | CVE-2018-18443 | LOW | 2.2.1-4.1+deb10u1 | |
Expand...https://github.com/openexr/openexr/issues/350
https://github.com/openexr/openexr/releases/tag/v2.4.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5E2OZU4ZSF5W4ODBU4L547HX5A4WOBFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZN7WUH3SR6DSRODRB4SLFTBKP74FVC5/
| +| libopenexr-dev | CVE-2021-20304 | LOW | 2.2.1-4.1+deb10u1 | |
Expand...
| +| libopenexr-dev | CVE-2021-26945 | LOW | 2.2.1-4.1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947591
| +| libopenexr23 | CVE-2021-20298 | HIGH | 2.2.1-4.1+deb10u1 | |
Expand...
| +| libopenexr23 | CVE-2021-20299 | HIGH | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
https://bugzilla.redhat.com/show_bug.cgi?id=1939154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299
https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
https://github.com/AcademySoftwareFoundation/openexr/pull/840
| +| libopenexr23 | CVE-2020-16587 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16587
https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a
https://github.com/AcademySoftwareFoundation/openexr/issues/491
https://ubuntu.com/security/notices/USN-4676-1
| +| libopenexr23 | CVE-2020-16588 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16588
https://github.com/AcademySoftwareFoundation/openexr/commit/74504503cff86e986bac441213c403b0ba28d58f
https://github.com/AcademySoftwareFoundation/openexr/issues/493
https://ubuntu.com/security/notices/USN-4676-1
| +| libopenexr23 | CVE-2020-16589 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16589
https://github.com/AcademySoftwareFoundation/openexr/commit/6bb36714528a9563dd3b92720c5063a1284b86f8
https://github.com/AcademySoftwareFoundation/openexr/issues/494
https://ubuntu.com/security/notices/USN-4676-1
| +| libopenexr23 | CVE-2021-20296 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
https://bugzilla.redhat.com/show_bug.cgi?id=1939141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
https://www.openexr.com/
| +| libopenexr23 | CVE-2021-20300 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
https://bugzilla.redhat.com/show_bug.cgi?id=1939153
https://github.com/AcademySoftwareFoundation/openexr/pull/836
| +| libopenexr23 | CVE-2021-20302 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
https://bugzilla.redhat.com/show_bug.cgi?id=1939161
https://github.com/AcademySoftwareFoundation/openexr/pull/842
| +| libopenexr23 | CVE-2021-20303 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
https://bugzilla.redhat.com/show_bug.cgi?id=1939151
https://github.com/AcademySoftwareFoundation/openexr/pull/831
| +| libopenexr23 | CVE-2021-23215 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-23215
https://bugzilla.redhat.com/show_bug.cgi?id=1947586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215
https://github.com/AcademySoftwareFoundation/openexr/pull/901
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr23 | CVE-2021-26260 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-26260
https://bugzilla.redhat.com/show_bug.cgi?id=1947582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260
https://github.com/AcademySoftwareFoundation/openexr/pull/894
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr23 | CVE-2021-3474 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
https://bugzilla.redhat.com/show_bug.cgi?id=1939142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com/
| +| libopenexr23 | CVE-2021-3475 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
https://bugzilla.redhat.com/show_bug.cgi?id=1939144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3475
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
| +| libopenexr23 | CVE-2021-3476 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
https://bugzilla.redhat.com/show_bug.cgi?id=1939145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
| +| libopenexr23 | CVE-2021-3477 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
https://bugzilla.redhat.com/show_bug.cgi?id=1939159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://security.gentoo.org/glsa/202107-27
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
| +| libopenexr23 | CVE-2021-3478 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
https://bugzilla.redhat.com/show_bug.cgi?id=1939160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3478
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com/
| +| libopenexr23 | CVE-2021-3479 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
https://bugzilla.redhat.com/show_bug.cgi?id=1939149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4900-1
https://www.openexr.com
| +| libopenexr23 | CVE-2021-3598 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598
https://github.com/AcademySoftwareFoundation/openexr/pull/1037
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr23 | CVE-2021-3605 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605
https://github.com/AcademySoftwareFoundation/openexr/pull/1036
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr23 | CVE-2021-3933 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3933
https://bugzilla.redhat.com/show_bug.cgi?id=2019783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3933
https://ubuntu.com/security/notices/USN-5144-1
| +| libopenexr23 | CVE-2021-3941 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941
https://github.com/AcademySoftwareFoundation/openexr/pull/1153
https://ubuntu.com/security/notices/USN-5150-1
| +| libopenexr23 | CVE-2021-45942 | MEDIUM | 2.2.1-4.1+deb10u1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942
https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
https://github.com/AcademySoftwareFoundation/openexr/pull/1209
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
| +| libopenexr23 | CVE-2017-14988 | LOW | 2.2.1-4.1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html
https://github.com/openexr/openexr/issues/248
| +| libopenexr23 | CVE-2018-18443 | LOW | 2.2.1-4.1+deb10u1 | |
Expand...https://github.com/openexr/openexr/issues/350
https://github.com/openexr/openexr/releases/tag/v2.4.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5E2OZU4ZSF5W4ODBU4L547HX5A4WOBFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZN7WUH3SR6DSRODRB4SLFTBKP74FVC5/
| +| libopenexr23 | CVE-2021-20304 | LOW | 2.2.1-4.1+deb10u1 | |
Expand...
| +| libopenexr23 | CVE-2021-26945 | LOW | 2.2.1-4.1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947591
| +| libopenjp2-7 | CVE-2021-3575 | HIGH | 2.3.0-2+deb10u2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://ubuntu.com/security/CVE-2021-3575
| +| libopenjp2-7 | CVE-2019-12973 | MEDIUM | 2.3.0-2+deb10u2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
http://www.securityfocus.com/bid/108900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973
https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3
https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503
https://linux.oracle.com/cve/CVE-2019-12973.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html
https://security.gentoo.org/glsa/202101-29
https://www.oracle.com/security-alerts/cpujul2020.html
| +| libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.3.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7 | CVE-2016-10505 | LOW | 2.3.0-2+deb10u2 | |
Expand...https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-10506 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/100573
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
https://github.com/uclouvain/openjpeg/issues/731
https://github.com/uclouvain/openjpeg/issues/732
https://github.com/uclouvain/openjpeg/issues/777
https://github.com/uclouvain/openjpeg/issues/778
https://github.com/uclouvain/openjpeg/issues/779
https://github.com/uclouvain/openjpeg/issues/780
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9113 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93980
https://github.com/uclouvain/openjpeg/issues/856
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9114 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93979
https://github.com/uclouvain/openjpeg/issues/857
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9115 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93977
https://github.com/uclouvain/openjpeg/issues/858
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9116 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93975
https://github.com/uclouvain/openjpeg/issues/859
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9117 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93783
https://github.com/uclouvain/openjpeg/issues/860
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9580 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9581 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2017-17479 | LOW | 2.3.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479
https://github.com/uclouvain/openjpeg/issues/1044
| +| libopenjp2-7 | CVE-2018-16375 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/105266
https://github.com/uclouvain/openjpeg/issues/1126
| +| libopenjp2-7 | CVE-2018-16376 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/105262
https://github.com/uclouvain/openjpeg/issues/1127
| +| libopenjp2-7 | CVE-2018-20845 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/108921
https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
https://linux.oracle.com/cve/CVE-2018-20845.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
| +| libopenjp2-7 | CVE-2018-20846 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/108921
https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
| +| libopenjp2-7 | CVE-2018-5727 | LOW | 2.3.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727
https://github.com/uclouvain/openjpeg/issues/1053
https://linux.oracle.com/cve/CVE-2018-5727.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://ubuntu.com/security/notices/USN-4686-1
| +| libopenjp2-7 | CVE-2018-7648 | LOW | 2.3.0-2+deb10u2 | |
Expand...https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d
https://github.com/uclouvain/openjpeg/issues/1088
| +| libopenjp2-7 | CVE-2019-6988 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/106785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libopenjp2-7-dev | CVE-2021-3575 | HIGH | 2.3.0-2+deb10u2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://ubuntu.com/security/CVE-2021-3575
| +| libopenjp2-7-dev | CVE-2019-12973 | MEDIUM | 2.3.0-2+deb10u2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
http://www.securityfocus.com/bid/108900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973
https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3
https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503
https://linux.oracle.com/cve/CVE-2019-12973.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html
https://security.gentoo.org/glsa/202101-29
https://www.oracle.com/security-alerts/cpujul2020.html
| +| libopenjp2-7-dev | CVE-2021-29338 | MEDIUM | 2.3.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7-dev | CVE-2016-10505 | LOW | 2.3.0-2+deb10u2 | |
Expand...https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7-dev | CVE-2016-10506 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/100573
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
https://github.com/uclouvain/openjpeg/issues/731
https://github.com/uclouvain/openjpeg/issues/732
https://github.com/uclouvain/openjpeg/issues/777
https://github.com/uclouvain/openjpeg/issues/778
https://github.com/uclouvain/openjpeg/issues/779
https://github.com/uclouvain/openjpeg/issues/780
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7-dev | CVE-2016-9113 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93980
https://github.com/uclouvain/openjpeg/issues/856
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7-dev | CVE-2016-9114 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93979
https://github.com/uclouvain/openjpeg/issues/857
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7-dev | CVE-2016-9115 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93977
https://github.com/uclouvain/openjpeg/issues/858
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7-dev | CVE-2016-9116 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93975
https://github.com/uclouvain/openjpeg/issues/859
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7-dev | CVE-2016-9117 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/93783
https://github.com/uclouvain/openjpeg/issues/860
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7-dev | CVE-2016-9580 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7-dev | CVE-2016-9581 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7-dev | CVE-2017-17479 | LOW | 2.3.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479
https://github.com/uclouvain/openjpeg/issues/1044
| +| libopenjp2-7-dev | CVE-2018-16375 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/105266
https://github.com/uclouvain/openjpeg/issues/1126
| +| libopenjp2-7-dev | CVE-2018-16376 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/105262
https://github.com/uclouvain/openjpeg/issues/1127
| +| libopenjp2-7-dev | CVE-2018-20845 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/108921
https://github.com/uclouvain/openjpeg/pull/1168/commits/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
https://linux.oracle.com/cve/CVE-2018-20845.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
| +| libopenjp2-7-dev | CVE-2018-20846 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/108921
https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
| +| libopenjp2-7-dev | CVE-2018-5727 | LOW | 2.3.0-2+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727
https://github.com/uclouvain/openjpeg/issues/1053
https://linux.oracle.com/cve/CVE-2018-5727.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://ubuntu.com/security/notices/USN-4686-1
| +| libopenjp2-7-dev | CVE-2018-7648 | LOW | 2.3.0-2+deb10u2 | |
Expand...https://github.com/uclouvain/openjpeg/commit/cc3824767bde397fedb8a1ae4786a222ba860c8d
https://github.com/uclouvain/openjpeg/issues/1088
| +| libopenjp2-7-dev | CVE-2019-6988 | LOW | 2.3.0-2+deb10u2 | |
Expand...http://www.securityfocus.com/bid/106785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libpcre16-3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre16-3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre16-3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre16-3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre16-3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre16-3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3-dev | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3-dev | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3-dev | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3-dev | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3-dev | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3-dev | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre32-3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre32-3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre32-3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre32-3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre32-3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre32-3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcrecpp0v5 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcrecpp0v5 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcrecpp0v5 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcrecpp0v5 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcrecpp0v5 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcrecpp0v5 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libperl5.28 | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| libperl5.28 | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| libpng-dev | CVE-2018-14048 | LOW | 1.6.36-6 | |
Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048
https://github.com/fouzhe/security/tree/master/libpng
https://github.com/glennrp/libpng/issues/238
https://seclists.org/bugtraq/2019/Apr/30
https://security.gentoo.org/glsa/201908-02
| +| libpng-dev | CVE-2018-14550 | LOW | 1.6.36-6 | |
Expand...https://github.com/advisories/GHSA-qwwr-qc2p-6283
https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token
https://github.com/glennrp/libpng/issues/246
https://nvd.nist.gov/vuln/detail/CVE-2018-14550
https://security.gentoo.org/glsa/201908-02
https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpng-dev | CVE-2019-6129 | LOW | 1.6.36-6 | |
Expand...https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| +| libpng-dev | CVE-2021-4214 | LOW | 1.6.36-6 | |
Expand...
| +| libpng16-16 | CVE-2018-14048 | LOW | 1.6.36-6 | |
Expand...http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048
https://github.com/fouzhe/security/tree/master/libpng
https://github.com/glennrp/libpng/issues/238
https://seclists.org/bugtraq/2019/Apr/30
https://security.gentoo.org/glsa/201908-02
| +| libpng16-16 | CVE-2018-14550 | LOW | 1.6.36-6 | |
Expand...https://github.com/advisories/GHSA-qwwr-qc2p-6283
https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token
https://github.com/glennrp/libpng/issues/246
https://nvd.nist.gov/vuln/detail/CVE-2018-14550
https://security.gentoo.org/glsa/201908-02
https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpng16-16 | CVE-2019-6129 | LOW | 1.6.36-6 | |
Expand...https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| +| libpng16-16 | CVE-2021-4214 | LOW | 1.6.36-6 | |
Expand...
| +| libpoppler-dev | CVE-2019-14494 | HIGH | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494
https://gitlab.freedesktop.org/poppler/poppler/issues/802
https://gitlab.freedesktop.org/poppler/poppler/merge_requests/317
https://linux.oracle.com/cve/CVE-2019-14494.html
https://linux.oracle.com/errata/ELSA-2020-4643.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AHYAM32PALHQXL3O4DKIJ3EJB6AKBOVC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLAQBLBIIL3A5XZQYR4MG3Z4LIPIC42P/
https://ubuntu.com/security/notices/USN-4091-1
https://usn.ubuntu.com/4091-1/
| +| libpoppler-dev | CVE-2020-27778 | HIGH | 0.71.0-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1900712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27778
https://linux.oracle.com/cve/CVE-2020-27778.html
https://linux.oracle.com/errata/ELSA-2021-1881.html
https://ubuntu.com/security/notices/USN-4646-1
| +| libpoppler-dev | CVE-2013-4472 | LOW | 0.71.0-5 | |
Expand...http://osvdb.org/99064
http://poppler.freedesktop.org/releases.html
http://seclists.org/oss-sec/2013/q4/181
http://seclists.org/oss-sec/2013/q4/183
| +| libpoppler-dev | CVE-2017-2814 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0311
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0311
| +| libpoppler-dev | CVE-2017-2818 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0319
| +| libpoppler-dev | CVE-2017-2820 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2820
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321
https://ubuntu.com/security/notices/USN-3350-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0321
| +| libpoppler-dev | CVE-2017-9083 | LOW | 0.71.0-5 | |
Expand...https://bugs.freedesktop.org/show_bug.cgi?id=101084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9083
https://lists.freedesktop.org/archives/poppler/2017-May/012230.html
https://security.gentoo.org/glsa/201801-17
https://ubuntu.com/security/notices/USN-3350-1
| +| libpoppler-dev | CVE-2018-18897 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18897
https://gitlab.freedesktop.org/poppler/poppler/issues/654
https://linux.oracle.com/cve/CVE-2018-18897.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| libpoppler-dev | CVE-2018-19058 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19058
https://gitlab.freedesktop.org/poppler/poppler/issues/659
https://linux.oracle.com/cve/CVE-2018-19058.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler-dev | CVE-2018-19059 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19059
https://gitlab.freedesktop.org/poppler/poppler/issues/661
https://linux.oracle.com/cve/CVE-2018-19059.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler-dev | CVE-2018-19060 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19060
https://gitlab.freedesktop.org/poppler/poppler/issues/660
https://linux.oracle.com/cve/CVE-2018-19060.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler-dev | CVE-2018-20650 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/106459
https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20650
https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7
https://gitlab.freedesktop.org/poppler/poppler/issues/704
https://linux.oracle.com/cve/CVE-2018-20650.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3865-1
https://usn.ubuntu.com/3865-1/
| +| libpoppler-dev | CVE-2019-10871 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107862
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871
https://gitlab.freedesktop.org/poppler/poppler/issues/751
https://linux.oracle.com/cve/CVE-2019-10871.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/
https://ubuntu.com/security/notices/USN-4646-1
https://ubuntu.com/security/notices/USN-4646-2
| +| libpoppler-dev | CVE-2019-11026 | LOW | 0.71.0-5 | |
Expand...https://gitlab.freedesktop.org/poppler/poppler/issues/752
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5JWQE2WP4W4F2FEYPYJQBPQIOG75MVH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/1508/
| +| libpoppler-dev | CVE-2019-9543 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543
https://gitlab.freedesktop.org/poppler/poppler/issues/730
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
| +| libpoppler-dev | CVE-2019-9545 | LOW | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545
https://gitlab.freedesktop.org/poppler/poppler/issues/731
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
| +| libpoppler-dev | CVE-2019-9903 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107560
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9903
https://gitlab.freedesktop.org/poppler/poppler/issues/741
https://linux.oracle.com/cve/CVE-2019-9903.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| libpoppler-dev | CVE-2019-9959 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/109342
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959
https://gitlab.freedesktop.org/poppler/poppler/blob/master/NEWS
https://linux.oracle.com/cve/CVE-2019-9959.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ZOYOZTGU4RGZW4E63OZ7LW4SMPEWGBV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6NX2XPMMV7O52F4NBNCHGILGJXM3OJZ/
https://ubuntu.com/security/notices/USN-4646-1
| +| libpoppler-glib-dev | CVE-2019-14494 | HIGH | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494
https://gitlab.freedesktop.org/poppler/poppler/issues/802
https://gitlab.freedesktop.org/poppler/poppler/merge_requests/317
https://linux.oracle.com/cve/CVE-2019-14494.html
https://linux.oracle.com/errata/ELSA-2020-4643.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AHYAM32PALHQXL3O4DKIJ3EJB6AKBOVC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLAQBLBIIL3A5XZQYR4MG3Z4LIPIC42P/
https://ubuntu.com/security/notices/USN-4091-1
https://usn.ubuntu.com/4091-1/
| +| libpoppler-glib-dev | CVE-2020-27778 | HIGH | 0.71.0-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1900712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27778
https://linux.oracle.com/cve/CVE-2020-27778.html
https://linux.oracle.com/errata/ELSA-2021-1881.html
https://ubuntu.com/security/notices/USN-4646-1
| +| libpoppler-glib-dev | CVE-2013-4472 | LOW | 0.71.0-5 | |
Expand...http://osvdb.org/99064
http://poppler.freedesktop.org/releases.html
http://seclists.org/oss-sec/2013/q4/181
http://seclists.org/oss-sec/2013/q4/183
| +| libpoppler-glib-dev | CVE-2017-2814 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0311
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0311
| +| libpoppler-glib-dev | CVE-2017-2818 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0319
| +| libpoppler-glib-dev | CVE-2017-2820 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2820
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321
https://ubuntu.com/security/notices/USN-3350-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0321
| +| libpoppler-glib-dev | CVE-2017-9083 | LOW | 0.71.0-5 | |
Expand...https://bugs.freedesktop.org/show_bug.cgi?id=101084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9083
https://lists.freedesktop.org/archives/poppler/2017-May/012230.html
https://security.gentoo.org/glsa/201801-17
https://ubuntu.com/security/notices/USN-3350-1
| +| libpoppler-glib-dev | CVE-2018-18897 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18897
https://gitlab.freedesktop.org/poppler/poppler/issues/654
https://linux.oracle.com/cve/CVE-2018-18897.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| libpoppler-glib-dev | CVE-2018-19058 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19058
https://gitlab.freedesktop.org/poppler/poppler/issues/659
https://linux.oracle.com/cve/CVE-2018-19058.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler-glib-dev | CVE-2018-19059 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19059
https://gitlab.freedesktop.org/poppler/poppler/issues/661
https://linux.oracle.com/cve/CVE-2018-19059.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler-glib-dev | CVE-2018-19060 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19060
https://gitlab.freedesktop.org/poppler/poppler/issues/660
https://linux.oracle.com/cve/CVE-2018-19060.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler-glib-dev | CVE-2018-20650 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/106459
https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20650
https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7
https://gitlab.freedesktop.org/poppler/poppler/issues/704
https://linux.oracle.com/cve/CVE-2018-20650.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3865-1
https://usn.ubuntu.com/3865-1/
| +| libpoppler-glib-dev | CVE-2019-10871 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107862
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871
https://gitlab.freedesktop.org/poppler/poppler/issues/751
https://linux.oracle.com/cve/CVE-2019-10871.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/
https://ubuntu.com/security/notices/USN-4646-1
https://ubuntu.com/security/notices/USN-4646-2
| +| libpoppler-glib-dev | CVE-2019-11026 | LOW | 0.71.0-5 | |
Expand...https://gitlab.freedesktop.org/poppler/poppler/issues/752
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5JWQE2WP4W4F2FEYPYJQBPQIOG75MVH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/1508/
| +| libpoppler-glib-dev | CVE-2019-9543 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543
https://gitlab.freedesktop.org/poppler/poppler/issues/730
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
| +| libpoppler-glib-dev | CVE-2019-9545 | LOW | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545
https://gitlab.freedesktop.org/poppler/poppler/issues/731
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
| +| libpoppler-glib-dev | CVE-2019-9903 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107560
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9903
https://gitlab.freedesktop.org/poppler/poppler/issues/741
https://linux.oracle.com/cve/CVE-2019-9903.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| libpoppler-glib-dev | CVE-2019-9959 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/109342
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959
https://gitlab.freedesktop.org/poppler/poppler/blob/master/NEWS
https://linux.oracle.com/cve/CVE-2019-9959.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ZOYOZTGU4RGZW4E63OZ7LW4SMPEWGBV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6NX2XPMMV7O52F4NBNCHGILGJXM3OJZ/
https://ubuntu.com/security/notices/USN-4646-1
| +| libpoppler-glib8 | CVE-2019-14494 | HIGH | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494
https://gitlab.freedesktop.org/poppler/poppler/issues/802
https://gitlab.freedesktop.org/poppler/poppler/merge_requests/317
https://linux.oracle.com/cve/CVE-2019-14494.html
https://linux.oracle.com/errata/ELSA-2020-4643.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AHYAM32PALHQXL3O4DKIJ3EJB6AKBOVC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLAQBLBIIL3A5XZQYR4MG3Z4LIPIC42P/
https://ubuntu.com/security/notices/USN-4091-1
https://usn.ubuntu.com/4091-1/
| +| libpoppler-glib8 | CVE-2020-27778 | HIGH | 0.71.0-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1900712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27778
https://linux.oracle.com/cve/CVE-2020-27778.html
https://linux.oracle.com/errata/ELSA-2021-1881.html
https://ubuntu.com/security/notices/USN-4646-1
| +| libpoppler-glib8 | CVE-2013-4472 | LOW | 0.71.0-5 | |
Expand...http://osvdb.org/99064
http://poppler.freedesktop.org/releases.html
http://seclists.org/oss-sec/2013/q4/181
http://seclists.org/oss-sec/2013/q4/183
| +| libpoppler-glib8 | CVE-2017-2814 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0311
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0311
| +| libpoppler-glib8 | CVE-2017-2818 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0319
| +| libpoppler-glib8 | CVE-2017-2820 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2820
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321
https://ubuntu.com/security/notices/USN-3350-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0321
| +| libpoppler-glib8 | CVE-2017-9083 | LOW | 0.71.0-5 | |
Expand...https://bugs.freedesktop.org/show_bug.cgi?id=101084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9083
https://lists.freedesktop.org/archives/poppler/2017-May/012230.html
https://security.gentoo.org/glsa/201801-17
https://ubuntu.com/security/notices/USN-3350-1
| +| libpoppler-glib8 | CVE-2018-18897 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18897
https://gitlab.freedesktop.org/poppler/poppler/issues/654
https://linux.oracle.com/cve/CVE-2018-18897.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| libpoppler-glib8 | CVE-2018-19058 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19058
https://gitlab.freedesktop.org/poppler/poppler/issues/659
https://linux.oracle.com/cve/CVE-2018-19058.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler-glib8 | CVE-2018-19059 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19059
https://gitlab.freedesktop.org/poppler/poppler/issues/661
https://linux.oracle.com/cve/CVE-2018-19059.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler-glib8 | CVE-2018-19060 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19060
https://gitlab.freedesktop.org/poppler/poppler/issues/660
https://linux.oracle.com/cve/CVE-2018-19060.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler-glib8 | CVE-2018-20650 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/106459
https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20650
https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7
https://gitlab.freedesktop.org/poppler/poppler/issues/704
https://linux.oracle.com/cve/CVE-2018-20650.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3865-1
https://usn.ubuntu.com/3865-1/
| +| libpoppler-glib8 | CVE-2019-10871 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107862
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871
https://gitlab.freedesktop.org/poppler/poppler/issues/751
https://linux.oracle.com/cve/CVE-2019-10871.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/
https://ubuntu.com/security/notices/USN-4646-1
https://ubuntu.com/security/notices/USN-4646-2
| +| libpoppler-glib8 | CVE-2019-11026 | LOW | 0.71.0-5 | |
Expand...https://gitlab.freedesktop.org/poppler/poppler/issues/752
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5JWQE2WP4W4F2FEYPYJQBPQIOG75MVH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/1508/
| +| libpoppler-glib8 | CVE-2019-9543 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543
https://gitlab.freedesktop.org/poppler/poppler/issues/730
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
| +| libpoppler-glib8 | CVE-2019-9545 | LOW | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545
https://gitlab.freedesktop.org/poppler/poppler/issues/731
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
| +| libpoppler-glib8 | CVE-2019-9903 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107560
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9903
https://gitlab.freedesktop.org/poppler/poppler/issues/741
https://linux.oracle.com/cve/CVE-2019-9903.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| libpoppler-glib8 | CVE-2019-9959 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/109342
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959
https://gitlab.freedesktop.org/poppler/poppler/blob/master/NEWS
https://linux.oracle.com/cve/CVE-2019-9959.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ZOYOZTGU4RGZW4E63OZ7LW4SMPEWGBV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6NX2XPMMV7O52F4NBNCHGILGJXM3OJZ/
https://ubuntu.com/security/notices/USN-4646-1
| +| libpoppler82 | CVE-2019-14494 | HIGH | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494
https://gitlab.freedesktop.org/poppler/poppler/issues/802
https://gitlab.freedesktop.org/poppler/poppler/merge_requests/317
https://linux.oracle.com/cve/CVE-2019-14494.html
https://linux.oracle.com/errata/ELSA-2020-4643.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AHYAM32PALHQXL3O4DKIJ3EJB6AKBOVC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLAQBLBIIL3A5XZQYR4MG3Z4LIPIC42P/
https://ubuntu.com/security/notices/USN-4091-1
https://usn.ubuntu.com/4091-1/
| +| libpoppler82 | CVE-2020-27778 | HIGH | 0.71.0-5 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1900712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27778
https://linux.oracle.com/cve/CVE-2020-27778.html
https://linux.oracle.com/errata/ELSA-2021-1881.html
https://ubuntu.com/security/notices/USN-4646-1
| +| libpoppler82 | CVE-2013-4472 | LOW | 0.71.0-5 | |
Expand...http://osvdb.org/99064
http://poppler.freedesktop.org/releases.html
http://seclists.org/oss-sec/2013/q4/181
http://seclists.org/oss-sec/2013/q4/183
| +| libpoppler82 | CVE-2017-2814 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0311
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0311
| +| libpoppler82 | CVE-2017-2818 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0319
| +| libpoppler82 | CVE-2017-2820 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/99497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2820
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321
https://ubuntu.com/security/notices/USN-3350-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0321
| +| libpoppler82 | CVE-2017-9083 | LOW | 0.71.0-5 | |
Expand...https://bugs.freedesktop.org/show_bug.cgi?id=101084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9083
https://lists.freedesktop.org/archives/poppler/2017-May/012230.html
https://security.gentoo.org/glsa/201801-17
https://ubuntu.com/security/notices/USN-3350-1
| +| libpoppler82 | CVE-2018-18897 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18897
https://gitlab.freedesktop.org/poppler/poppler/issues/654
https://linux.oracle.com/cve/CVE-2018-18897.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| libpoppler82 | CVE-2018-19058 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19058
https://gitlab.freedesktop.org/poppler/poppler/issues/659
https://linux.oracle.com/cve/CVE-2018-19058.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00008.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler82 | CVE-2018-19059 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19059
https://gitlab.freedesktop.org/poppler/poppler/issues/661
https://linux.oracle.com/cve/CVE-2018-19059.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler82 | CVE-2018-19060 | LOW | 0.71.0-5 | |
Expand...https://access.redhat.com/errata/RHSA-2019:2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19060
https://gitlab.freedesktop.org/poppler/poppler/issues/660
https://linux.oracle.com/cve/CVE-2018-19060.html
https://linux.oracle.com/errata/ELSA-2019-2022.html
https://ubuntu.com/security/notices/USN-3837-1
https://usn.ubuntu.com/3837-1/
| +| libpoppler82 | CVE-2018-20650 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/106459
https://access.redhat.com/errata/RHSA-2019:2022
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20650
https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7
https://gitlab.freedesktop.org/poppler/poppler/issues/704
https://linux.oracle.com/cve/CVE-2018-20650.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://ubuntu.com/security/notices/USN-3865-1
https://usn.ubuntu.com/3865-1/
| +| libpoppler82 | CVE-2019-10871 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107862
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871
https://gitlab.freedesktop.org/poppler/poppler/issues/751
https://linux.oracle.com/cve/CVE-2019-10871.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MAWV24KRXTFODLVT46RXI27XIQFX2QR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWS7NVFFCUY3YSTMEKZEJEU6JVUUBKHB/
https://ubuntu.com/security/notices/USN-4646-1
https://ubuntu.com/security/notices/USN-4646-2
| +| libpoppler82 | CVE-2019-11026 | LOW | 0.71.0-5 | |
Expand...https://gitlab.freedesktop.org/poppler/poppler/issues/752
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5JWQE2WP4W4F2FEYPYJQBPQIOG75MVH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/1508/
| +| libpoppler82 | CVE-2019-9543 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543
https://gitlab.freedesktop.org/poppler/poppler/issues/730
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
| +| libpoppler82 | CVE-2019-9545 | LOW | 0.71.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545
https://gitlab.freedesktop.org/poppler/poppler/issues/731
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
| +| libpoppler82 | CVE-2019-9903 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/107560
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9903
https://gitlab.freedesktop.org/poppler/poppler/issues/741
https://linux.oracle.com/cve/CVE-2019-9903.html
https://linux.oracle.com/errata/ELSA-2019-2713.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGYLZZ4DZUDBQEGCNDWSZPSFNNZJF4S6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWWVIYFXM74KJFIDHP4W67HR4FRF2LDE/
https://research.loginsoft.com/bugs/stack-based-buffer-overflows-in-dictfind-poppler-0-74-0/
https://ubuntu.com/security/notices/USN-4042-1
https://usn.ubuntu.com/4042-1/
| +| libpoppler82 | CVE-2019-9959 | LOW | 0.71.0-5 | |
Expand...http://www.securityfocus.com/bid/109342
https://access.redhat.com/errata/RHSA-2019:2713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959
https://gitlab.freedesktop.org/poppler/poppler/blob/master/NEWS
https://linux.oracle.com/cve/CVE-2019-9959.html
https://linux.oracle.com/errata/ELSA-2020-1074.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ZOYOZTGU4RGZW4E63OZ7LW4SMPEWGBV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6NX2XPMMV7O52F4NBNCHGILGJXM3OJZ/
https://ubuntu.com/security/notices/USN-4646-1
| +| libpostproc55 | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| libpostproc55 | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| libpostproc55 | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| libpostproc55 | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libpostproc55 | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libpostproc55 | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| libpostproc55 | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libpostproc55 | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| libpostproc55 | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libpostproc55 | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libpostproc55 | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| libpostproc55 | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| libpostproc55 | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| libpostproc55 | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libpostproc55 | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| libpostproc55 | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| libpostproc55 | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| libpostproc55 | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| libpostproc55 | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| libpostproc55 | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| libpostproc55 | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libpostproc55 | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libpostproc55 | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libpostproc55 | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libpostproc55 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libpython-stdlib | CVE-2008-4108 | LOW | 2.7.16-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://securityreason.com/securityalert/4274
http://www.securityfocus.com/bid/31184
http://www.securitytracker.com/id?1020904
http://www.vupen.com/english/advisories/2008/2659
https://bugzilla.redhat.com/show_bug.cgi?id=462326
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
| +| libpython2-stdlib | CVE-2008-4108 | LOW | 2.7.16-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://securityreason.com/securityalert/4274
http://www.securityfocus.com/bid/31184
http://www.securitytracker.com/id?1020904
http://www.vupen.com/english/advisories/2008/2659
https://bugzilla.redhat.com/show_bug.cgi?id=462326
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
| +| libpython2.7-minimal | CVE-2021-3177 | CRITICAL | 2.7.16-2+deb10u1 | |
Expand...https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython2.7-minimal | CVE-2021-23336 | MEDIUM | 2.7.16-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython2.7-minimal | CVE-2021-4189 | MEDIUM | 2.7.16-2+deb10u1 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| +| libpython2.7-minimal | CVE-2013-7040 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://support.apple.com/kb/HT205031
| +| libpython2.7-minimal | CVE-2017-17522 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://www.securityfocus.com/bid/102207
https://bugs.python.org/issue32367
https://security-tracker.debian.org/tracker/CVE-2017-17522
| +| libpython2.7-minimal | CVE-2019-18348 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpython2.7-minimal | CVE-2019-20907 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
https://bugs.python.org/issue39017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
https://github.com/python/cpython/pull/21454
https://linux.oracle.com/cve/CVE-2019-20907.html
https://linux.oracle.com/errata/ELSA-2020-5010.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://security.gentoo.org/glsa/202008-01
https://security.netapp.com/advisory/ntap-20200731-0002/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.oracle.com/security-alerts/cpujan2021.html
| +| libpython2.7-minimal | CVE-2019-9674 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| libpython2.7-minimal | CVE-2020-8492 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
| +| libpython2.7-stdlib | CVE-2021-3177 | CRITICAL | 2.7.16-2+deb10u1 | |
Expand...https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython2.7-stdlib | CVE-2021-23336 | MEDIUM | 2.7.16-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython2.7-stdlib | CVE-2021-4189 | MEDIUM | 2.7.16-2+deb10u1 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| +| libpython2.7-stdlib | CVE-2013-7040 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://support.apple.com/kb/HT205031
| +| libpython2.7-stdlib | CVE-2017-17522 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://www.securityfocus.com/bid/102207
https://bugs.python.org/issue32367
https://security-tracker.debian.org/tracker/CVE-2017-17522
| +| libpython2.7-stdlib | CVE-2019-18348 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpython2.7-stdlib | CVE-2019-20907 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
https://bugs.python.org/issue39017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
https://github.com/python/cpython/pull/21454
https://linux.oracle.com/cve/CVE-2019-20907.html
https://linux.oracle.com/errata/ELSA-2020-5010.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://security.gentoo.org/glsa/202008-01
https://security.netapp.com/advisory/ntap-20200731-0002/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.oracle.com/security-alerts/cpujan2021.html
| +| libpython2.7-stdlib | CVE-2019-9674 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| libpython2.7-stdlib | CVE-2020-8492 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
| +| libpython3.7-minimal | CVE-2021-3737 | HIGH | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| libpython3.7-minimal | CVE-2022-0391 | HIGH | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://security.netapp.com/advisory/ntap-20220225-0009/
| +| libpython3.7-minimal | CVE-2021-23336 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.7-minimal | CVE-2021-3426 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.7-minimal | CVE-2021-3733 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| libpython3.7-minimal | CVE-2021-4189 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| +| libpython3.7-minimal | CVE-2017-17522 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://www.securityfocus.com/bid/102207
https://bugs.python.org/issue32367
https://security-tracker.debian.org/tracker/CVE-2017-17522
| +| libpython3.7-minimal | CVE-2019-18348 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpython3.7-minimal | CVE-2019-9674 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| libpython3.7-minimal | CVE-2020-27619 | LOW | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| libpython3.7-stdlib | CVE-2021-3737 | HIGH | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| libpython3.7-stdlib | CVE-2022-0391 | HIGH | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://security.netapp.com/advisory/ntap-20220225-0009/
| +| libpython3.7-stdlib | CVE-2021-23336 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.7-stdlib | CVE-2021-3426 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libpython3.7-stdlib | CVE-2021-3733 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| libpython3.7-stdlib | CVE-2021-4189 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| +| libpython3.7-stdlib | CVE-2017-17522 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://www.securityfocus.com/bid/102207
https://bugs.python.org/issue32367
https://security-tracker.debian.org/tracker/CVE-2017-17522
| +| libpython3.7-stdlib | CVE-2019-18348 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpython3.7-stdlib | CVE-2019-9674 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| libpython3.7-stdlib | CVE-2020-27619 | LOW | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| libquadmath0 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libquadmath0 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libraw-bin | CVE-2020-15503 | HIGH | 0.19.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html
https://github.com/LibRaw/LibRaw/commit/20ad21c0d87ca80217aee47533d91e633ce1864d
https://github.com/LibRaw/LibRaw/compare/0.20-Beta3...0.20-RC1
https://linux.oracle.com/cve/CVE-2020-15503.html
https://linux.oracle.com/errata/ELSA-2020-4451.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HM2DS6HA4YZREI3BYGS75M6D76WMW62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSXAJKZ4VNDYVQULJNY4XDPWHIJDTB4P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNGDWTO45TU4KGND75EUUEGUMNSOYC7H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCVKD7PTO7UQAVUTBHJAKBKYLPQQGAMZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y34ALB34P3NGQXLF7BG7R6DGRX6XL2JN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZETDVPZQWZWVGIG6JTIEKP5KPVMUE7Y/
https://www.libraw.org/news/libraw-0-20-rc1
| +| libraw-bin | CVE-2020-24889 | HIGH | 0.19.2-2 | |
Expand...https://github.com/LibRaw/LibRaw/issues/334
https://security.gentoo.org/glsa/202010-05
| +| libraw-bin | CVE-2020-24890 | LOW | 0.19.2-2 | |
Expand...https://github.com/LibRaw/LibRaw/issues/335
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/
https://security.gentoo.org/glsa/202010-05
| +| libraw-dev | CVE-2020-15503 | HIGH | 0.19.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html
https://github.com/LibRaw/LibRaw/commit/20ad21c0d87ca80217aee47533d91e633ce1864d
https://github.com/LibRaw/LibRaw/compare/0.20-Beta3...0.20-RC1
https://linux.oracle.com/cve/CVE-2020-15503.html
https://linux.oracle.com/errata/ELSA-2020-4451.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HM2DS6HA4YZREI3BYGS75M6D76WMW62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSXAJKZ4VNDYVQULJNY4XDPWHIJDTB4P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNGDWTO45TU4KGND75EUUEGUMNSOYC7H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCVKD7PTO7UQAVUTBHJAKBKYLPQQGAMZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y34ALB34P3NGQXLF7BG7R6DGRX6XL2JN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZETDVPZQWZWVGIG6JTIEKP5KPVMUE7Y/
https://www.libraw.org/news/libraw-0-20-rc1
| +| libraw-dev | CVE-2020-24889 | HIGH | 0.19.2-2 | |
Expand...https://github.com/LibRaw/LibRaw/issues/334
https://security.gentoo.org/glsa/202010-05
| +| libraw-dev | CVE-2020-24890 | LOW | 0.19.2-2 | |
Expand...https://github.com/LibRaw/LibRaw/issues/335
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/
https://security.gentoo.org/glsa/202010-05
| +| libraw19 | CVE-2020-15503 | HIGH | 0.19.2-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00001.html
https://github.com/LibRaw/LibRaw/commit/20ad21c0d87ca80217aee47533d91e633ce1864d
https://github.com/LibRaw/LibRaw/compare/0.20-Beta3...0.20-RC1
https://linux.oracle.com/cve/CVE-2020-15503.html
https://linux.oracle.com/errata/ELSA-2020-4451.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HM2DS6HA4YZREI3BYGS75M6D76WMW62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSXAJKZ4VNDYVQULJNY4XDPWHIJDTB4P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNGDWTO45TU4KGND75EUUEGUMNSOYC7H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCVKD7PTO7UQAVUTBHJAKBKYLPQQGAMZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y34ALB34P3NGQXLF7BG7R6DGRX6XL2JN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZETDVPZQWZWVGIG6JTIEKP5KPVMUE7Y/
https://www.libraw.org/news/libraw-0-20-rc1
| +| libraw19 | CVE-2020-24889 | HIGH | 0.19.2-2 | |
Expand...https://github.com/LibRaw/LibRaw/issues/334
https://security.gentoo.org/glsa/202010-05
| +| libraw19 | CVE-2020-24890 | LOW | 0.19.2-2 | |
Expand...https://github.com/LibRaw/LibRaw/issues/335
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWHUZCRMGOC3QS6C65KWBM6ZJM25V6HI/
https://security.gentoo.org/glsa/202010-05
| +| librsvg2-2 | CVE-2019-20446 | MEDIUM | 2.44.10-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446
https://gitlab.gnome.org/GNOME/librsvg/issues/515
https://linux.oracle.com/cve/CVE-2019-20446.html
https://linux.oracle.com/errata/ELSA-2020-4709.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
https://ubuntu.com/security/notices/USN-4436-1
https://ubuntu.com/security/notices/USN-4436-2
https://usn.ubuntu.com/4436-1/
| +| librsvg2-common | CVE-2019-20446 | MEDIUM | 2.44.10-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446
https://gitlab.gnome.org/GNOME/librsvg/issues/515
https://linux.oracle.com/cve/CVE-2019-20446.html
https://linux.oracle.com/errata/ELSA-2020-4709.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
https://ubuntu.com/security/notices/USN-4436-1
https://ubuntu.com/security/notices/USN-4436-2
https://usn.ubuntu.com/4436-1/
| +| librsvg2-dev | CVE-2019-20446 | MEDIUM | 2.44.10-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446
https://gitlab.gnome.org/GNOME/librsvg/issues/515
https://linux.oracle.com/cve/CVE-2019-20446.html
https://linux.oracle.com/errata/ELSA-2020-4709.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
https://ubuntu.com/security/notices/USN-4436-1
https://ubuntu.com/security/notices/USN-4436-2
https://usn.ubuntu.com/4436-1/
| +| libsasl2-2 | CVE-2022-24407 | HIGH | 2.1.27+dfsg-1+deb10u1 | 2.1.27+dfsg-1+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
| +| libsasl2-modules-db | CVE-2022-24407 | HIGH | 2.1.27+dfsg-1+deb10u1 | 2.1.27+dfsg-1+deb10u2 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
| +| libsdl2-2.0-0 | CVE-2019-13616 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html
https://access.redhat.com/errata/RHSA-2019:3950
https://access.redhat.com/errata/RHSA-2019:3951
https://access.redhat.com/errata/RHSA-2020:0293
https://bugzilla.libsdl.org/show_bug.cgi?id=4538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13616
https://linux.oracle.com/cve/CVE-2019-13616.html
https://linux.oracle.com/errata/ELSA-2019-4024.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEH5RO7XZA5DDCO2XOP4QHDEELQQTYV2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UITVW4WTOOCECLLWPQCV7VWMU66DN255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDNX3RVXTWELBXQDNERNVVKDGKDF2MPB/
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://ubuntu.com/security/notices/USN-4238-1
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
https://usn.ubuntu.com/4238-1/
| +| libsdl2-2.0-0 | CVE-2019-7572 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7572.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
| +| libsdl2-2.0-0 | CVE-2019-7573 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7573.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
| +| libsdl2-2.0-0 | CVE-2019-7574 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7574
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7574.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
| +| libsdl2-2.0-0 | CVE-2019-7575 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7575
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7575.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
| +| libsdl2-2.0-0 | CVE-2019-7576 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7576
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7576.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
| +| libsdl2-2.0-0 | CVE-2019-7577 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7577
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7577.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MD6EIV2CS6QNDU3UN2RVXPQOFQNHXCP7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFYUCO6D5APPM7IOZ5WOCYVY4DKSXFKD/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
| +| libsdl2-2.0-0 | CVE-2019-7578 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7578
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7578.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
| +| libsdl2-2.0-0 | CVE-2019-7635 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7635
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7635.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4143-1
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://ubuntu.com/security/notices/USN-4238-1
https://usn.ubuntu.com/4143-1/
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
https://usn.ubuntu.com/4238-1/
| +| libsdl2-2.0-0 | CVE-2019-7636 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7636
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7636.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4143-1
https://ubuntu.com/security/notices/USN-4156-1
https://ubuntu.com/security/notices/USN-4156-2
https://usn.ubuntu.com/4143-1/
https://usn.ubuntu.com/4156-1/
https://usn.ubuntu.com/4156-2/
| +| libsdl2-2.0-0 | CVE-2019-7638 | HIGH | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html
https://bugzilla.libsdl.org/show_bug.cgi?id=4500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7638
https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
https://linux.oracle.com/cve/CVE-2019-7638.html
https://linux.oracle.com/errata/ELSA-2020-4627.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00021.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
https://security.gentoo.org/glsa/201909-07
https://ubuntu.com/security/notices/USN-4143-1
https://ubuntu.com/security/notices/USN-4156-1
https://usn.ubuntu.com/4143-1/
https://usn.ubuntu.com/4156-1/
| +| libsdl2-2.0-0 | CVE-2020-14409 | HIGH | 2.0.9+dfsg1-1 | |
Expand...https://bugzilla.libsdl.org/show_bug.cgi?id=5200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14409
https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9
https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FS32YCEJLQ2FYUWSWYI2ZMQWQEAWJNR/
| +| libsdl2-2.0-0 | CVE-2019-13626 | MEDIUM | 2.0.9+dfsg1-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html
https://bugzilla-attachments.libsdl.org/attachment.cgi?id=3610
https://bugzilla.libsdl.org/show_bug.cgi?id=4522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13626
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/
https://security.gentoo.org/glsa/201909-07
| +| libsdl2-2.0-0 | CVE-2020-14410 | MEDIUM | 2.0.9+dfsg1-1 | |
Expand...https://bugzilla.libsdl.org/show_bug.cgi?id=5200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14410
https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9
https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FS32YCEJLQ2FYUWSWYI2ZMQWQEAWJNR/
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsepol1-dev | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1-dev | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1-dev | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1-dev | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libsndfile1 | CVE-2021-4156 | MEDIUM | 1.0.28-6+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2027690
| +| libspeex1 | CVE-2020-23903 | MEDIUM | 1.2~rc1.2-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23903
https://github.com/xiph/speex/issues/13
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXCRAYNW5ESCE2PIGTUXZNZHNYFLJ6PX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3SEV2ZRR47GSD3M7O5PH4XEJMKJJNG2/
https://ubuntu.com/security/notices/USN-5280-1
| +| libspeex1 | CVE-2020-23904 | MEDIUM | 1.2~rc1.2-1 | |
Expand...https://github.com/xiph/speex/issues/14
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www.tenable.com/security/tns-2021-14
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh-gcrypt-4 | CVE-2019-14889 | HIGH | 0.8.7-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00047.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14889
https://linux.oracle.com/cve/CVE-2019-14889.html
https://linux.oracle.com/errata/ELSA-2020-4545.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JJWJTXVWLLJTVHBPGWL7472S5FWXYQR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EV2ONSPDJCTDVORCB4UGRQUZQQ46JHRN/
https://security.gentoo.org/glsa/202003-27
https://ubuntu.com/security/notices/USN-4219-1
https://usn.ubuntu.com/4219-1/
https://www.libssh.org/security/advisories/CVE-2019-14889.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libssh-gcrypt-4 | CVE-2020-16135 | MEDIUM | 0.8.7-1+deb10u1 | |
Expand...https://bugs.gentoo.org/734624
https://bugs.libssh.org/T232
https://bugs.libssh.org/rLIBSSHe631ebb3e2247dd25e9678e6827c20dc73b73238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16135
https://gitlab.com/libssh/libssh-mirror/-/merge_requests/120
https://gitlab.com/libssh/libssh-mirror/-/merge_requests/120/diffs?commit_id=1493b4466fa394b321d196ad63dd6a4fa395d337
https://gitlab.com/libssh/libssh-mirror/-/merge_requests/120/diffs?commit_id=65ae496222018221080dd753a52f6d70bf3ca5f3
https://gitlab.com/libssh/libssh-mirror/-/merge_requests/120/diffs?commit_id=dbfb7f44aa905a7103bdde9a198c1e9b0f480c2e
https://gitlab.com/libssh/libssh-mirror/-/merge_requests/120/diffs?commit_id=df0acab3a077bd8ae015e3e8b4c71ff31b5900fe
https://linux.oracle.com/cve/CVE-2020-16135.html
https://linux.oracle.com/errata/ELSA-2021-4387.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIKQRKXAAB4HMWM62EPZJ4DVBHIIEG6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNW5GBC6JFN76VEWQXMLT5F7VCZ5AJ2E/
https://security.gentoo.org/glsa/202011-05
https://ubuntu.com/security/notices/USN-4447-1
https://usn.ubuntu.com/4447-1/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1d-0+deb10u7 | 1.1.1d-0+deb10u8 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | 1.1.1d-0+deb10u8 |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++-8-dev | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++-8-dev | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libswresample3 | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| libswresample3 | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| libswresample3 | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| libswresample3 | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| libswresample3 | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| libswresample3 | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswresample3 | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libswresample3 | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| libswresample3 | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| libswresample3 | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| libswresample3 | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libswresample3 | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| libswresample3 | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| libswresample3 | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| libswresample3 | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| libswresample3 | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| libswresample3 | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| libswresample3 | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswresample3 | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswresample3 | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswresample3 | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswresample3 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswscale5 | CVE-2020-20891 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| +| libswscale5 | CVE-2020-20892 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20892
https://trac.ffmpeg.org/ticket/8265
| +| libswscale5 | CVE-2020-20896 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20896
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/dd01947397b98e94c3f2a79d5820aaf4594f4d3b
https://trac.ffmpeg.org/ticket/8273
| +| libswscale5 | CVE-2020-21688 | HIGH | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21688
https://trac.ffmpeg.org/ticket/8186
https://www.debian.org/security/2021/dsa-4998
| +| libswscale5 | CVE-2020-21697 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21697
https://trac.ffmpeg.org/ticket/8188
https://www.debian.org/security/2021/dsa-4998
| +| libswscale5 | CVE-2021-3566 | MEDIUM | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| +| libswscale5 | CVE-2020-20450 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20450
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3865b1952e5cf993b016d83ba78fe1deb63bbfad (4.3)
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5400e4a50c61e53e1bc50b3e77201649bbe9c510
https://trac.ffmpeg.org/ticket/7993
https://www.debian.org/security/2021/dsa-4998
| +| libswscale5 | CVE-2020-20451 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| +| libswscale5 | CVE-2020-20898 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20898
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswscale5 | CVE-2020-22038 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22038
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=7c32e9cf93b712f8463573a59ed4e98fd10fa013
https://trac.ffmpeg.org/ticket/8285
| +| libswscale5 | CVE-2020-22039 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22039
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a581bb66ea5eb981e2e498ca301df7d1ef15a6a3
https://trac.ffmpeg.org/ticket/8302
| +| libswscale5 | CVE-2020-22040 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22040
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1a0c584abc9709b1d11dbafef05d22e0937d7d19
https://trac.ffmpeg.org/ticket/8283
| +| libswscale5 | CVE-2020-22041 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22041
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3488e0977c671568731afa12b811adce9d4d807f
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8296
| +| libswscale5 | CVE-2020-22042 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22042
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=426c16d61a9b5056a157a1a2a057a4e4d13eef84
https://trac.ffmpeg.org/ticket/8267
https://www.debian.org/security/2021/dsa-4998
| +| libswscale5 | CVE-2020-22043 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22043
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b288a7eb3d963a175e177b6219c8271076ee8590
https://trac.ffmpeg.org/ticket/8284
| +| libswscale5 | CVE-2020-22044 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22044
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=1d479300cbe0522c233b7d51148aea2b29bd29ad
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8295
| +| libswscale5 | CVE-2020-22046 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22046
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8294
| +| libswscale5 | CVE-2020-22048 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22048
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8303
| +| libswscale5 | CVE-2020-22051 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22051
https://trac.ffmpeg.org/ticket/8313
| +| libswscale5 | CVE-2020-22056 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22056
https://trac.ffmpeg.org/ticket/8304
| +| libswscale5 | CVE-2021-38090 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38090
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswscale5 | CVE-2021-38091 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38091
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswscale5 | CVE-2021-38092 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38092
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswscale5 | CVE-2021-38093 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38093
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libswscale5 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff-dev | CVE-2022-0891 | HIGH | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-0561 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-0562 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-0907 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
https://gitlab.com/libtiff/libtiff/-/issues/392
https://gitlab.com/libtiff/libtiff/-/merge_requests/314
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-0908 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
https://gitlab.com/libtiff/libtiff/-/issues/383
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-0909 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
https://gitlab.com/libtiff/libtiff/-/issues/393
https://gitlab.com/libtiff/libtiff/-/merge_requests/310
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-0924 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
https://gitlab.com/libtiff/libtiff/-/issues/278
https://gitlab.com/libtiff/libtiff/-/merge_requests/311
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2022-22844 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff-dev | CVE-2014-8130 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiff-dev | CVE-2017-16232 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
| +| libtiff-dev | CVE-2017-17973 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiff-dev | CVE-2017-5563 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff-dev | CVE-2017-9117 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff-dev | CVE-2018-10126 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff-dev | CVE-2020-35521 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932034
https://linux.oracle.com/cve/CVE-2020-35521.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiff-dev | CVE-2020-35522 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiff5 | CVE-2022-0891 | HIGH | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-0561 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-0562 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-0907 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
https://gitlab.com/libtiff/libtiff/-/issues/392
https://gitlab.com/libtiff/libtiff/-/merge_requests/314
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-0908 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
https://gitlab.com/libtiff/libtiff/-/issues/383
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-0909 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
https://gitlab.com/libtiff/libtiff/-/issues/393
https://gitlab.com/libtiff/libtiff/-/merge_requests/310
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-0924 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
https://gitlab.com/libtiff/libtiff/-/issues/278
https://gitlab.com/libtiff/libtiff/-/merge_requests/311
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2022-22844 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5 | CVE-2014-8130 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiff5 | CVE-2017-16232 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
| +| libtiff5 | CVE-2017-17973 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiff5 | CVE-2017-5563 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2017-9117 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff5 | CVE-2020-35521 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932034
https://linux.oracle.com/cve/CVE-2020-35521.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiff5 | CVE-2020-35522 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiff5-dev | CVE-2022-0891 | HIGH | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5-dev | CVE-2022-0561 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5-dev | CVE-2022-0562 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5-dev | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5-dev | CVE-2022-0907 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
https://gitlab.com/libtiff/libtiff/-/issues/392
https://gitlab.com/libtiff/libtiff/-/merge_requests/314
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5-dev | CVE-2022-0908 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
https://gitlab.com/libtiff/libtiff/-/issues/383
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5-dev | CVE-2022-0909 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
https://gitlab.com/libtiff/libtiff/-/issues/393
https://gitlab.com/libtiff/libtiff/-/merge_requests/310
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5-dev | CVE-2022-0924 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
https://gitlab.com/libtiff/libtiff/-/issues/278
https://gitlab.com/libtiff/libtiff/-/merge_requests/311
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5-dev | CVE-2022-22844 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| +| libtiff5-dev | CVE-2014-8130 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiff5-dev | CVE-2017-16232 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
| +| libtiff5-dev | CVE-2017-17973 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiff5-dev | CVE-2017-5563 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5-dev | CVE-2017-9117 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5-dev | CVE-2018-10126 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff5-dev | CVE-2020-35521 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932034
https://linux.oracle.com/cve/CVE-2020-35521.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiff5-dev | CVE-2020-35522 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiffxx5 | CVE-2022-0891 | HIGH | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-0561 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-0562 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.netapp.com/advisory/ntap-20220318-0001/
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-0907 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
https://gitlab.com/libtiff/libtiff/-/issues/392
https://gitlab.com/libtiff/libtiff/-/merge_requests/314
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-0908 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
https://gitlab.com/libtiff/libtiff/-/issues/383
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-0909 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
https://gitlab.com/libtiff/libtiff/-/issues/393
https://gitlab.com/libtiff/libtiff/-/merge_requests/310
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-0924 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
https://gitlab.com/libtiff/libtiff/-/issues/278
https://gitlab.com/libtiff/libtiff/-/merge_requests/311
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2022-22844 | MEDIUM | 4.1.0+git191117-2~deb10u3 | 4.1.0+git191117-2~deb10u4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| +| libtiffxx5 | CVE-2014-8130 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiffxx5 | CVE-2017-16232 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
| +| libtiffxx5 | CVE-2017-17973 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiffxx5 | CVE-2017-5563 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiffxx5 | CVE-2017-9117 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiffxx5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiffxx5 | CVE-2020-35521 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932034
https://linux.oracle.com/cve/CVE-2020-35521.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtiffxx5 | CVE-2020-35522 | LOW | 4.1.0+git191117-2~deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libtsan0 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libtsan0 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libubsan1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libubsan1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libvpx5 | CVE-2017-0641 | LOW | 1.7.0-3+deb10u1 | |
Expand...http://www.securityfocus.com/bid/98868
http://www.securitytracker.com/id/1038623
https://android.googlesource.com/platform/external/libvpx/+/698796fc930baecf5c3fdebef17e73d5d9a58bcb
https://source.android.com/security/bulletin/2017-06-01
| +| libwavpack1 | CVE-2020-35738 | MEDIUM | 5.1.0-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35738
https://github.com/dbry/WavPack/issues/91
https://github.com/dbry/WavPack/releases/tag/5.4.0
https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2YZLKYE66EU4XRHTABV5LB2G7ZDZ422F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/76B7K6F74FDQATG7FECXR5KPIG52O2VL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PENN4ZXRPZULEJOYTTLUZMBZ5H46QTUC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDFY4NGGDUTLVID5PNVU7LL2G2ZJLZFY/
https://ubuntu.com/security/notices/USN-4682-1
| +| libwavpack1 | CVE-2019-1010317 | LOW | 5.1.0-6 | 5.1.0-6+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010317
https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b
https://github.com/dbry/WavPack/issues/66
https://linux.oracle.com/cve/CVE-2019-1010317.html
https://linux.oracle.com/errata/ELSA-2020-1581.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IX3J2JML5A7KC2BLGBEFTIIZR3EM7LVJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYESOAZ6Z6IG4BQBURL6OUY6P4YB6SKS/
https://ubuntu.com/security/notices/USN-4062-1
https://usn.ubuntu.com/4062-1/
| +| libwavpack1 | CVE-2019-1010319 | LOW | 5.1.0-6 | 5.1.0-6+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010319
https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe
https://github.com/dbry/WavPack/issues/68
https://linux.oracle.com/cve/CVE-2019-1010319.html
https://linux.oracle.com/errata/ELSA-2020-1581.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IX3J2JML5A7KC2BLGBEFTIIZR3EM7LVJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYESOAZ6Z6IG4BQBURL6OUY6P4YB6SKS/
https://ubuntu.com/security/notices/USN-4062-1
https://usn.ubuntu.com/4062-1/
| +| libwavpack1 | CVE-2021-44269 | LOW | 5.1.0-6 | |
Expand...https://github.com/dbry/WavPack/issues/110
| +| libwebp-dev | CVE-2016-9085 | LOW | 0.6.1-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpdemux2 | CVE-2016-9085 | LOW | 0.6.1-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://ubuntu.com/security/notices/USN-5324-1
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxml2-dev | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2-dev | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://ubuntu.com/security/notices/USN-5324-1
| +| libxml2-dev | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libzmq5 | CVE-2021-20236 | CRITICAL | 4.3.1-4+deb10u2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1921976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236
https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8
| +| libzmq5 | CVE-2021-20235 | HIGH | 4.3.1-4+deb10u2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1921983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235
https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6
| +| libzmq5 | CVE-2021-20237 | HIGH | 4.3.1-4+deb10u2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1921989
https://github.com/zeromq/libzmq/security/advisories/GHSA-4p5v-h92w-6wxw
| +| libzmq5 | CVE-2021-20234 | MEDIUM | 4.3.1-4+deb10u2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1921972
https://github.com/zeromq/libzmq/security/advisories/GHSA-wfr2-29gj-5w87
| +| linux-libc-dev | CVE-2021-39713 | CRITICAL | 4.19.208-1 | 4.19.232-1 |
Expand...https://android.googlesource.com/kernel/common/+/3a7d0d07a3867
https://android.googlesource.com/kernel/common/+/6f99528e97977
https://android.googlesource.com/kernel/common/+/86bd446b5cebd
https://android.googlesource.com/kernel/common/+/9d7e82cec35c0
https://android.googlesource.com/kernel/common/+/e368fdb61d8e7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
https://source.android.com/security/bulletin/pixel/2022-03-01
| +| linux-libc-dev | CVE-2013-7445 | HIGH | 4.19.208-1 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2019-19378 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19449 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://ubuntu.com/security/notices/USN-5343-1
| +| linux-libc-dev | CVE-2019-19814 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-12362 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362
https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-36385 | HIGH | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385
https://git.kernel.org/linus/f5449e74802c1112dea984aec8af7a33c4516af1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
https://linux.oracle.com/cve/CVE-2020-36385.html
https://linux.oracle.com/errata/ELSA-2021-4777.html
https://security.netapp.com/advisory/ntap-20210720-0004/
https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2
https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://ubuntu.com/security/notices/USN-5343-1
| +| linux-libc-dev | CVE-2021-20322 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2014230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://security.netapp.com/advisory/ntap-20220303-0002/
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-22600 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5266-1
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5298-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-3493 | HIGH | 4.19.208-1 | |
Expand...http://packetstormsecurity.com/files/162434/Kernel-Live-Patch-Security-Notice-LSN-0076-1.html
http://packetstormsecurity.com/files/162866/Ubuntu-OverlayFS-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/165151/Ubuntu-Overlayfs-Local-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3493
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52
https://ubuntu.com/security/notices/USN-4915-1
https://ubuntu.com/security/notices/USN-4916-1
https://ubuntu.com/security/notices/USN-4917-1
https://www.openwall.com/lists/oss-security/2021/04/16/1
| +| linux-libc-dev | CVE-2021-3640 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://linux.oracle.com/cve/CVE-2021-3640.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lkml.org/lkml/2021/8/28/238
https://ubuntu.com/security/CVE-2021-3640
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/07/22/1
https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/
https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/
https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/
| +| linux-libc-dev | CVE-2021-3752 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1999544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
https://linux.oracle.com/cve/CVE-2021-3752.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/
https://security.netapp.com/advisory/ntap-20220318-0009/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/09/15/4
| +| linux-libc-dev | CVE-2021-3760 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2000585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://security.netapp.com/advisory/ntap-20220318-0007/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/10/26/2
| +| linux-libc-dev | CVE-2021-38207 | HIGH | 4.19.208-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207
https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d
https://security.netapp.com/advisory/ntap-20210902-0007/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5120-1
| +| linux-libc-dev | CVE-2021-38300 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/09/15/5
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/bpf/20210915160437.4080-1-piotras@gmail.com/
https://security.netapp.com/advisory/ntap-20211008-0003/
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/09/15/5
| +| linux-libc-dev | CVE-2021-3864 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-39685 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=36dfdf11af49d3c009c711fb16f5c6e7a274505d
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=6eea4ace62fa6414432692ee44f0c0a3d541d97a
https://github.com/szymonh/inspector-gadget
https://gitlab.com/postmarketOS/pmaports/-/issues/1346
https://linux.oracle.com/cve/CVE-2021-39685.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://source.android.com/security/bulletin/2022-03-01
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://www.openwall.com/lists/oss-security/2021/12/15/4
| +| linux-libc-dev | CVE-2021-39686 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://android.googlesource.com/kernel/common/+/11db2de0af2a
https://android.googlesource.com/kernel/common/+/3af7a2f61023
https://android.googlesource.com/kernel/common/+/a4eacf3227bd
https://android.googlesource.com/kernel/common/+/d49297739550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
https://source.android.com/security/bulletin/2022-03-01
| +| linux-libc-dev | CVE-2021-39698 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://android.googlesource.com/kernel/common/+/363bee27e258
https://android.googlesource.com/kernel/common/+/42288cb44c4b
https://android.googlesource.com/kernel/common/+/50252e4b5e98
https://android.googlesource.com/kernel/common/+/9537bae0da1f
https://android.googlesource.com/kernel/common/+/a880b28a71e3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
https://lore.kernel.org/all/20211209010455.42744-2-ebiggers@kernel.org/
https://lore.kernel.org/all/20211210235312.40412-5-ebiggers@kernel.org/
https://source.android.com/security/bulletin/2022-03-01
https://ubuntu.com/security/notices/USN-5337-1
| +| linux-libc-dev | CVE-2021-4083 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2029923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://git.kernel.org/linus/054aa8d439b9185d4f5eb9a90282d1ce74772969 (5.16-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://security.netapp.com/advisory/ntap-20220217-0005/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-41864 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://linux.oracle.com/cve/CVE-2021-41864.html
https://linux.oracle.com/errata/ELSA-2021-9623.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-4202 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2036682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
| +| linux-libc-dev | CVE-2021-44733 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2030747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c
https://github.com/pjlantz/optee-qemu/blob/main/README.md
https://linux.oracle.com/cve/CVE-2021-44733.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/
https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander@linaro.org/
https://security.netapp.com/advisory/ntap-20220114-0003/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-45469 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/25/1
https://bugzilla.kernel.org/show_bug.cgi?id=215235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&id=5598b24efaf4892741c798b425d543e4bed357a1
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/
https://security.netapp.com/advisory/ntap-20220114-0003/
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-0330 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2042404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c
https://linux.oracle.com/cve/CVE-2022-0330.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.openwall.com/lists/oss-security/2022/01/25/12
| +| linux-libc-dev | CVE-2022-0435 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2048738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
https://linux.oracle.com/cve/CVE-2022-0435.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://www.openwall.com/lists/oss-security/2022/02/10/1
| +| linux-libc-dev | CVE-2022-0492 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
https://bugzilla.redhat.com/show_bug.cgi?id=2051505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
https://linux.oracle.com/cve/CVE-2022-0492.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2022/02/04/1
| +| linux-libc-dev | CVE-2022-0500 | HIGH | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2044578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57
| +| linux-libc-dev | CVE-2022-1011 | HIGH | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
| +| linux-libc-dev | CVE-2022-1048 | HIGH | 4.19.208-1 | |
Expand...https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
| +| linux-libc-dev | CVE-2022-22942 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
https://linux.oracle.com/cve/CVE-2022-22942.html
https://linux.oracle.com/errata/ELSA-2022-0825.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.openwall.com/lists/oss-security/2022/01/27/4
| +| linux-libc-dev | CVE-2022-23036 | HIGH | 4.19.208-1 | 4.19.235-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23037 | HIGH | 4.19.208-1 | 4.19.235-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23038 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23039 | HIGH | 4.19.208-1 | 4.19.235-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23040 | HIGH | 4.19.208-1 | 4.19.235-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23041 | HIGH | 4.19.208-1 | 4.19.235-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23042 | HIGH | 4.19.208-1 | 4.19.235-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-24958 | HIGH | 4.19.208-1 | 4.19.235-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
https://security.netapp.com/advisory/ntap-20220225-0008/
| +| linux-libc-dev | CVE-2022-26490 | HIGH | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1)
https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
| +| linux-libc-dev | CVE-2022-27223 | HIGH | 4.19.208-1 | 4.19.232-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223
https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6)
https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d
| +| linux-libc-dev | CVE-2022-27666 | HIGH | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2061633
https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645
| +| linux-libc-dev | CVE-2019-15213 | MEDIUM | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-15794 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4209-1
https://usn.ubuntu.com/usn/usn-4208-1
https://usn.ubuntu.com/usn/usn-4209-1
| +| linux-libc-dev | CVE-2019-16089 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
https://linux.oracle.com/cve/CVE-2019-16089.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
https://lore.kernel.org/patchwork/patch/1106884/
https://lore.kernel.org/patchwork/patch/1126650/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K03814795?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
| +| linux-libc-dev | CVE-2019-20794 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://github.com/sargun/fuse-example
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
| +| linux-libc-dev | CVE-2020-12363 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | MEDIUM | 4.19.208-1 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-15802 | MEDIUM | 4.19.208-1 | |
Expand...https://arxiv.org/abs/2009.11776
https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
https://hexhive.epfl.ch/BLURtooth/
https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
https://www.kb.cert.org/vuls/id/589825
https://www.kb.cert.org/vuls/id/589825/
| +| linux-libc-dev | CVE-2020-16120 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16120
https://git.kernel.org/linus/05acefb4872dae89e772729efb194af754c877e8
https://git.kernel.org/linus/48bd024b8a40d73ad6b086de2615738da0c7004f
https://git.kernel.org/linus/56230d956739b9cb1cbde439d76227d77979a04d
https://git.kernel.org/linus/b6650dab404c701d7fe08a108b746542a934da84
https://git.kernel.org/linus/d1d04ef8572bc8c22265057bd3d5a79f223f8f52
https://launchpad.net/bugs/1894980
https://launchpad.net/bugs/1900141
https://linux.oracle.com/cve/CVE-2020-16120.html
https://linux.oracle.com/errata/ELSA-2021-9087.html
https://ubuntu.com/USN-4576-1
https://ubuntu.com/USN-4577-1
https://ubuntu.com/USN-4578-1
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4577-1
https://ubuntu.com/security/notices/USN-4578-1
https://www.openwall.com/lists/oss-security/2020/10/13/6
https://www.openwall.com/lists/oss-security/2020/10/14/2
| +| linux-libc-dev | CVE-2020-26141 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26141.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.fragattacks.com
| +| linux-libc-dev | CVE-2020-26145 | MEDIUM | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26145.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/
https://papers.mathyvanhoef.com/usenix2021.pdf
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.fragattacks.com
| +| linux-libc-dev | CVE-2020-26541 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26541
https://linux.oracle.com/cve/CVE-2020-26541.html
https://linux.oracle.com/errata/ELSA-2021-2570.html
https://lkml.org/lkml/2020/9/15/1871
https://lore.kernel.org/lkml/161428671215.677100.6372209948022011988.stgit@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/1884195.1615482306@warthog.procyon.org.uk/
https://lore.kernel.org/lkml/20200916004927.64276-1-eric.snowberg@oracle.com/
https://lore.kernel.org/lkml/20210122181054.32635-1-eric.snowberg@oracle.com/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5210-1
| +| linux-libc-dev | CVE-2020-26555 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1918601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555
https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://ubuntu.com/security/notices/USN-5343-1
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2020-27835 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
| +| linux-libc-dev | CVE-2020-36310 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
https://linux.oracle.com/cve/CVE-2020-36310.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
https://www.debian.org/security/2022/dsa-5095
| +| linux-libc-dev | CVE-2020-36322 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
https://git.kernel.org/linus/5d069dbe8aaf2a197142558b6fb2978189ba3454
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454
https://linux.oracle.com/cve/CVE-2020-36322.html
https://linux.oracle.com/errata/ELSA-2022-0063.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2020-36516 | MEDIUM | 4.19.208-1 | |
Expand...https://dl.acm.org/doi/10.1145/3372297.3417884
https://www.spinics.net/lists/netdev/msg795642.html
| +| linux-libc-dev | CVE-2021-20317 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2005258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
https://git.kernel.org/linus/511885d7061eda3eb1faf3f57dcc936ff75863f1 (5.4-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1
https://linux.oracle.com/cve/CVE-2021-20317.html
https://linux.oracle.com/errata/ELSA-2021-4647.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-20321 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://linux.oracle.com/cve/CVE-2021-20321.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-28711 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| linux-libc-dev | CVE-2021-28712 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| linux-libc-dev | CVE-2021-28713 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| linux-libc-dev | CVE-2021-28714 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-392.html
https://xenbits.xenproject.org/xsa/advisory-392.txt
| +| linux-libc-dev | CVE-2021-28715 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-392.html
https://xenbits.xenproject.org/xsa/advisory-392.txt
| +| linux-libc-dev | CVE-2021-28950 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
https://git.kernel.org/linus/775c5033a0d164622d9d10dd0f0a5531639ed3ed
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=775c5033a0d164622d9d10dd0f0a5531639ed3ed
https://linux.oracle.com/cve/CVE-2021-28950.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/
https://ubuntu.com/security/notices/USN-4911-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-3669 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3744 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2000627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2021-9565.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-3759 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-3764 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
| +| linux-libc-dev | CVE-2021-3772 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/CVE-2021-3772
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5265-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-3847 | MEDIUM | 4.19.208-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
| +| linux-libc-dev | CVE-2021-4002 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2025726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5206-1
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5211-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/11/25/1
| +| linux-libc-dev | CVE-2021-4037 | MEDIUM | 4.19.208-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
| +| linux-libc-dev | CVE-2021-4135 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
https://git.kernel.org/linus/481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 (5.16-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=481221775d53
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
| +| linux-libc-dev | CVE-2021-4149 | MEDIUM | 4.19.208-1 | 4.19.235-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2026485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149
https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
https://lkml.org/lkml/2021/10/18/885
https://lkml.org/lkml/2021/9/13/2565
| +| linux-libc-dev | CVE-2021-4155 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79
https://linux.oracle.com/cve/CVE-2021-4155.html
https://linux.oracle.com/errata/ELSA-2022-9148.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5295-1
https://ubuntu.com/security/notices/USN-5295-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5298-1
https://www.openwall.com/lists/oss-security/2022/01/10/1
| +| linux-libc-dev | CVE-2021-4159 | MEDIUM | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
| +| linux-libc-dev | CVE-2021-4197 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2035652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
| +| linux-libc-dev | CVE-2021-4203 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2230
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
https://bugzilla.redhat.com/show_bug.cgi?id=2036934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/
| +| linux-libc-dev | CVE-2021-42739 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35d2969ea3c7d32aee78066b1f3cf61a0d935a4e
https://linux.oracle.com/cve/CVE-2021-42739.html
https://linux.oracle.com/errata/ELSA-2022-0063.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EHZNHNHRLPC2NJKUDS5PJG5AGRYJVJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOWGMZ2MJFUGNA5QSD5JF4QHIC4URATS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKMQEOEESIO3GMHAOL3NYS36FER6UTWA/
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/
https://seclists.org/oss-sec/2021/q2/46
https://security.netapp.com/advisory/ntap-20211118-0001/
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5266-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-43389 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/11/05/1
https://bugzilla.redhat.com/show_bug.cgi?id=2013180
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
https://seclists.org/oss-sec/2021/q4/39
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/10/19/1
| +| linux-libc-dev | CVE-2021-43975 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5337-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-43976 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-44879 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=215231
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
https://lkml.org/lkml/2022/1/24/4067
https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
https://ubuntu.com/security/notices/USN-5302-1
https://www.openwall.com/lists/oss-security/2022/02/12/1
| +| linux-libc-dev | CVE-2021-45095 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-45480 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
https://git.kernel.org/linus/5f9562ebe710c307adc5f666bf1a2162ee7977c0
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f9562ebe710c307adc5f666bf1a2162ee7977c0
https://github.com/torvalds/linux/commit/5f9562ebe710c307adc5f666bf1a2162ee7977c0
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2021-45868 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=214655
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050
https://www.openwall.com/lists/oss-security/2022/03/17/1
https://www.openwall.com/lists/oss-security/2022/03/17/2
| +| linux-libc-dev | CVE-2022-0001 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.vusec.net/projects/bhi-spectre-bhb/
| +| linux-libc-dev | CVE-2022-0002 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.vusec.net/projects/bhi-spectre-bhb/
| +| linux-libc-dev | CVE-2022-0168 | MEDIUM | 4.19.208-1 | |
Expand...
| +| linux-libc-dev | CVE-2022-0322 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2042822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
https://git.kernel.org/linus/a2d859e3fc97e79d907761550dbc03ff1b36479c (5.15-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c
| +| linux-libc-dev | CVE-2022-0400 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2040604
https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)
https://bugzilla.redhat.com/show_bug.cgi?id=2044575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
| +| linux-libc-dev | CVE-2022-0480 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
| +| linux-libc-dev | CVE-2022-0487 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2044561
https://bugzilla.suse.com/show_bug.cgi?id=1194516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd2db32e7c3e35bd4d9b8bbff689434a50893546
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/
https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-0494 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
| +| linux-libc-dev | CVE-2022-0617 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-0644 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://lkml.org/lkml/2021/10/6/254
https://lore.kernel.org/all/20211007220110.600005-1-willy@infradead.org/
| +| linux-libc-dev | CVE-2022-0812 | MEDIUM | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2058361
https://twitter.com/iMilnb/status/1497125078252806161
| +| linux-libc-dev | CVE-2022-0854 | MEDIUM | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
| +| linux-libc-dev | CVE-2022-23960 | MEDIUM | 4.19.208-1 | 4.19.235-1 |
Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://developer.arm.com/documentation/ka004995/latest/
https://developer.arm.com/support/arm-security-updates
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb
https://linux.oracle.com/cve/CVE-2022-23960.html
https://linux.oracle.com/errata/ELSA-2022-9245.html
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.vusec.net/projects/bhi-spectre-bhb/
| +| linux-libc-dev | CVE-2022-24959 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
https://git.kernel.org/linus/29eb31542787e1019208a2e1047bb7c76c069536 (5.17-rc2)
https://github.com/torvalds/linux/commit/29eb31542787e1019208a2e1047bb7c76c069536
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5302-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-25258 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
https://github.com/szymonh/d-os-descriptor
https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-25375 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)
https://github.com/szymonh/rndis-co
https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2022-26966 | MEDIUM | 4.19.208-1 | 4.19.232-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966
https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062
| +| linux-libc-dev | CVE-2004-0230 | LOW | 4.19.208-1 | |
Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
http://kb.juniper.net/JSA10638
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440
http://secunia.com/advisories/11458
http://secunia.com/advisories/22341
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
http://www.kb.cert.org/vuls/id/415294
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/4030
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.vupen.com/english/advisories/2006/3983
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
| +| linux-libc-dev | CVE-2005-3660 | LOW | 4.19.208-1 | |
Expand...http://secunia.com/advisories/18205
http://securityreason.com/securityalert/291
http://securitytracker.com/id?1015402
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
http://www.securityfocus.com/bid/16041
http://www.vupen.com/english/advisories/2005/3076
https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
| +| linux-libc-dev | CVE-2007-3719 | LOW | 4.19.208-1 | |
Expand...http://osvdb.org/37127
http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
| +| linux-libc-dev | CVE-2008-2544 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
| +| linux-libc-dev | CVE-2008-4609 | LOW | 4.19.208-1 | |
Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.html
http://insecure.org/stf/tcp-dos-attack-explained.html
http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
http://marc.info/?l=bugtraq&m=125856010926699&w=2
http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.outpost24.com/news/news-2008-10-02.html
http://www.us-cert.gov/cas/techalerts/TA09-251A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
| +| linux-libc-dev | CVE-2010-4563 | LOW | 4.19.208-1 | |
Expand...http://seclists.org/dailydave/2011/q2/25
http://seclists.org/fulldisclosure/2011/Apr/254
| +| linux-libc-dev | CVE-2010-5321 | LOW | 4.19.208-1 | |
Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
http://www.openwall.com/lists/oss-security/2015/02/08/4
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
https://bugzilla.kernel.org/show_bug.cgi?id=120571
https://bugzilla.redhat.com/show_bug.cgi?id=620629
| +| linux-libc-dev | CVE-2011-4915 | LOW | 4.19.208-1 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
http://www.openwall.com/lists/oss-security/2011/11/07/9
https://lkml.org/lkml/2011/11/7/340
https://seclists.org/oss-sec/2011/q4/571
https://security-tracker.debian.org/tracker/CVE-2011-4915
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
| +| linux-libc-dev | CVE-2011-4917 | LOW | 4.19.208-1 | |
Expand...
| +| linux-libc-dev | CVE-2012-4542 | LOW | 4.19.208-1 | |
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
| +| linux-libc-dev | CVE-2014-9892 | LOW | 4.19.208-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
| +| linux-libc-dev | CVE-2014-9900 | LOW | 4.19.208-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| linux-libc-dev | CVE-2015-2877 | LOW | 4.19.208-1 | |
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
| +| linux-libc-dev | CVE-2016-10723 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
| +| linux-libc-dev | CVE-2016-8660 | LOW | 4.19.208-1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2017-0630 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/98213
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
| +| linux-libc-dev | CVE-2017-13693 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/100502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2017-13694 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/100500
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 4.19.208-1 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/104593
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-17977 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/105539
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2019-11191 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/18/5
http://www.openwall.com/lists/oss-security/2019/05/22/7
http://www.securityfocus.com/bid/107887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
https://ubuntu.com/security/notices/USN-4006-1
https://ubuntu.com/security/notices/USN-4006-2
https://ubuntu.com/security/notices/USN-4007-1
https://ubuntu.com/security/notices/USN-4007-2
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4006-1/
https://usn.ubuntu.com/4006-2/
https://usn.ubuntu.com/4007-1/
https://usn.ubuntu.com/4007-2/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
| +| linux-libc-dev | CVE-2019-12378 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108475
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
https://linux.oracle.com/cve/CVE-2019-12378.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/229
| +| linux-libc-dev | CVE-2019-12379 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108478
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
| +| linux-libc-dev | CVE-2019-12380 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
| +| linux-libc-dev | CVE-2019-12381 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108473
https://bugzilla.redhat.com/show_bug.cgi?id=1715501
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
https://linux.oracle.com/cve/CVE-2019-12381.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/230
| +| linux-libc-dev | CVE-2019-12382 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
| +| linux-libc-dev | CVE-2019-12455 | LOW | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
| +| linux-libc-dev | CVE-2019-12456 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://bugzilla.redhat.com/show_bug.cgi?id=1717182
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/5/29/1164
https://support.f5.com/csp/article/K84310302
https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;utm_medium=RSS
| +| linux-libc-dev | CVE-2019-12615 | LOW | 4.19.208-1 | |
Expand...http://www.securityfocus.com/bid/108549
https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
https://security.netapp.com/advisory/ntap-20190710-0002/
https://support.f5.com/csp/article/K60924046
https://support.f5.com/csp/article/K60924046?utm_source=f5support&amp;utm_medium=RSS
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2014901.html
| +| linux-libc-dev | CVE-2019-16229 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16230 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-16231 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2019-16232 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
https://linux.oracle.com/cve/CVE-2019-16232.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16233 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-16234 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-19064 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19064
https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://ubuntu.com/security/notices/USN-4300-1
https://usn.ubuntu.com/4300-1/
| +| linux-libc-dev | CVE-2019-19070 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294
https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
| +| linux-libc-dev | CVE-2019-19083 | LOW | 4.19.208-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083
https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-27820 | LOW | 4.19.208-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
| +| linux-libc-dev | CVE-2020-29374 | LOW | 4.19.208-1 | 4.19.232-1 |
Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
https://bugs.chromium.org/p/project-zero/issues/detail?id=2045
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
https://git.kernel.org/linus/17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://security.netapp.com/advisory/ntap-20210115-0002/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://www.debian.org/security/2022/dsa-5096
| +| linux-libc-dev | CVE-2020-35501 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-0929 | LOW | 4.19.208-1 | |
Expand...https://source.android.com/security/bulletin/2021-11-01
| +| linux-libc-dev | CVE-2021-26934 | LOW | 4.19.208-1 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 4.19.208-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2022-24448 | LOW | 4.19.208-1 | 4.19.232-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://ubuntu.com/security/notices/USN-5302-1
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
https://www.spinics.net/lists/stable/msg531976.html
| +| linux-libc-dev | CVE-2022-25265 | LOW | 4.19.208-1 | |
Expand...https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294
https://github.com/x0reaxeax/exec-prot-bypass
https://security.netapp.com/advisory/ntap-20220318-0005/
| +| linux-libc-dev | CVE-2021-3894 | UNKNOWN | 4.19.208-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| locales | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| m4 | CVE-2008-1687 | LOW | 1.4.18-2 | |
Expand...http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/12
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.openwall.com/lists/oss-security/2008/04/07/4
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41706
| +| m4 | CVE-2008-1688 | LOW | 1.4.18-2 | |
Expand...http://osvdb.org/44272
http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41704
| +| mariadb-client | CVE-2021-46667 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
https://jira.mariadb.org/browse/MDEV-26350
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-client | CVE-2021-46669 | HIGH | 1:10.3.31-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669
https://jira.mariadb.org/browse/MDEV-25638
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-client | CVE-2022-24048 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-363/
| +| mariadb-client | CVE-2022-24050 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-364/
| +| mariadb-client | CVE-2022-24051 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-318/
| +| mariadb-client | CVE-2022-24052 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-367/
| +| mariadb-client | CVE-2021-35604 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| mariadb-client | CVE-2021-46659 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659
https://jira.mariadb.org/browse/MDEV-25631
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220311-0003/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client | CVE-2021-46661 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661
https://jira.mariadb.org/browse/MDEV-25766
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client | CVE-2021-46662 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
https://jira.mariadb.org/browse/MDEV-22464
https://jira.mariadb.org/browse/MDEV-25637
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-client | CVE-2021-46663 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663
https://jira.mariadb.org/browse/MDEV-26351
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client | CVE-2021-46664 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664
https://jira.mariadb.org/browse/MDEV-25761
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client | CVE-2021-46665 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665
https://jira.mariadb.org/browse/MDEV-25636
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client | CVE-2021-46668 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668
https://jira.mariadb.org/browse/MDEV-25787
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-10.3 | CVE-2021-46667 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
https://jira.mariadb.org/browse/MDEV-26350
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-client-10.3 | CVE-2021-46669 | HIGH | 1:10.3.31-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669
https://jira.mariadb.org/browse/MDEV-25638
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-client-10.3 | CVE-2022-24048 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-363/
| +| mariadb-client-10.3 | CVE-2022-24050 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-364/
| +| mariadb-client-10.3 | CVE-2022-24051 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-318/
| +| mariadb-client-10.3 | CVE-2022-24052 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-367/
| +| mariadb-client-10.3 | CVE-2021-35604 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| mariadb-client-10.3 | CVE-2021-46659 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659
https://jira.mariadb.org/browse/MDEV-25631
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220311-0003/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-10.3 | CVE-2021-46661 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661
https://jira.mariadb.org/browse/MDEV-25766
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
https://jira.mariadb.org/browse/MDEV-22464
https://jira.mariadb.org/browse/MDEV-25637
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-client-10.3 | CVE-2021-46663 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663
https://jira.mariadb.org/browse/MDEV-26351
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-10.3 | CVE-2021-46664 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664
https://jira.mariadb.org/browse/MDEV-25761
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-10.3 | CVE-2021-46665 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665
https://jira.mariadb.org/browse/MDEV-25636
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-10.3 | CVE-2021-46668 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668
https://jira.mariadb.org/browse/MDEV-25787
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-core-10.3 | CVE-2021-46667 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
https://jira.mariadb.org/browse/MDEV-26350
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-client-core-10.3 | CVE-2021-46669 | HIGH | 1:10.3.31-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669
https://jira.mariadb.org/browse/MDEV-25638
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-client-core-10.3 | CVE-2022-24048 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-363/
| +| mariadb-client-core-10.3 | CVE-2022-24050 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-364/
| +| mariadb-client-core-10.3 | CVE-2022-24051 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-318/
| +| mariadb-client-core-10.3 | CVE-2022-24052 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-367/
| +| mariadb-client-core-10.3 | CVE-2021-35604 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| mariadb-client-core-10.3 | CVE-2021-46659 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659
https://jira.mariadb.org/browse/MDEV-25631
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220311-0003/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-core-10.3 | CVE-2021-46661 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661
https://jira.mariadb.org/browse/MDEV-25766
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-core-10.3 | CVE-2021-46662 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
https://jira.mariadb.org/browse/MDEV-22464
https://jira.mariadb.org/browse/MDEV-25637
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-client-core-10.3 | CVE-2021-46663 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663
https://jira.mariadb.org/browse/MDEV-26351
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-core-10.3 | CVE-2021-46664 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664
https://jira.mariadb.org/browse/MDEV-25761
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-core-10.3 | CVE-2021-46665 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665
https://jira.mariadb.org/browse/MDEV-25636
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-client-core-10.3 | CVE-2021-46668 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668
https://jira.mariadb.org/browse/MDEV-25787
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-common | CVE-2021-46667 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
https://jira.mariadb.org/browse/MDEV-26350
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-common | CVE-2021-46669 | HIGH | 1:10.3.31-0+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669
https://jira.mariadb.org/browse/MDEV-25638
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-common | CVE-2022-24048 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-363/
| +| mariadb-common | CVE-2022-24050 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-364/
| +| mariadb-common | CVE-2022-24051 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-318/
| +| mariadb-common | CVE-2022-24052 | HIGH | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220318-0004/
https://ubuntu.com/security/notices/USN-5305-1
https://www.zerodayinitiative.com/advisories/ZDI-22-367/
| +| mariadb-common | CVE-2021-35604 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| mariadb-common | CVE-2021-46659 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659
https://jira.mariadb.org/browse/MDEV-25631
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220311-0003/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-common | CVE-2021-46661 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661
https://jira.mariadb.org/browse/MDEV-25766
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-common | CVE-2021-46662 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
https://jira.mariadb.org/browse/MDEV-22464
https://jira.mariadb.org/browse/MDEV-25637
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
| +| mariadb-common | CVE-2021-46663 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663
https://jira.mariadb.org/browse/MDEV-26351
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-common | CVE-2021-46664 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664
https://jira.mariadb.org/browse/MDEV-25761
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-common | CVE-2021-46665 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665
https://jira.mariadb.org/browse/MDEV-25636
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mariadb-common | CVE-2021-46668 | MEDIUM | 1:10.3.31-0+deb10u1 | 1:10.3.34-0+deb10u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668
https://jira.mariadb.org/browse/MDEV-25787
https://mariadb.com/kb/en/security/
https://security.netapp.com/advisory/ntap-20220221-0002/
https://ubuntu.com/security/notices/USN-5305-1
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2022-0778 | HIGH | 1.1.1d-0+deb10u7 | 1.1.1d-0+deb10u8 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| +| openssl | CVE-2021-4160 | MEDIUM | 1.1.1d-0+deb10u7 | 1.1.1d-0+deb10u8 |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| patch | CVE-2010-4651 | LOW | 2.7.6-3+deb10u1 | |
Expand...http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html
http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html
http://openwall.com/lists/oss-security/2011/01/05/10
http://openwall.com/lists/oss-security/2011/01/06/19
http://openwall.com/lists/oss-security/2011/01/06/20
http://openwall.com/lists/oss-security/2011/01/06/21
http://secunia.com/advisories/43663
http://secunia.com/advisories/43677
http://support.apple.com/kb/HT4723
http://www.securityfocus.com/bid/46768
http://www.vupen.com/english/advisories/2011/0600
https://bugzilla.redhat.com/show_bug.cgi?id=667529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651
https://ubuntu.com/security/notices/USN-2651-1
| +| patch | CVE-2018-6951 | LOW | 2.7.6-3+deb10u1 | |
Expand...http://www.securityfocus.com/bid/103044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
https://savannah.gnu.org/bugs/index.php?53132
https://security.gentoo.org/glsa/201904-17
https://ubuntu.com/security/notices/USN-3624-1
https://usn.ubuntu.com/3624-1/
| +| patch | CVE-2018-6952 | LOW | 2.7.6-3+deb10u1 | |
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
| +| patch | CVE-2021-45261 | LOW | 2.7.6-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261
https://savannah.gnu.org/bugs/?61685
| +| perl | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-modules-5.28 | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-modules-5.28 | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| python | CVE-2008-4108 | LOW | 2.7.16-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://securityreason.com/securityalert/4274
http://www.securityfocus.com/bid/31184
http://www.securitytracker.com/id?1020904
http://www.vupen.com/english/advisories/2008/2659
https://bugzilla.redhat.com/show_bug.cgi?id=462326
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
| +| python-minimal | CVE-2008-4108 | LOW | 2.7.16-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://securityreason.com/securityalert/4274
http://www.securityfocus.com/bid/31184
http://www.securitytracker.com/id?1020904
http://www.vupen.com/english/advisories/2008/2659
https://bugzilla.redhat.com/show_bug.cgi?id=462326
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
| +| python2 | CVE-2008-4108 | LOW | 2.7.16-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://securityreason.com/securityalert/4274
http://www.securityfocus.com/bid/31184
http://www.securitytracker.com/id?1020904
http://www.vupen.com/english/advisories/2008/2659
https://bugzilla.redhat.com/show_bug.cgi?id=462326
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
| +| python2-minimal | CVE-2008-4108 | LOW | 2.7.16-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
http://marc.info/?l=oss-security&m=122148330903513&w=2
http://marc.info/?l=oss-security&m=122152861617434&w=2
http://securityreason.com/securityalert/4274
http://www.securityfocus.com/bid/31184
http://www.securitytracker.com/id?1020904
http://www.vupen.com/english/advisories/2008/2659
https://bugzilla.redhat.com/show_bug.cgi?id=462326
https://exchange.xforce.ibmcloud.com/vulnerabilities/45161
| +| python2.7 | CVE-2021-3177 | CRITICAL | 2.7.16-2+deb10u1 | |
Expand...https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python2.7 | CVE-2021-23336 | MEDIUM | 2.7.16-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python2.7 | CVE-2021-4189 | MEDIUM | 2.7.16-2+deb10u1 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| +| python2.7 | CVE-2013-7040 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://support.apple.com/kb/HT205031
| +| python2.7 | CVE-2017-17522 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://www.securityfocus.com/bid/102207
https://bugs.python.org/issue32367
https://security-tracker.debian.org/tracker/CVE-2017-17522
| +| python2.7 | CVE-2019-18348 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| python2.7 | CVE-2019-20907 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
https://bugs.python.org/issue39017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
https://github.com/python/cpython/pull/21454
https://linux.oracle.com/cve/CVE-2019-20907.html
https://linux.oracle.com/errata/ELSA-2020-5010.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://security.gentoo.org/glsa/202008-01
https://security.netapp.com/advisory/ntap-20200731-0002/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.oracle.com/security-alerts/cpujan2021.html
| +| python2.7 | CVE-2019-9674 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| python2.7 | CVE-2020-8492 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
| +| python2.7-minimal | CVE-2021-3177 | CRITICAL | 2.7.16-2+deb10u1 | |
Expand...https://bugs.python.org/issue42938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://github.com/python/cpython/pull/24239
https://linux.oracle.com/cve/CVE-2021-3177.html
https://linux.oracle.com/errata/ELSA-2021-9130.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/
https://news.ycombinator.com/item?id=26185005
https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html
https://security.gentoo.org/glsa/202101-18
https://security.netapp.com/advisory/ntap-20210226-0003/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7)
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-4754-4
https://ubuntu.com/security/notices/USN-4754-5
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python2.7-minimal | CVE-2021-23336 | MEDIUM | 2.7.16-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python2.7-minimal | CVE-2021-4189 | MEDIUM | 2.7.16-2+deb10u1 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| +| python2.7-minimal | CVE-2013-7040 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://support.apple.com/kb/HT205031
| +| python2.7-minimal | CVE-2017-17522 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://www.securityfocus.com/bid/102207
https://bugs.python.org/issue32367
https://security-tracker.debian.org/tracker/CVE-2017-17522
| +| python2.7-minimal | CVE-2019-18348 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| python2.7-minimal | CVE-2019-20907 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
https://bugs.python.org/issue39017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
https://github.com/python/cpython/pull/21454
https://linux.oracle.com/cve/CVE-2019-20907.html
https://linux.oracle.com/errata/ELSA-2020-5010.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://security.gentoo.org/glsa/202008-01
https://security.netapp.com/advisory/ntap-20200731-0002/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.oracle.com/security-alerts/cpujan2021.html
| +| python2.7-minimal | CVE-2019-9674 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| python2.7-minimal | CVE-2020-8492 | LOW | 2.7.16-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
| +| python3.7 | CVE-2021-3737 | HIGH | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| python3.7 | CVE-2022-0391 | HIGH | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://security.netapp.com/advisory/ntap-20220225-0009/
| +| python3.7 | CVE-2021-23336 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.7 | CVE-2021-3426 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.7 | CVE-2021-3733 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| python3.7 | CVE-2021-4189 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| +| python3.7 | CVE-2017-17522 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://www.securityfocus.com/bid/102207
https://bugs.python.org/issue32367
https://security-tracker.debian.org/tracker/CVE-2017-17522
| +| python3.7 | CVE-2019-18348 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| python3.7 | CVE-2019-9674 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| python3.7 | CVE-2020-27619 | LOW | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| python3.7-minimal | CVE-2021-3737 | HIGH | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| +| python3.7-minimal | CVE-2022-0391 | HIGH | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://security.netapp.com/advisory/ntap-20220225-0009/
| +| python3.7-minimal | CVE-2021-23336 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.7-minimal | CVE-2021-3426 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| python3.7-minimal | CVE-2021-3733 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| +| python3.7-minimal | CVE-2021-4189 | MEDIUM | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| +| python3.7-minimal | CVE-2017-17522 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://www.securityfocus.com/bid/102207
https://bugs.python.org/issue32367
https://security-tracker.debian.org/tracker/CVE-2017-17522
| +| python3.7-minimal | CVE-2019-18348 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| python3.7-minimal | CVE-2019-9674 | LOW | 3.7.3-2+deb10u3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.python.org/news/security/
| +| python3.7-minimal | CVE-2020-27619 | LOW | 3.7.3-2+deb10u3 | |
Expand...https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| +| re2c | CVE-2018-21232 | LOW | 1.1.1-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/05/14/4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21232
https://github.com/skvadrik/re2c/issues/219
https://www.openwall.com/lists/oss-security/2020/04/27/2
| +| supervisor | CVE-2019-12105 | LOW | 3.3.5-1 | |
Expand...http://supervisord.org/configuration.html#inet-http-server-section-settings
https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb
https://github.com/Supervisor/supervisor/issues/1245
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| unzip | CVE-2022-0529 | HIGH | 6.0-23+deb10u2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
https://github.com/ByteHackr/unzip_poc
| +| unzip | CVE-2022-0530 | HIGH | 6.0-23+deb10u2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
https://github.com/ByteHackr/unzip_poc
| +| unzip | CVE-2021-4217 | LOW | 6.0-23+deb10u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| uuid-dev | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| uuid-dev | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| vim | CVE-2022-0318 | CRITICAL | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| vim | CVE-2021-3770 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim | CVE-2021-3778 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim | CVE-2021-3796 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim | CVE-2021-3872 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim | CVE-2021-3903 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim | CVE-2021-3927 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim | CVE-2021-3928 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim | CVE-2021-3968 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69
https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
| +| vim | CVE-2021-3973 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim | CVE-2021-3974 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim | CVE-2021-3984 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim | CVE-2021-4019 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim | CVE-2021-4069 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim | CVE-2021-4166 | HIGH | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim | CVE-2021-4192 | HIGH | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim | CVE-2022-0261 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| vim | CVE-2022-0351 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
| +| vim | CVE-2022-0359 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim | CVE-2022-0361 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim | CVE-2022-0368 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim | CVE-2022-0392 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| vim | CVE-2022-0393 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim | CVE-2022-0407 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
| +| vim | CVE-2022-0408 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim | CVE-2022-0413 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
https://linux.oracle.com/cve/CVE-2022-0413.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim | CVE-2022-0417 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim | CVE-2022-0443 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim | CVE-2022-0554 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim | CVE-2022-0572 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim | CVE-2022-0629 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
| +| vim | CVE-2022-0685 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim | CVE-2022-0729 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
| +| vim | CVE-2022-0943 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
| +| vim | CVE-2019-20807 | MEDIUM | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
http://seclists.org/fulldisclosure/2020/Jul/24
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807
https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075
https://github.com/vim/vim/releases/tag/v8.1.0881
https://linux.oracle.com/cve/CVE-2019-20807.html
https://linux.oracle.com/errata/ELSA-2020-4453.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
| +| vim | CVE-2021-4193 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim | CVE-2022-0156 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
https://support.apple.com/kb/HT213183
| +| vim | CVE-2022-0213 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim | CVE-2022-0319 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim | CVE-2022-0696 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1
https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim | CVE-2022-0714 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
| +| vim | CVE-2008-4677 | LOW | 2:8.1.0875-5 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| +| vim | CVE-2017-1000382 | LOW | 2:8.1.0875-5 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| +| vim | CVE-2022-0158 | LOW | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0158
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 (v8.2.4049)
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
https://support.apple.com/kb/HT213183
| +| vim-common | CVE-2022-0318 | CRITICAL | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| vim-common | CVE-2021-3770 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-common | CVE-2021-3778 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-common | CVE-2021-3796 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-common | CVE-2021-3872 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-common | CVE-2021-3903 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-common | CVE-2021-3927 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-common | CVE-2021-3928 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-common | CVE-2021-3968 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69
https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
| +| vim-common | CVE-2021-3973 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-common | CVE-2021-3974 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-common | CVE-2021-3984 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-common | CVE-2021-4019 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-common | CVE-2021-4069 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-common | CVE-2021-4166 | HIGH | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim-common | CVE-2021-4192 | HIGH | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim-common | CVE-2022-0261 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| vim-common | CVE-2022-0351 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
| +| vim-common | CVE-2022-0359 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-common | CVE-2022-0361 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-common | CVE-2022-0368 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-common | CVE-2022-0392 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| vim-common | CVE-2022-0393 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-common | CVE-2022-0407 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
| +| vim-common | CVE-2022-0408 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-common | CVE-2022-0413 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
https://linux.oracle.com/cve/CVE-2022-0413.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-common | CVE-2022-0417 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-common | CVE-2022-0443 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-common | CVE-2022-0554 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim-common | CVE-2022-0572 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim-common | CVE-2022-0629 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
| +| vim-common | CVE-2022-0685 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim-common | CVE-2022-0729 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
| +| vim-common | CVE-2022-0943 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
| +| vim-common | CVE-2019-20807 | MEDIUM | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
http://seclists.org/fulldisclosure/2020/Jul/24
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807
https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075
https://github.com/vim/vim/releases/tag/v8.1.0881
https://linux.oracle.com/cve/CVE-2019-20807.html
https://linux.oracle.com/errata/ELSA-2020-4453.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
| +| vim-common | CVE-2021-4193 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim-common | CVE-2022-0156 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
https://support.apple.com/kb/HT213183
| +| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-common | CVE-2022-0696 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1
https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
| +| vim-common | CVE-2008-4677 | LOW | 2:8.1.0875-5 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| +| vim-common | CVE-2017-1000382 | LOW | 2:8.1.0875-5 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| +| vim-common | CVE-2022-0158 | LOW | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0158
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 (v8.2.4049)
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
https://support.apple.com/kb/HT213183
| +| vim-runtime | CVE-2022-0318 | CRITICAL | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| vim-runtime | CVE-2021-3770 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-runtime | CVE-2021-3778 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-runtime | CVE-2021-3796 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| vim-runtime | CVE-2021-3872 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-runtime | CVE-2021-3903 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-runtime | CVE-2021-3927 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-runtime | CVE-2021-3928 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| vim-runtime | CVE-2021-3968 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69
https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
| +| vim-runtime | CVE-2021-3973 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-runtime | CVE-2021-3974 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-runtime | CVE-2021-3984 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-runtime | CVE-2021-4019 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-runtime | CVE-2021-4069 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://ubuntu.com/security/notices/USN-5247-1
| +| vim-runtime | CVE-2021-4166 | HIGH | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim-runtime | CVE-2021-4192 | HIGH | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim-runtime | CVE-2022-0261 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| vim-runtime | CVE-2022-0351 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
| +| vim-runtime | CVE-2022-0359 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-runtime | CVE-2022-0361 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-runtime | CVE-2022-0368 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-runtime | CVE-2022-0392 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| vim-runtime | CVE-2022-0393 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-runtime | CVE-2022-0407 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
| +| vim-runtime | CVE-2022-0408 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-runtime | CVE-2022-0413 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
https://linux.oracle.com/cve/CVE-2022-0413.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-runtime | CVE-2022-0417 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-runtime | CVE-2022-0443 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-runtime | CVE-2022-0554 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim-runtime | CVE-2022-0572 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim-runtime | CVE-2022-0629 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
| +| vim-runtime | CVE-2022-0685 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim-runtime | CVE-2022-0729 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
| +| vim-runtime | CVE-2022-0943 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
| +| vim-runtime | CVE-2019-20807 | MEDIUM | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
http://seclists.org/fulldisclosure/2020/Jul/24
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807
https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075
https://github.com/vim/vim/releases/tag/v8.1.0881
https://linux.oracle.com/cve/CVE-2019-20807.html
https://linux.oracle.com/errata/ELSA-2020-4453.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
| +| vim-runtime | CVE-2021-4193 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| vim-runtime | CVE-2022-0156 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
https://support.apple.com/kb/HT213183
| +| vim-runtime | CVE-2022-0213 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-runtime | CVE-2022-0319 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| vim-runtime | CVE-2022-0696 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1
https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| vim-runtime | CVE-2022-0714 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
| +| vim-runtime | CVE-2008-4677 | LOW | 2:8.1.0875-5 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| +| vim-runtime | CVE-2017-1000382 | LOW | 2:8.1.0875-5 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| +| vim-runtime | CVE-2022-0158 | LOW | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0158
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 (v8.2.4049)
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
https://support.apple.com/kb/HT213183
| +| xxd | CVE-2022-0318 | CRITICAL | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| xxd | CVE-2021-3770 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| +| xxd | CVE-2021-3778 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| xxd | CVE-2021-3796 | HIGH | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://ubuntu.com/security/notices/USN-5093-1
| +| xxd | CVE-2021-3872 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| +| xxd | CVE-2021-3903 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| +| xxd | CVE-2021-3927 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| xxd | CVE-2021-3928 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928
https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://ubuntu.com/security/notices/USN-5147-1
| +| xxd | CVE-2021-3968 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69
https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
| +| xxd | CVE-2021-3973 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| xxd | CVE-2021-3974 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://ubuntu.com/security/notices/USN-5247-1
| +| xxd | CVE-2021-3984 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| xxd | CVE-2021-4019 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5247-1
| +| xxd | CVE-2021-4069 | HIGH | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://ubuntu.com/security/notices/USN-5247-1
| +| xxd | CVE-2021-4166 | HIGH | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| xxd | CVE-2021-4192 | HIGH | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| xxd | CVE-2022-0261 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| xxd | CVE-2022-0351 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
| +| xxd | CVE-2022-0359 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| xxd | CVE-2022-0361 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| xxd | CVE-2022-0368 | HIGH | 2:8.1.0875-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| xxd | CVE-2022-0392 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
| +| xxd | CVE-2022-0393 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| xxd | CVE-2022-0407 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
| +| xxd | CVE-2022-0408 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| xxd | CVE-2022-0413 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
https://linux.oracle.com/cve/CVE-2022-0413.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| xxd | CVE-2022-0417 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| xxd | CVE-2022-0443 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| xxd | CVE-2022-0554 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| xxd | CVE-2022-0572 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| xxd | CVE-2022-0629 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
| +| xxd | CVE-2022-0685 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| xxd | CVE-2022-0729 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
| +| xxd | CVE-2022-0943 | HIGH | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
| +| xxd | CVE-2019-20807 | MEDIUM | 2:8.1.0875-5 | 2:8.1.0875-5+deb10u1 |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
http://seclists.org/fulldisclosure/2020/Jul/24
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807
https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075
https://github.com/vim/vim/releases/tag/v8.1.0881
https://linux.oracle.com/cve/CVE-2019-20807.html
https://linux.oracle.com/errata/ELSA-2020-4453.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
| +| xxd | CVE-2021-4193 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://support.apple.com/kb/HT213183
| +| xxd | CVE-2022-0156 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
https://support.apple.com/kb/HT213183
| +| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.0875-5 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
| +| xxd | CVE-2022-0696 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1
https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
| +| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.0875-5 | |
Expand...https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
| +| xxd | CVE-2008-4677 | LOW | 2:8.1.0875-5 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| +| xxd | CVE-2017-1000382 | LOW | 2:8.1.0875-5 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| +| xxd | CVE-2022-0158 | LOW | 2:8.1.0875-5 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0158
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 (v8.2.4049)
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
https://support.apple.com/kb/HT213183
| +| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://www.openwall.com/lists/oss-security/2022/03/24/1
| +| zlib1g-dev | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://www.openwall.com/lists/oss-security/2022/03/24/1
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/mariadb:v10.7.3@sha256:a449af8351ad73fb2807057028ddc2f25c350a59b89686c6ac0e6170f6787005 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| bsdutils | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| fdisk | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libblkid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://ubuntu.com/security/notices/USN-5310-1
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libfdisk1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | 2:6.1.2+dfsg-4+deb10u1 |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.6.7-4+deb10u7 | |
Expand...
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libuuid1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2022-23308 | HIGH | 2.9.4+dfsg1-7+deb10u2 | 2.9.4+dfsg1-7+deb10u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://ubuntu.com/security/notices/USN-5324-1
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u8 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
| +| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://www.openwall.com/lists/oss-security/2022/03/24/1
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + diff --git a/incubator/filerun/0.0.1/templates/common.yaml b/incubator/filerun/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..a6613c2ce21 --- /dev/null +++ b/incubator/filerun/0.0.1/templates/common.yaml @@ -0,0 +1 @@ +{{ include "common.all" . }} diff --git a/stable/snipe-it/2.0.4/values.yaml b/incubator/filerun/0.0.1/values.yaml similarity index 100% rename from stable/snipe-it/2.0.4/values.yaml rename to incubator/filerun/0.0.1/values.yaml diff --git a/incubator/filerun/item.yaml b/incubator/filerun/item.yaml new file mode 100644 index 00000000000..8c2d533da24 --- /dev/null +++ b/incubator/filerun/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/filerun.png +categories: +- media + diff --git a/stable/snipe-it/2.0.4/charts/mariadb-2.0.7.tgz b/stable/snipe-it/2.0.4/charts/mariadb-2.0.7.tgz deleted file mode 100644 index 92240bc47e8f58ec5f08aa79bb6fb60e950ea767..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 74685 zcmbTdWl&u~vn~uIL4pMc?(P=c-CcvbySuwvaCdiihm8f7jcwfBeRK1kd+w?8^Q&*w zs;RD?d3sHC_4MlL=^>1U{R#1(=aU+O)=*NJ$yid3UDlI}&4@*v$wYc@YpQNdcEyQ`xr&l&-qks?ivTB>`C|k}9CSlnA%ES$ST`HTiVNYMm zY`Rwy^3-mbl?nFTgX7K@wC-Vl)su7;9AK9TjdR@kNA~zAL$*sPr7}eIwVX`tufwsy z`p>6Q&X^EwUguBaGeQUmMbnHALI_2$Kr-7kp`y5=(hn#IFie1?(wx78!CPUqpApW^ zwLt%j59?xKzzjVJ)!BVI(v@26uFi{EpI zj0E_GSYH$2BhL&L$OW7h2kl-Fz1bz0dJahPqN#V@13Y*i_GU?>JeQ4t^j1>#mZD~Z z7N?ZI4tHgn5(_3N&lNAF^FG4xbYv)-ZdgDX7cJ8ENMADI zygF}YmZHjPyo~em>ABukD>=savnn4>*k8PmIHu)t?D5bozDv`P4o z&^9-Q_ezl`hcMKS=D9S2w)I!Kb^n#N+E#r4&KojWc@5BC6Zibn*XMF@kQ+_72tQ7q zS$Pp(Ta8QvGN}N&u@*}sv4FyGJfyN#6ZSY$Ji=12IJN=71Y0mAU2%mTzOu2}YQjR8 z7j-uR$g}a~>yO>QVNwUAVtmc@L>HkXSA6U!D1XoEaO~8l$8o?Xo13xl6*NRG_Gcwc z+D+cq1m2j>w`WckUSgh-ME(q|g6(Iq;UtARJj~%*@7=CA*RCP_xUJ_oDM_lE!mr0W z<4Eo~Ms0njL;8&_u;@d{wqilw)gy{yY)3>p;|fIU5fCOD6AR-^$JtF(I9Nvr&cZ5a z(}56@MTrOAO2=IcaA;hFPP{WYi4oDI|15ns30vD>hOyxcm_0*8aNr=xnf0~SpNCZM zp48m<*BzfU$uu$-&Q3&(aT+QGf7X4PzwuH}q&Wo~m;cmi2sd#}e+6(~Vca#!U*Q5iMO+9LUA-CZ)-+dw8DXb9rW8U%3Gl`JoMg{H} zQir%3)nN6j0AYiNM+kaHk%l&6DzDwwN^P;{IJ1lCfNe<#q3&9Rhz?j>2;1ae@A?k; zE?9ks;Ql1&@Qm{U}90~9YZ64nO3 zR(mDp!TYEvF8ZA>TZexFN7RW!w{(v(JwlZEE#bm_Wv0A-!uTYpDvSV%!Z)@W<8mLr z4`vKM*o#{RzQ7AiXgCUmZb)TVG2o?5Djs{mR1c(cIivxXSNxZf|aT-2?a`b%UorBS4z1g0LH_*a$p2ho;fY6K0PgephZ|SZtXD0;-tH}`V@@kn#VJ!EzUyD*bAlkF}vs; zeB^uGj>?JP`zwFv_;xA>uAN`H@C+-1ADB<+Z@gFE;yD3L8$gPU;6+U$GMjRyI9-mH z#{jf;z{XYICw0|+)W)R)vJ;_cg5^U#(Xn#0pV~Y{tlkeU%hS7ldiL9q)qxYFr|qrJ z+-McAgMS!I*Uc@yE#FRWH$|yG?l9ucD`$N^AA|=93R5^1(YXPxU;!fPl7~L10M_cy ztG&A`|2hQ3^UiUP=Z~j>tVh6Sb=>FTG3e;|cgxZZa`?xV_Y2*{z~EfU-YSm{cX*r` z+2G5mK#m)2^~kB{>)X}16;{^pUkr{D4;a%E3(MO`Sz~_h*@<1J>u$ zjpta-HWf($;2kDo=*di)cRB`t#jP6-)8Op80xY^Xa>tzsep(Jp0bUO3$^k{Ky%P(b zrV1eIJv}F`okAy|$a2U1e6=V%TY|#o*eO0JAtpy*SRUrdpC6;$c&6vTCtity#1RsX zYvm?_3H5P?KUd68@}E>bGokj$9+qi0VQy3kd9p@-l^cnmmpVn0&qD!ON~2o^FlEo< z@HbL4?ca|5vG{4TbI4FVaN+{66umefM50Xw_d}o9eESTJ$Ir|MNKeSelCZ*`dBaiS zLB?owr3e3L(w$7LUO7|{;0lD7oy%Nm^X{QjQII641@fW_51?Aju%D$ z0q@qH`E#BhuuwF|&g$Q5znPq5XC=f@zI2i*JAh}LgWoSHd&|b7I>7h(Kr9T=k~CJp zN}(z{A>gM|)v8?9IJkq>Tc>5cQgy^_Egd{vE`Q{<*CcJO zF^`Sz0?kJUExiOS&e0M$m(O0Ug8QhBo4goSvuNkDBzVbQ8Mwh(DU>sPF{-F(o-XU+ zC1t6os->mGO~&$>=|HVP0b=7o`oMnDmZj4E!lLlE5KEh>(P)Kp-^Qqeb5pO9*!oh+ zGJ4R>*b`K!=#_1KGxd^ue0_g!@U*m(b)*x;(ynPrloW;AY=>Xa19m zN~=rB1lg%c2XRKHz6MsiV)dQ>EU^kr%e=MntBSp-g;zu?R(*;S!CFMxQJvD-d?V%( zuS|7a(K-R~#s~on5l+J#X^d(>ABqH|Y7<_J4g|Z2puHTHCPc)ZKbKN36q~e(dauQO zmrk1QB`KG3S9myHlp=qU?dQ8t6H63c&*)PgQrimLDc@56iemTFHv$1#5z?W#^~+fS?7u1by*z38n)@UtBK9*3HB ziT53k{VE)$7srlz3r1hX$4!>jsJ#_RA7l%FN8yN7_vCpxWm%rKoEG0UV%|c;s-a+w z5Vz9QrW~Vz`1rVe{u>p%bg6gOxJ?0%%~q`w08GR2xT1Al@d(JZ!uGBdJ72ZW`Q}rDTs`ev-q62rGd^7wVLp^R?q0cVj!vPB?BbrM!tmq>Ce2dGQV6%K(^df=gd0R+P4G) zjpl>7KzTGIN@)?-)z4YkY^Ejk&yHvH z45^gBDj2$_hkZ>y0il!zQlwL?2rs76UQ2II{!n9QU*bE{+ML!QKge>a3oUo@kDy5- zuG9%Bujf(y5~NipL=Q}U3zq9ZU_T%Mo}aj=KiKuCFX4LI($Cs>ZWJqD{hCc)qCehr zqV%tATmH&=pp{Sk1e586Z80I157%i=7dW+A>n7@NMf&>3dMz?vS!ruw|V;uWcX39B!2sJEVQPq9%uW(iQobbx7c!z*p@?^V`xY*{~ zjySqovwi(s?-EpRDtxqb&t!l?m{`vn*Ocn)TrXtJ14Y2RW3amAMt+L5Qtk%ffs|=7 zWw23}TkZuSBz4B+=4hf3Ybhtg&y2)#byc*;w9mURBfk}&NSkZ zf6l$fGoqPShiOIIHYiz{zBu_+M7jcjn!Kd^iKg4&@(-s5Uc}+lx(hESC?t!!RjxZo zU+LtyRejC&WQ9YS{xSL0SfL_@kGumYnd8_-obQF4tr|^I0;W=?DUz&+AUV^O{JW`r zddRO_OtDp=8ckFJhE=8^m4stE`+MHGr`ZrmDzJ|_O7|0s<&F-PEDLLl4bHx(Vo&b$ zp+YQ-KC4DK@7J&7sIhvGJ_|A!(9mCkm?*7@87ipQ)Fb}QZQWVLU?De475<_aJd2c4 zkfR#nwu#Rb2EkU^wSlrW9y^P)B+Ro&xK{A1Swx(6^LLzRz5AwPWPU*D%l9SW&eYsD zY2V2NBy?ikkBlzUN%FHzGjdJ)HCeG11B3?{<8p*iMU)t|jT<93>N7wuV3jOCqjoc( zY{NqlYAL8L^=OXPl|GoUnEg!aL%C~HO?HBVT1!-W68U>!O>VDY9dRD}?T>RE0-sd) z>yZ5g1h>r~L!|Nakl`lSBHpca9=R5)lbu{^@-m1h4^|{8Hh(-+JFb{vSIE@{s;OyS zzn!FGyhB+^n(bg=toOC2`P=dnoiA#pIMr^)&6U~=-y8Nyy0tH*r#)%QVHstD+;}Ib znu=mVx!hdOU3DPFD%I%;_QnpY657A2B;8#Bxm0_kKJ3hQOfg3Nd)KN#0`b4-A*{-BLyhEB+Y*5E47$fAeM?|^MeN{np(_L zfrq78$HX zf4JZY87x(uK~)>0mMkTnDZQ4{Wd?bzT$BoB%v4Ou@^;P&U|VOGWu3geMi*1y2PQ>* zH&dW^6KE51ax=J`elTQhv`&|N09-|;p+`PYqNW_JX6P@dSY>fR1NW#;K5$C|$Dl5i zkY?r1{;OV@*1D#u<>1h;q}ud1t?Kv2LM_ZYZcS?xS(zERf4r|>4hpMVCeOcj9k9wW z)nf!UBjhMidt(O*R#17@)H!$D$%wb{!H-+4H3hV6e|dx+#Fzad}ELRsOrTJq5pkTN^bgUE!3gUm8smrJ^!Oi#>Lb&Y3_Fv zqO`r;$y4bvsKxfuRoUZ{nx)v%+D-dKQn~T=WuDnGeCETq@sj)!zt7Xn19Kp6ecwO8 ziVMslI`QN4g`Xd}qsIv8*CnT1R^}SU<1DHAFhu6e%Up7?xsL!PkR8EtJ_1DF8jW)uX_~V7jP1VzHo&0=PIOW8>B?$}H9@ynN zv&xL6QpV%sdm*I7?NLqN=9hwhhdZGOSSL?e0u1Aa9QS7&L~W*BErwtA#4y%85#=Z5 zZ!AJ|)7UyCZ76pckU|*^JnwG&z3RI@U$>)U{F^gBzYP$7-hKEGQ0&p&U!;p^q(Gy`Z#M}bC5lg5y7xG1Z zyTtqs_|S81qUu-=a~---uXVe4_SzA3~1Q-JPB<-Mq7fCiAb{PBGv3 z3!W*H$bYtx{nQa@x$cReTPgTR^!fhIM6!b_HcHOiEWi>dKW^WEhMHRI#i~Wt4BP?V z+@Xz;aNlkdRv&|t7VcTxxfK|ueGfs~*gO2rnrpRRZV#SaAKxi0Es-Akg)zl5O^W)`ARSq`tCme{xe#A)ee106T z!vLGZ9R>|Ohg3Xr8R@@#Bg^P#)|j~}Wn!uF?-Hr5Sr!^!wdwEK}#`VV}V;XS4&THL>UfRBiym$}+A zr?P1i9Hq--MN~bsESZI7jHzR(RDU!0M}fRgG?{UIbLxs#1gOj-|9{DQnY%tR%b|CF z#=LOnx~u47m}05%)Wh?ycVY7L3LERJ)IZnlBZK>U=rz;7w!s%+f)P6?cH%b>cj{%1 zOwlGM6ZlF`$YMo!YS?O|wy`$csLbEgr*7XV@v=3Qx8BQkeT(Tt8ul7?G9N(yvhtcB zazj?H3v(vkX$%rsg2^WfUefawI>OB_6p~gZp(c(h-Cz?#>BgUG=#}VDOyzGS;|@h%hl(;F(6cQyv#UMg#l>ObUs0 zGeu^23qq^LM$Llv$#S9{UXh0q)Z=7@q>z}Nio}R14w2+N(aX##9pU1j*Wb;M z-@}}urT@wqGk?FF$AuF*E(^|h3qNXyy9%+qgp+%nv`kEBW?U~y?t&FO#6Hoe-7QT@gJ_^1-nBHU|0@9>sB<-=&0 zST-*M9j0g(Oojjb+Xp;ff&5#Dq@;L?G2_N}8@?2d{`l;_rwW~a2pJw~MFUuETNI~- zdgvsbxlcu#Y4kA7Vam>)f2tT_zDzZx!XG3b2s3}SIfzO7Qar`XusA>MoR&lParn8Q zqDps{%c5cY&izn%`4`cxy;Mugo}MCH7}F1<4-5;35;ypDG^)hZS?Ry_*i*GOsL2X%){ zB-x1=E!o}N8jvQGwUrA`IH$OH8a$e zzJK1O4~&y^vxOO5R@D(s>}mM_vb*Ys4HQ1x>+kQgCOhsc9TWrw$;eWT{qnsH-^}o? zD-d?~f&_*2y5$>--nnRJG-U|xzVip6FO20m=5Z}NZ5AWWTR(K@x&tew&m|}yinlmj zCIVaq>CAny-Z7lOv48_v1&vL$mXag3^Qcp#`9FB$vbzjtiX)U2owaaD=v3bPZV}c; z5iW3uhY~5yP4#5${iZz7$?e0^ihBa{;uFG1CePdl{13X`1fKmj%0&C|Y4>C8829OY zXWaPmk+C`KSB}$`Rg6y4t_N}qr`8WNm{GOeli$kd`=(5H+8)^_ZQv_SzO>4RH=W;P z{?2f;T&Z`7H2;=n?;0}Om_Y&Lf81C%G4eQUCwo}J#4(T2l|FRi;rT`}Rlf&E_i(ps zZ8%N_=}IpZG6WYXe+pOU%aNPNhso3A{0m+u8|aTK(Y}LTOKid+Chx$in>%%Qd4~$o z?oPOo_P!79JLnEruPIvn3^ys4H2usgED!#?`cDWj^t0>JJ1L+2_00l=<|h6xBfTO8 zV^|QFq!hD>0&v8m?Hb|(X6b8i$uix2d7K@ga9jwd#@my}B7b6yBiWLHSF)Bi^9c7n z0E<1HJ6B@g3 zqO+>;IWb3(ip-cTF|SCCydeQ>jhVCDQ`ROfDo=TAa?HY55CPJ`YJ_|9T35k7H={R2zn! zY9?RFe32Vdc;sDN*q1D-QDzZ} zCzgb7$M`TniT+Ef-kegU7NFZe&#+=gE^!%TPdQjb`fFhMVz1-KkJ5d-NiF+_srA?C zOe6cG#olyR%)7IJvVf4etD%>GU3HqTV8f z!vW;M^e4CGtEQFQ>Dhe#qJ&%2Ml#Dg=oS}jZrwT|Uj5nCK?*>}fOQ?y>8JLr3gZ%( z-O{gJbF6$@XrlxliFW`LDfbln2v5g$q>F9z?IFC_08oy`nn!pOn%-yoe z4B%jC6DP{JuR+~j&)N;9ZcW0|LRi~oBT)RBrUgeSz$#kRXE3Qj#O-3#5D(Tjw zkxsQs@6t?Xn5=+YyO}1?CRqkmaV1%oC+{eaZL(-d;UOqey*f!Tv81+snKHns1}N@${T5R>UEzN&!k9if6XW= z!8|&mq_><9VJEhw)I`Z4S2edCudK9@l{jP~8Qvvq2m zrYOtnj_d$mpEA zx_HDM#YAWe%#`M-xg452l@fd$?Uk&$G9Q`!zR(3ow@sp^k1mO%?H*l%#%^VG5NqMI zV_n06HhOYtPS{#i`d{g05>uRa*0}1t>}Y9NA1sq2^(=DKrAzX3S}^%zpM_r}yuoz7 zO~ZcOY@eqzrL`JZ<_d9mI5l)pRqRKpdUFMsiBe;i(>VzV+^i&e!#QGpoLj#&E>G!U zZx5&ZOl-Lrt<@On+git@Q`^z&tUpg0BRs7cy=gy~hQ@oX8DkfHm}#56n`qC1*KDIF zMh3Mwo;S=)L7m^1XwYTNFj@~9J+P~T2s?BcW5siI31Ulud-4oVoU}dq=%_wyeUGZt=>QnI~QY-0iJv%%qmTH~u`;wPj!FSJFN_%-iht7pkxsjmH zO1}}MIo(7Zi8p1Y&Apx&e#LkIi#~RhN6WK*xjTP#H9sn~H-8e8riLl3yz3w!pn#)- z$`E=o6pb#`?dN*y)!bI!!=Fa~ zDFr_;M_Z&j3S{}oJL6ZHWCJd6{8utd&QEVb!rUVX6#&JF;nrB2#?Pp^p^aJ?ZY(mnnQM5W49Kn%ncd z`2%L|mgcKtS?AcPJzE|UxkO%v7;hewj#O3w(5!Bn0Wx4!pR&LnMOxE_VmHYe4`n)% zDl7jm`pd*bFF#PA+vBhApZ(hdGzoH8$9*F zDhHP8rAO-hoDms+mN`^zEIqGVMCb04&&A;4<*S3cw@kkaOV*Y_qV;gBl9Eg35|pk7bqQTpfnJ^ zcbkR@L_QxCFa7>Hy3!ipAI(gT5#10R93cPixPKSD2O5HbO!K#s-bgpff{d81cxduR zibQ+8Lx3E>l_b2_aP)i@8Oo?hSpsmSg&cNQ!k^)q7J?nUWB6MQFqpFHhQm*m`I>AZ zBqKa%#EzP!EA9-$U~DkLz_pd5th*ZMdG#hCcr$!Dwg9Ej!U!s{5YO?@_vRqw-NOPf zv~t$c)Yk*K9gre%<=Or+X^!!^m--C zFB`(UKhM#rkNXP+@o)@;0RfTe0a;A)G4KaL2|8$ug&V#8qq;ollPfEDFRUZXJ$1F* zFvNEcJqglO8baMQ(-s|mHt=X$dF^De#wV|6%#uY346a4r0;mk&KxC}D!9TPUjZr3! z3U7%GL9P?VGlwb-n7aD}v=^%dhSuFsZGpduCcxaWe3>E#i#*F;>dSIUx5wmoWagKe znh-iB>E$-?U$}$;blyXSw_`IZb@Yb*JMlSI!|0hG)WblXyD4NcgMOA^Cn$u~{!LbF$vY_; zC`>c~I|GHvFldQ+a3iA5C?$^XNTCP4hNg_+Mp^Trw^IEuRN)l=!T_yqJ(d%Ze4n(> z7k@-@6G`Q(G);Hw*a#(%xcR2$~_&=XtL_04Z6;+0)IS^1jdKpuJ- zZ2=2g9(iS~IE8BG-+XcGC^cISKncTLh3 z>Z8d_&Mv{PX(yXwy$fo@?~G9?uxgD@`)06RI&Jc=x@Zo=e7mo94~wF7*p;`DoKkDL z_R3;bD<0Yww@65z{ds-0c2f3@qsjQ`V@S4=>%QtH>kt!l ze)n7Gr8gpucRIzzg7*lQ`E1h)$!zNi3Df-=V<#l93$S3wu4D-GfpImf)+hQqG)0%K zXWW&;*LC_0IS39o(q6DvxNJT+%RU|Q!OU~%I}lVbgXH_TE(9%N|3T8j*2k16K{Fv- z^jBo`{-lmk-D4#ALL>fT)`YlEy;J)MG|Vn@$XAIatUFeT?v&Gd;`|!yA*gh={@nt% z4Lu?8qa}+V1GX_?(=Xj@kAh`aY#ez8`Ds=A;uK?()((Du`rXrA2H9X=!XyKK`0U%N zFs1HgzV$gM9#IT_up=f2{5rI?P+4!z@gpuejO|vFa~ck=18y=fA+&itHRt0?PNSIk z8KjXaa>CqDc&J^5KFJoPQl?zpvjx9F`aFnHmpgJqucv7gVk?<0`>m)nd*;y3}t^kkrw6(Ucw?J2K zUSDv|oAuXArHM3|RsQK+sP}7;*E?i^pGIG^|5KeJZ3x9+yh3W|<$J;Y=171+^l~;^ zgyN=ahkc896-kJ;W`F(dHBWp_F%kG zGBlXUcg*_liU6QMKr_26l5gR2-vf=`nw(&wTf*-7OxWHL_P}`NwoXdY2Go5(j~VXg zGATdHWGHJRFf5cgnZ$;MR8!$BM@35neG;(UaP-n(p4hjP_!qXs zLs;|yFGoL{|Kob+;I6E0D>tuC=*=9^6>guGXL0o?pR14Y6ReE7;r>Ub+xPSR`K7BY zoDhUhsMqW7>G^s(!dRB%bMv}AvR-yIbJ;7kEUmascIS*s5b5xvxT(SSLQ$X_y$2S? zW?wLbi~u6wd!sZB0YFLzd1aO^(*KnymlI*CS+EKQU=cOSmJg}* z^Zu&*Lr(m+tbxO&HQtA_CeKqdb_M+Z`NSHF)yo=tmxQYM!@f6PN$cvVI<9(K@Dgq{ z$l&3$CU<`NlscHvpNTcN;3W!C&T_vi&N8%3XkP?U9m#+AOU)?*>d*Yi@PJrfDnZ5% zKf(yglyb&xsS4|@vEj(C0z?EQ48|Oeg}6ph{)oBzee&7IjL(q=GiLH8JbO3#r3z%Q zu11xO#N&;Iz%Y|6)T984GY$2GVnN(BXm$9@cAgru$%zw)BhlPc>}XwL z19RcAGmNaz!2qsxGTG@P0=tPS%*?&X;hQ?{zP7aKZX zjZHW>I7SXLn+$ACRHkU_(<>U)Zbm1fzO0jSoZIoY)?vdC35iAUi%mYX6j-EtQ@e&o zx~F^m@8(I5LQi@#KK1MeBhIcp!gSlf3p?jlFFd0^Z4*bxHr5o#;1Rm%$v2~i_&eY~ zBu9GB)!%c(K+gXn2hM%X&FmvanA3X(&JoS7cv!qeIO7K95mFDc+E{(Vz&{d=>qUa` zan5Jm!#u+B@q$-z|0A-OrHNzs;D1YJ1sFU-4{>1iUd>!1&T&C&vj8&%0%|nnJNd}m z82rPAr-w!w4MA9kv4)`MOs3NWpy&S>Y8b8Qe_MR-?<|fD%KtKc=&UEc)$W~NtN(44 zSL26>9OKX|Ea@5cpecmNoN#NCU=*B~*#Ort9+UsZ|62<>ME?)o^AG+AG@QaCVQap+~m3%!xZgcjh zcQtNlt%1=OBFFf7cwM}&P$AL7(aJ=m*9ng;dpYWm!sm+L42ZXf5H z+$}z?BVtu_jrN)LUK>hY^`iB)!WPJRrW|!7>)>$i`NjEm^{@Stz7nqUn19UTEcU~j zUR0A{`P_7b#mcD~3!)X6b8e;NC^;KTc|+c%j&*n#GJb#qw16Xtd)}dXelRiC`qE`3 zcAzM}-xFM(Dj`9ZHl^22haP@Z6jv&;q~9XKpyY6kwTBej=nS-fNLE@J>9Q5r;Rvpn zX#X1BD^dKay}d$tC|GOtmj6ZOXHOB5AVFp39P_DQpatUjFl1}#NmpDc@c=t1>QDpo zXk(b1S_~>*CUrI4fmA~%xrNy+u=ZNhcngy=uZ{tD zYhDQ34y6D0%Uy*$AB_4Fq{~>^%9eAKMfL)dpC# z4w4)GJG9J+A?70F96x4%<-yHKwep zbfk*?qbd9=dAShXf?dZP@=LzoS@k#5I;3Ea{POvnd(0K&NCz?D_~Jmi?}&h14I(NL zSXBd9meY-P7R|Zt$SaN0zgu<|h0RP4=AyiqgrnbvTKP&{FHB#ED{Ps{ZzZ#~=q7Mw zG0FO$^iGnQ8x$;q#?hFnqxyuD)MxSbs%bS=k>QoZ?CP_E{71=;5+qmyD`68NTpX1Q ze-F~b5j~*i^Z%6L0H*XF_2$!;5CjPEF;OA!6JJ}7 zf-mU1KE!Q%5s8WE>q}yN*1>C}#W!KZGCpxzSSk>`mKq__2F*)kGDZuaWfe;KL%x+~ zYb5-m$Tp)Rr9?n@*BUQsti09j;ovNs7mk$wdI+`)%5^NpBRM01=>7s2l>{&{h!>M) zW;}uZ74QQX+M+1%>gBjQi%x}NyH&XBRFtMpcqVNJ7(1YQv)}!7t7TX^Rj}(#Jt~)@ z52ur40t;W-(x6ed?Yb1ZmTD9nT8xl<2|vy?H|n^X4;#ZfihGJpX_o@n7rHkbJsNKd~tp6^!YH-HTh%@;@j$bvrTFFPwgp4p4l)R!54s6s5;WX&=$NQRr z-~MX^^9WYD9_ygFLE}@`d)9Gfgp@AZt?P;2mx(LvlAYPA zX*h|u-@w54W;Z1_%xn~fyO=MJDll#U|H`VoVOizfU7G7K`o zB&Gp@HHc_2GNwVu1>agQOmV?PqzU}EHLurc$S7-Mvy*X^6J&-E(94f!|Xvb4jNoRgDJH>IwQ zRoZD{_mi?`OSJs-R!(0>yDGoMv5uGblU$>E5Mn+~(58dEvR~6F_YSDoN83Uj?#9TS zk6l~hxkYe69xN4d35)9|GCQSV`Ql36B^+b2SwU@0EUs1EmsdTgvKVLdC4!jxbxrFm z(n}ZteXUfUb^RCmQY!?6MxqPi*{jA-BSi*~BvlwTpp=d%Ce{qY9gL$utAYy4@3k2XNl`0OCZo>fF%8cAqHv-*BVU;VTg#r z7LZGgvbOL&J4lsasMvZ(`}RK*FpBF0i*7to8=EX$`R^Ef2GBHw`CtYmc`p6K&Lm&O zxL#0V62>~jLG|H>jl@k$VfH{0Vrq2@Ij#OKn1NpN;&wK)rl zJDduEI6DVP4YBGBG3%%vxB_(cMslT@Hj8V;xuX@i)(4EE{(j^L3FFM&ws&Md!!yi! z%EYfG^%6=|3^Mk^RSbRu;?*tmQL6#>UiIPuFw)anTe4H%^&VJc40SSY_Vwe=j1uKP zvf|Bn4Qmkrenx^F$Je$B3mmVi^Fv)?d6_ErZYmH2r>9y+l6*=R9!L}`uB4jF=%%LM zMW94^r|^7n!Hr6#)EM}_h3Mcf#NpcRw(Kc?S%FWw1!a^h*oSupFq%VHQ z0BMk`m7f7aq9n+WA~EUDK&38MY#G&pEt8pa^!obv4H>ARceTd5M7zON zkt6}c%4a_+TAC|yNLu{X6SZ^!tedoeuwYVS2a{$e6V|8nfefW31NC2Ui?K{n847vc zW#LER|EjIH{FXgo*{vE!@s-q_%lH<*jX-;shZP1*dzU*GzJU@v9&U%ihgRO+2;=m# z^YZ`fEfj5*9RV2myZ>!N@3+%FyxUQF)q}kIP{8-QyPG3-Pif&2_FMYBJe<9=ps{0z ztC8_ZjxHEX$|na>pPa8}7v`p-2C*<&p(EAwT@@MX3uk-M?ks#|)tCeSYNR%{ZCW(X zK!TZeKX+SPN!H~Lkm-R<;Ba+Yl6+V7-^?a166$Sd#JChPpDf%l-ABwg;_J5G(^Y(Y zRRkv+ib!jY%Cl7LKsT-sZ}+bu)wTy{l&GILycuL7Lg}1y`qzJcet=D1MF(1A)i~7? zD=d>3tQ9#-;enlG6+ntttc*r#YW13kbpw!AVlnE?Xou5q)4A9O2NX;m9jfTRi>Y43 zD?c8$B+`hEo8zY^o*LC6Bv3P9l0F(+Y5tVd)l7_euU5vi2G`Ii-?yqoa3m})rRfo^ z1r^My_QV&=F52aW(z{*hExC3GOitJ{WyaK5uwrM$mcGuqp8-bKJPg@>Ze3dlOQTr1 zlHiIjOjtniF8+kC~DlOLd$l)Og@$^7on$3cWcP@8hX{(-zq03eLG33eWw(V@ znZWwAqAJ0T*j4z69y3NDlXu-~A%(n)h^)BYy|i2&u(gCH0ISqQ8(I~P-LzbD7|R-3 ziA`!=Hb1~Mw>GxJKOBvDpB%0RZyw}8a``g??NN%imB@yl&_qte|8ThJUNSS?R^{fC zq#*BVzih4H5+Rz)@paDrLf+w4iydf}px8ro)*7$WhQRF{B=?9@Je{5|cpqy+CM_s` z-m>f~V=Uhh+QVCXza}XveHJ@hstfaX*;OX=SEK5$*8J~uf)T>|4YeBVi7qCPh$mh> zEUvgy>okp=LlZVsZo!so_|Iv;Xh#oP;gHms8T*L?>l=OF)#ISEQo13gOM?sG>KKl= zeV>E$=87n;IA)zg;P#pG_s@p+#*`rozDyy6zhi|uIFk5OZwTZT*OHKmT5=RFTSe4q z#h+{l;-EXIA4L}~kQPEW4}rOd-`YZKB(L>Xmv8kIv-VM%ui*H`S^ zcvO!;t49=6(O^-+U;1+sgUBd`bQd?9uuU`-PD4{m&{8CgMQ~&==IIe3;4+e+Rf|bR zmWhKJDJB~!jAhuz*r8lDgqD19g5nvG{1L9<}49bbsQqWBd)s!MFh2+S;v&xMp zBv43|hCqt1AH%yVxo?>?q9}(>@L)%?J_@_`|5c0P6K}2j9M&T=LwXzOUXrnY(Y1S(5`7(IWx|zd-C?*7kE9 z9M%f1&c5PlN{+Sed?ynfLQOWEWco25h~x?zU}#k;`cu&5TddqF6GBrOZ9V;+{f-0k zHZjB)@Rg>=yc(H0`hi#~3xG&{vj&QcDjs0xR8CBI;!{bSb>mTGE(7*wK#+M}bewq= zzOmm(dKFdFl>~pF-M?SwyuUwRUz~*B{Vs!98y{a-C_BECd)I=y?2^(0JAu!Q^gDb4 zbM++&8}e=BU|^6_na9=LpNX6YAq*(d#15U-<0#i-9O;Nko(?M>eITVCM&l7>>E zvihQe@e!pnyt>tz{8>CsQu-vPe0qltK6#zfq|mwtDdQMXyRIfa@MnJ@u~d@HaVD`g zdtj@Prbb|AVILV-=?9)Fpfm+Bop0S_ea{Njsm1!Mb7g3SNn?5$%W3)(PW z+s zqobE**fa6D{BT#Q!%FoV@81RE5w-8!{0WzH22!u1595$5c2RAFaxQ&yEq5bqUskAQ z=t$!SB2O{}YpyDd$MKf#BpFufjBmw4OD~GJCqewXpnpH{0{)TJW0D^ab`;0Cla$fs zLM?a|B+rOGb!Mc7XQKI6b#~_;tIP?ki_6<^mwA@1+_t(TCEg!bFrY(mp3bjD;m!ga-kXAgDt;Z#m){p9mw zW$RQfar@*)LZ2|Wb4}?eRNU|H0;EU~^a`@d0p?W9Sz(6n4sr;b=G0%gKd^R0(=;^g zMTyez%`{4q7}~NCuKCmg7?o`5e87K0bnNOTgI@x-2dd19F;^iKnt8wKG|qHp*f(%T zz$N6(91OZA{&%Ux#HTe=3WTFTqa1RLd_*cus$hV7v?CrDE`~lD(HWuBDGS@}-rb7% zOgZ?u`g&?%xQu1_k!FNLK-DB|1tO1iqSZPbs8w|JFwg2E%;huYDVLxDmi%o^4M_C@ z?rS(kmG)b^j#iS_OX@2JZ9C<6>_s*0EV6!u+9|36-{~A?Gxf>jtWR+RwmYfKJ5R~O zBEm3Qp#2tsH#CLck2wi{$4ZIw#l2<6!_9hfa^laPzqJ}^-16ONNr_jpD)@>EMimPq zYkV#5nOeTP?6{TEbO_qK+v*tUvBNV8Y}CFb@WvT2>w?%<IY{ z9Pk_ppRqBZ3m6KAoKDrASR?tFf&X?f!FHYFb%5{CysPULg&K+=+t$Vn(i58QB)bm0 z*Wz1NHzEz<6?nfq-M!t$ds5IcBq;^b&K!-51Q1^v()I@MjIc}^GQclqdJRb*A6~ukyZ~=mS66Nkc=!j+Pf1UB+HqB|-8j#tJlB{;S4+7FtM*2`DxH^nZ`;xs|Nh zba&UwPHm!EuZH{mxr6lkeSg`)QFk%R2!yB(b!e}7A%>IxeHfJdEuXY$@ca#FerW{w zaPTrTq`dd5d2&+ZwCmmCA&rLxJy&irr<82HOQhqa)cU`37~Y?YcyzDn>Gy$hJg1HB zq+C+EQE;=eGWwiRpbv9^%Ef<7iOWXEyluL_^X^g|)?GM}RHd*eCFHA6NUEx2WC3DY z`aWTRTz*3dgM|!?Njc01k5gZ&{^A|}>9Zks`Pis~cIhFjC(X2N%WF7==N&BZM1d_V zt#>6=K~EU5jW=@%%&szcPnyrBj6+j+=zh9PBZ=!I&~zz)-*|$4QX&}rARtncSf4a}N+5F`Mqdga2-pQyoR^Bb z4wLikCJ1(^n^TcqZ5-D&Y`c$&2HI%vAg8A7k0s7Va&M+MAv;3jOaK(;4kAuI`4|S|xvC5e zdH(E`&_oPvJn|PkzXH@A(N;NJ0qR9y(=2dndl1z!Ed{I8)-nc(?KIf2;V=V?>Md zya2;Xu&Dbe>bRw*SVK%?`B^=9=VRGa&F$&iY>%2sLEO5-O{k6lOwL&iUBJbiLi8P6 zUHL^f(*TXARtR9S1^1^fDQz7m9et9$7%R8E0>XC~d^pi0wn6qOgisY)_CdI5j|xZv zF~wh~mG}a_SZ2tR{%N-YTJBz0_RuRQ1kAv4#>_6kbE08kfzCxgAT#rZf6L;>UPi?I z2C0yrA46`3;G+6Nj!l{uy7|KYH7wiwgk?4V1D2U=e8MtsEySBoSSI`*Sk?oc2pmmW zIav7%+`tgz(9#P6j8w5w>IT`4>ZK>*o?Nh$U*b0wE<#w!M0GXI`xfM|iibCqei?82 z+@i?@0ii_&=xY<6uc?rwY5G}&0hMPHGc=>4N|k43ud6Rp?GCRQ6e9JL9`Pv6Hez|y zk2{Pnm8oEare+JDh#!W#7TeeqQ6EMp9izgQkkk%$rY8S80#lw|YHO^yzL&}!o^@EP zUthL{FvQAzPm=|N-Y2amU54FjK1SrwD#-OullhYcbOnqE%SantsK`b;1iSO^g6;oI z;z{xU;3BHfrM1&SGrj@n)w>Q)c~Cd|EEnQ)72)|?~o zQ#gM}e#r6)W^7$Dpdqb2Rh3ycr1-?nl1cOMQdJa0T3oeRE7tOmH~dv;qB_1oLM3H* zeuWxsGBk<**71$s6wV*pqduk!r-Q+0wD^C3x;x)}PA%8@=l!Qd`Htg*l)rgpoytz1 zT<-oqT+Z42lgq)zWvSa^@M0a?E^u-pDan&DBU)(ld3D5=SZ4+9(x$G=o2c) zT*im`^;MCL$ux6x5eli+0x(nKm~N&I8&&kTZF$+P1Sb+Ee@8O(M`c2-`H5yBeq?8r zgfbbW-&3}K%x8XTqHi>BXrL;~nkW#4t2?>Tm${iG{^g!hFyQX^a~)zQ$277_tmyEk#|_8q??klPp!t;}|Pj zjf%u*ZeHiO&fbyQ+39D@ir>YSAwNVQyYS=4;-1b8a7Et-cEr``6=s zZa~|Jln9#t>x4A(A@ZS?&ukQzn;@2d0gO=a{}nih3%pv5}uE4 zluoAzJyCrq%cJD&7G)KQP-1oD4m3#!ikKppe65h&{-L^5{p6`F?w5xaF}ms+VkySk zR=PxKPq|T-U*_hpkk{Idb=$M2KsKux)L@}`{(sr4rGdSxqCsM3zEwYp8S#1)#Bh?T zQ2gyd!xiE0Q;Z|2g;^IX$ch_=(Ilk1I&I9e5-9Ac+%vZ9%WImoREt5Te@GGJW0Km2 zcQ=*U(`L(e5320f&$X<`21Di*NnL%DX_vord+MEKVnzrMDcCt=>7eo;DpA(Cw`Qao z5@3XPijZVbMjA^>FoIw1HxS}eU`a4d; zldN9l7{(zDWLO8)(O#t4k7IdxDPp}uv!!>5mMd`q1VqKjEeeQ41b0k=0$J8r?%FPo`Q5)0Kv*^_RCMea-Bo(~?K*pl41I zmbkN%c-cR27$eGQYy1vK3!3IHJUJ(3nMmnURPKkGQLLtJ(>z|26JOl&uE#8ESv<1o zc1O{j@z*Tdc`>3sVgT@d!esm(&uJ_$U}Hm<=(@(aic>sD-7NStN4lwyd!#lY~H`EX!r z^EyaNlrE0&VAY0#=g}PU2PQ_;ibu~b+mP8(MoC*Ss~w^;a^a!%t;eyd+ZTO*@vM?p zY--Z(qX1Jkz0HhX%U}9qXjOj(nbAsEDd&Z8!qS0EAW9C8TBkE$2-pJXKp1V4-5MqToxAk*~Hoc8EXfkda*SE#ynWFqGxMYj`3y4zerqc zRjYGK?Li|NM2n5CymE5tMYy)-J;;IyBCyE?e}`nSU!~0Vh^MK^P2i(}Po( zl6&-;RLU;oxu|4}SeVLMd8S1R8mwW8+$c*_bXO2$Gx(cY54_IX4eysGouDmA*L*Zd zj*iQ^?`OUe;+*p*IM{ttu5~~JpdL1eS z*p4^=1AkLVc^!kie8)*N7hA5$BwDtefei_<7?|l};U$fLVFPm174M?YcpP%w-lNYm zaV9e-k{;7)5sO?SPe-`9z3P=_t~5{IgW*sYaLSjH7Q_V|*%;w$fuo^c@h6NNx zOdx&ej;_mevOk^w5ZIg&?;qK8nG(Z9E~ok~z7>P+_Nv@e0Y0R*bPK@F;zqM-o65xl z+MX|BL%8IkaGatRsB@C-+Sl3$38wgZ(Q?-XZw#vB33^&d*k`(taJx+@)_MG{#!|Yx zbHwWL*}D-kDc&vp-Ax*wWnwr`xUZ@uk<~4+*@^wS#<>6VoFD7hC~Eq(u?kUX2%-{w zy6xf}bR9TWwM2X&^1_BgRnlVi{8eB0!UEkp;?1yh!33U2R;bMbwT8Rj_Cq$G7O2`i zHPM3dzC&ZHM>PG>HFB61P0^JBLCr?lF3im4{yW3CP*>FeBs~uy1E!pga`b%R>Myt& zliS`?K~B?2ze2tJ4HlW>p^2o!-`qGn0a$#bifJ<(qs2+4Eg=rI6*#_8!3Cp#$H!5z zifwd?Z})!AM*ieQEun_1J>sALu(%k{Tp3Ip+0=i6;nKdIsgbF%frA9T%8SUdgBv$WygVLlDMF6}I=fcYM8yM^vPA ze~ABjr5yUlJ1HPGal5>&usv?>r}Gl~_7iH)5{z;-?3l3)e;7X}>K~7z1%`naZA-%O z$D)*|$;y~VH4t}^ZQroJtNYctN=RG*D6W9J4Dh8!JGdYn*{+|K8{#>F775^F!yox1 z>c*&4rOJ6JYjMupxkEql>(o((ZS?huwTC=XRw*eR`c+ayp-z=vr2hv5FlZV*-y}2k zss;VDQ@js^^!IoVuXRm5O0B@aBB#_EkaJO%Us8o?C03kQc{poyVE&JS}Tw4Y@a~LiNb^C+fg){i8*CE|pm=wclTUr*=`MG$ukGx^rlIr=n zMn2TulZR!!Fh&b?p-Y5dyvB)wGrussiJ!=-4K=^DYoGDwQ8^Ftp{AH3nCgiK)K5j$ z)tdpV4`U!xghk6M^3MW^_(WVe|AnTGpmm9p=6#7S?&==Y#i!=Ub}7;CTX$QIuy2gv28>OgG15>yQt)At zv;Bfi8xhgV(A4Gl>M7O~0!Ce#3s6QyHTPxUCb6bm@FZSSFOxb%$DW`Ex$8jy6gvq3q24*NEd)J;X){$ZZf_L6Ap%?RFvy zzC~wYb~vejd*9w$N{fHKv6?g@(Wk{D6X^iQZ;Wp4DdlbirF|>f%x~X)JCc9fJGr@8xbV0+d|MieuMT>> z+8$d$AGEuv&nGcl|DQj6-R^G@oHjIizdV9}yZOwsgG7$!$HwAWHad6$y>ABmgZ+VH zbf4#b`b@iBReA>cKleRtl^1$B31@c(JvBBF|Jm~fv1`Fny<*_va=dr)~)xPuNauG2#0dB z8d=t@3;dJ%%`s=q22y~@_z&!9LvS{3jRJByBa;_Hj}q)7NjZe;-l5>kGCh=lr12kw zQ|ypzikh~6tEJEa9-CfeXcCZeI1a}DT$b5!0QHrhMHOO0OrnWTsDnO>MV@TWiWC?0 z9zk@ckT+pC4X@RX(ZOKSS~Gx90b{IwKoVxjWky#;9!}IM+}6QpN9-tQuC-FvwF<=9 zF>#~IZ9>v#)Zlf}XO7io8kLVyE5@nd{o8`NvsUf(>VcnI1wVJ)Wws$UuE~*Qi4!(U z&6Ec)tKjNXcN|vIJL!YkV>fmUxz#t;Nu012aI;TrXER?Qly>y6+(m#a5wx|r3NnJv z@K$JGKw_@t=DyM%V-V|SqO*utrjBz&B@VVM=(lxP?z3#x4)1|1r0nJGHi3pm`Ihhk zk))H-f(9&zyW_%UownPW@ANq$YdyqHKWkmW!SPUPImC{+oP1*_*|Y5H0zqF zY)m6XPXTO36Ya>qfL+jBTr?p6)$*jE|aU3PH?IN1wy?G%XhVNd65Sn}I}(053({<#{LzBD!M z)QKF%1!;ksl3ITDKB76oeN#^`-n&>+O@a3~d83UCSL8zw8yM<(%hwF5g8V}>=i5`B z#VaX7^qQNipq9L~#YNl#&5Munh*x<-Y=iiZe@^Z%2@Z2bDRUFrb;Hksdn}pi(igJMm=GTu&XU{+&Jg5sbf35>bOxoL!xW=ZTjZhQ!L>KA<#v3&3pYl)2(83rv{l)Ljdbm+bN~=yz z_C0yG0~szBFdgyBQf*+oP;eCBNy1%p7ckky+ z;MgA8fQmA?n*c-KL6ExL?QKB8Id&m3N>sl#vy8Yu0)*Ve;6{xKuA!YWgs8xGoX^DD zWE`u;*i{0w=2#toX;zSON@EBN*tkR`I_@IC?>h4h+3`z72h54)+t?jz@oyV4Tr6QW z9jt(g%ku54t9G84)oLB}+DMM$z8Fu=qK@4sZrSLFL!yX}ArUVuD@m`)@3{$>j=rz8 z_^VN+GO1hHf$wLzAhoIUpiy}m?ZAIA&i$xCK}rh8*`zH3E##RS+~$0@m&o&`t65x{ApUy^g{9 zJ?&AB8=A4Jo}z19+BB7r^@4-KgM4z5+u-9U5U(^n8TXu~&%Cq4BBo0>g}F%FH1=FW z@i@|oNjlxgvc04o<(;Vlh=&9AjKCY@oTPoi^755w(H|tBQW=2cN{gVO{%qen4F_&^+0Etd?Q&kF66d+pK1 z%jx1J<&Vv{dVf3U^Qso<3h=wVAKDqy&b^J_2a+j^bi7@kE)nf?dVJXYOI5p^0=Rm6 z|0W?lo_`s;(RN}M?&8=8YG7dz5eCP1Wp((!Z$q-TGZh)<#}>RqDJkx0yA!6`H7b6Q zkN(JEVt*ZMwzy*nS^4d|9(9K*rr5GkCB$&Yv6^uZBI^weD)xUqf4Uk0dj0Kj-b8WN z4#~79pt~=EN{)>%!IXr|4@{n-_|i6UiT@(r>5=)!uy^1?`VA7;hqp*1W;S;`dVK>3 z>i9hjAN#G1AdZz`?ke9FT~h}gFJYz`{xp&eHGD@0T*Lp!H` zvkO2A@hb{(-+3!KhZi9AL?(eJpr%%_9CSlRftjk)%`QYFsz)WLZ%8Lb!|SQV$_Eci zaDMe`kP|jJ=D&`2fmg~h6bis84Uz@Y9FlAi?W_>U6e~&mZ3TKTX9KFZe$SjTYG~Y4 z!7a{QUfCx{EH;SpL+%P=AY>bnFHMH;&#F1q5K<(LFx|4Y zi0nnz%-=#Escp=lXOA$q0jJYK(ysHpD%g7Zr+idRNe+Q5#QoH>$$E~&c7dF=t5c^m zD}bar$yzIX@!Jpm-+_vh%6zr~%|cim+A=L+07{w;#9EH)SGXo`0ZL_bO7wxQT!oo) zZ1t*ben;TOrl@v|5j~13xCw9L50lbc8>X#awE42U_@26k#3+?4d#{-S9zGl~s{Y%F z$-8eQ!LfZ=;$82{iNSe@qfI$12M=UZ(_hxO^X?wjLrr2qb0F7q)t1ca(O@k`!9mhs z3BXRW9KzR%&jp8D&(4z127*bA!EQi`5DzB$9R@h%sn4+YH>vYhOPdS(u%fs*s?M!k z*Y_@?>~CY0+|C|PxsrZ;+tc@6Fi*A1Hty;_n)T{%CH+t({Zo$G(AuamA#1d)S=nd8 z1muNP&dB{iPn|Ljw>oy`z^*!;XVPc6OU>Q8ftzLpscb~} zZ1RE1mShzkD4{9MjcKkgL~$mRWAz4%{oFHvH8HdqCj8^<&;WrFZJT~NSt-n_L8(^e zg7mt%RU##fNZ_`YY|l${yekLfSuct0=*ijEsmCVskV7o=15H1TAKRDv#po1K^t1N+ z-p_oKfrx;QL*}1(__I${eWEPw)Rpek_<2z*MmZuqmA}X679|iSbVkVZ5dIc}mZ81N z#cG-lqG2`+5NtynBf6Z-@YY6-={b>|d%4212lilX|75@a*U zXK6kd61NvImF-nggk?MAUf3bH&mm8cdM$K0<>2`F{R7LUH~%a+83M>Y{Bbu7>8i6; z?|Tth!~g=q6Hd8?Yq2CdLPF0+Cqp9}=Tqn(0^g|!V;(=2AOL6w2Xl+IT+vjoFcz)3 z67FeJmY;1ej9b3NGHtfF9(<^inG4VXPGybzZK7yMu2c+l&=H{0=49My_A7e`VyEzfjg zUz?!sFs43$mHco4e&H`So3jt-t@LE zTJe3^x}9619pm-!areF&@P7MozwGb!x^tAKt}gO^d-R@iUW6^^p4L&XYCr}K-Ff`Rw>Ic>4+j2sx}Z>Zi%xun2kV2@ zqkUhtXXu8`#>vqHf;^exSfgUAOnB#%y})T-Z5vy8GR+n8k`&>w2_TpWVP%m z`G;*5Ha0qo`J_mHCrvYXnv1Ja;u_TDV(~GbZTX5l8 zn?(hHp~moM{-sTKKz~f@_vtDMY}CZ%5M>~a03p%*S%S-O_!noP!0z9a=QO}K4r5KV zTkUasVUEp>=HgkMJVFtA^OC@+X0ct{90#*C1dSms1EGGcJPyruuXGAK{`IU|=T8U$ zE=}Y3dL|!kCzym8}-TrO7 z&sVpPOK)ByYDl;Y;h4nk4B=&!I!%0M`tb115YUn-t;*S`8sf>SfdHl})fJ$DdcLs6 z8u|Dy4SKprX*q>Nv29ic=Tox*Whhc_5OzkArL4+hYm(~kUEZjYZ9Gn88s5S_Ik%3F zvi*To=gO(c^BF+`3p$dGEpG|a7!Is>UV3U+lq1wp)3Qs6zp_yrWqFtsY~wgd>eQ`~ zE611js!ppv{bN!Pqb`zJ#dtJi#i;32!rs2#NC`z6MY)nr>$1rb;Gw_TJEx&tn)FsDKM99ZQW|}iI_Hb7XM)4Ww2UVK-f#)AH^^HO2Jm#7mX~b{te&-xYAtU z8soGZTtyfYoN4K0QvSkF@LQ&0HIMOMo02K+Ta|eXk;*42V|XOA@_I^Fgb>5go5Fta zk=*|*Pmw#*H^bzX0uf~BXu=79H^fGBEoMvFsx<=OezzZ)9C~CN=fI9%-1to?X{t=s zNyVyxGdE}HwWt59M_1HZcsNO-g0^BXzYJZ|>gP4_leYb7`sL@p&EYSTW_}+)2{!hvx9oJC8zc;>b zr*G^)MW~zCe*8U_jfp~ay+81mxoQsq%^*+1Ddt=-!^O{K_udyP?!!6}P&mE+p~vPG zc^#*8_UH^auo*#7c#wb;6LiDJMpt!=$rF)`2>F_#Z)1IX*Y?vii#%S!{>))+k!*aG zFWzZ@Z)THQft?KfC(l*kZw$a<|94grQ0kiCi5{8fG|D9Ohf~l=hYBP=(rnhKPcy%* z2i&u$rms=wKc0dvBkF(MG>?Pb#ivWGlTnXRK{vm6sT6`07e$KKcM(ZqJ`%U=#ALBV z=Dx`{0~~G4@pHJHBwH33a7VA|q(EU$sH3da*1IoJ90%4esChYshYVBhD1KvwEhd~T zt*|#o*i|nG!930Q5Khc!!541gp{+%XX9CXS%_>~`nm(O(r;5u{&c+W01}NYKP(QD~ zkewQAZ3q`4|2*jXwql;-%~RaIH&%%oO~bjyf}Qq_E=Qi}NB8($m88!RF+ybu)?#gF zbkfbYPVCOP+0=z=-#mSR9&7M4yl+t$vgztrH_~__o{32o7wTmv@U@(C#1(^vpv6+0 zSx)d=X>bZpe^Pf?uXUcP0)ji^N7ITKTB@i3dQLX{q?Vv}lOr#e(Z^%oR%Y~=7jUu* zfBq(3`rtxXcloMZIoAka*ySDQ@=?4}gl&HuZ1TPN5405Ql8Dhy%T~K0+O0iprORG< z7MV-(b*JBu_}x)(d2Nig5XYf*I`e?R*muI7do||9qeJMmAYA}uw8R(V=8E&wxs8*$ zHhuAP57e#ZqBhT=0O=JSN#AgfwsV^A`BefRVHQh0=^)EWj)a2Oh@)1{SlSzH;Bwnh ztL<h)U;luHv+u6KYwLeQ^*%a1d$UX)p2GJh&NA>X(YpLABOiGsBTWC`JDt?zQVshnh5 zwyWUuaW0_VIzkBDzQ50<)fYZo2xo}s(HeEVdV9OL`&W=;2hPN8bWMqnk&>-_ya&?5 zX2Q;wmBGy!hBTrMe`L00l!>m*uKHokGBOZ2m+*_v;oI6V$8&93p49h1pEXv~mqGH- z1_S@yk&8k&(pyCB0=t%LVJ=dd#Q#=#Ihe!N$}Xd=fjSF)E%Jb=`w^Z`=XXQk$%9;` zn~bZz>62fDR=FD@B2SNdh41@)2fyH3l6?ta$BLfpv8++cnoKKFS@lxaIEj7~WhmTc zo>-Zcd_71?D5T4$nsC8R#Ec6N++lZn&^+Zlyu7|Vdx^e2_bRNFUV)JPK>Z9}SJr>u z`_##fvF6JKuQcV^4jW@l=8^mcG?;9FKLR(y6v6A;vrP-KunS>}qFG|)JEI>dA*6a) zIsSo9_X9UPET}h62UgW*WA$X~op0{%@8G4qG^#Cw zhbE48cs6fqZ;Do*dhI_dEJm)o-F~m~shtzkd)Xb6xht+QeSK&SKJB3U*fdPO(FA5A z?~%=hyCycZ+~lr4DWAX6dcFS=_!!x!l529yS>;nc&!Y93_$6>Kl6|vF_SeVtO0D@O zYt={TT#&Z;fKL~jY7ubR(!S}khfI3F@$cMmsOr5fTSD)T&$w3J-tqE3o6{Z={2*j8 z{?MpS*gt(MvJ$^khAZ$lrkeIDZqEEEsVA{X^AX!D&&X^U+!xm+1=Tc4%2Ws_%e?W2 z5HCntZbmSm<(>2CETHsBmi=%?Hs$J3ssGW_*jD|qj<6#)_z&Ac8#9MWaLzr; zfSNKXQI2l8=0z)Q&$u0WZ!P2+8lY>lfH#L^36jlEm&oJRqy!Po<#np?un9 z3;kt<%(=sXja_nmzs1*y%tM`PeyK9*I#aWG&`~q_!YI44+CmF=Pn(M|dgf+)^!lyr z5Q(rps4n`TFq>gP{9&3?66`V8s=WqOjq@i{U*;!saCOTBwe{MCIE*+7h)b|su0MxZ z*nWrL+D(r;X(8ogMMF8oUu5-|bAJ(=37x-_nZ2{yk3vQlQ5B#yo<-7JFk(0&k*m1&;pmcSqgHn zcWW%SU6ZBVyl*BKT3yjN=oGD=d0UNNG>(d4gpC{+C(K zuUHB|Q04b}ER<-ZO1yVKgv8(cEo&7wpo->`NG)T3FP2FIb|ADXF?he^8IuFKGtjuh zvNWPTly`p*H@}-%jTkwboK!L_PQS0X>|TY(zEBfv`_+v$bT!6`esm~w;#+IJxA*5x zfRMQPnoJhP*8APyHdE{8e-@xjr8t~>)OW6`6CCj~<>woTVc0U|#60?g7(Qlde zdaq>=s3#MG!t0CQWQ7SQ2%;LlFXV>DnTp#jJ2)`bCkTW~m;8KliGm6o{5n6owPCIH z=`+r-AthyQZFHD&hBfVLG4FNuHmACWdB}alP@?!!`w2LOuz#nT7~8*GJh$W=u-)@J z%8j#SC~F73(~ml06q{5vi|p(z99U_GRP888%h<=~XWXkeUP<>6PnYLg@V0RcwA@57 z>G4|EuQ+Ie6&#RG{=IZ5&^U#_R??rV26i0;~;M8(&6D7H!@Z?o&k8fXSS9m7_SwH zi;Q0$r9{8@|Iqdo2|BV-3bOT7bgx+(SUEd%1yM#*f*G4J^J&f-L7F!)-~aM3w#(m` zC+EBS19vbZ*(PKJw|^&Nv;O9xi!S|3tD3YO!(bgIqu>_4t0C*S-SlVa|Ch7}w^0Sj zw)z~}$ik-Y)spQAH`P`uKA6fr} z{ZrO6LmbDODLmr5ewhfm!=&S>78_1K`=7FYr|d3A#&_7LgrTgQ?}0X`K6uJMfjW|R z(Si$2GvHGzBp(cSn^F!*z;`MB!XM(>f-YZ8@UI9f`RN+o|1l{1fL&n)#!X~4#f=Hz zr=#g7Lw8m|`7jmfmcpDsAhb+3<)-OtxTM%db|fYxGZY3MKMk1Jojb+Y{O1NcC7mAA zj1&ad%f~obFHx33YOZ5?a0*@IHYKm3jQ@pD@Fnr~|M_iPb;XKQ{Q@_CWQezqQp`=5 z5^g|KXnQb$9W%IFj`U+0X@;=L_B7t|JZ7l*JzcT)fA`-1^+#hW0E;a$QPq2%Yi{61WVa3)}7lSVGzQDdbd+*a%r3hj+>O%ZI$%quY ztV9(Me(?#BlH~LKV11{*ObjOXFtEQzJHwU^t;!o2EKBK@<0OV1W{dxI9OcvN+NkH+ z01F<5du|>Qa%P?P?V(-@xd#so)Ox%>y`B8}@-p{icLE-IIABo{F$@$A_}H$0dVU-N zzo1|0$o2m48o>hy_y=51^9J2LudOIMiKL78d%s+dw|mi63wH-SU?9Gv{>QGS;gycL z;%(zZjDXDdk?IH~;*Xy|QwGjX%7D}-ay{hdVNR)+KZ^t*{83cZ$3A7;ci;QlEIrXq z=v<%dhC^D&0*UNI!&o#$KomVj75U0WQG1OwP`HJRWwM8*JTqGOTR=ESa%XIh16!ZGGo*hYn+#uQ_fjD{d!e*C4XP;9nFS9*Fy4KNmdJgt~A~ zME+g~^<|j0Hwt%Jt--gb zaV0e8iPFa!+jAAbbIXYj;=itSXlo*9!{Db01?jnrbsFc=GQSwe*~kFDtgOF=j?o*q z#c%$3`QZ=>{9sjFE4ztgVQBDf?wo2%E>r-e5|`M*84R&=p|(@kCvTp0S<*vxj-A(i zHWSaZqR1R3ZGA>IPL}TCyoIj^M}7&n<)nk6c+16&`-pKc%QI4d`|lgEZ7@c^XR5lW zU>%L|+iY41Ip;9=Osx6veK81{NJWS41B6iQ+Z`6yg`c06kFqTOdVmJ+C5wCsF21TO zX>+be)@A+u8l@k?c(+wX|mR(bi1s zYkwiKsgPc|oc&mPghNec_&IA`<$geJQWf(>Q4j~m^A=J?_6GGJyRJM7z4*v)GcI4f ziuir-sT2#>D`W5F-CY{{VBY&R{mVk%DI1(MenAq6bdxaseCf3M--)-(51Y*X?FY0* zK=<0bMt3dA=7~%sA=1&IEm)Nt)qTUO`8D4rW8h0e0k1&$lc6V2$Uo_ZYMVZs8 zb@Iz8Y_B5l?m{Br5KS%QlM1#!%(QF<*dlxLP>IwuigG!iFI7P@^(_RDwMQT(miabC z*bjjfP*lCzDw#Id5?-e?JjNvRw=%f<+m6CO$KTfm@H6y`zoYsUN4h*PeL6EMX|Hk~ z)-9=>{vIwR2JOYwzxTZhR^NBS7=LwAbSb*Y+d3nRy_9Lx8##`keG0^=>L1?~tcCHZ z7gm30OstvcQ_XQ!Ak?gnx_}zy5ku(_eo>&|M%|&6>YJ{u8 zB~0QWL;|nEd$ZI(m@85UHq$c)cL)ec+__z4$e-Iup|8vX@YFtj3)D>K5NH+fUo6&c zJ_sdYi&wB9kPk${%F33&HyaIJHy_`HnoYrS7Zng3f>7w6W9lcVP}v^ z67A9&B!29hy=YRge}YO>upSP}FlJ@~A7M(;Nzf6#O|i%36F)nX@=d-SMIVR1{c|db zZ&`JzV~IeSV+LWrVV*c60+%^_>J9Q}M3MMHtymbRA`cU)NBxb)n%$jaj2pjFlK2nwfow&7YRf4jMLr>S%)=)5z=g_q; zBNZc`SJ1!7Kes6^Bi~RBfVN${bI$ut6j5c?>fLy}ux*N6L^XJF-w+Ji7z09`M3H=} zVd?`PYXv|M74)hA)V)x5eGuBqVgY?W@^Rq^=b`MMq)JLLGIH$7BWzAU`7gu0qzzD$ zSJ0F9X0loU)nK3%K?lr@mU~7@O?%AzS8bARa9J5?~17($M5z$PO zuBdA@Vw3X#Fvn;4=pR#Ru@J{-V&4zRC#Sw05|+W{9|IXRyKS{EVhj4kRoA3>;pyN; zxF*=KjJv*np&$kB;!=@+;NYtEb5pt^-x#Jknwac4XZ=FCVgLG>jzlEmRUx+)!}4`; zf4qN!L{OEuS|?p8wUEW$s`wjiwkxTlw0M1Hj6RIl3%Sv*sIH0!YY*n!ybvk)3G;P} zNF7OK5J91E*D-YG6%hd=hl*{0PljF8EqSNrC!M9;k43M!aD5>>n2vBdD7v^`1~5xM zsP^4wS^MBdO*9ust;IU2IYl5oUekJ5nxi-~jF+zBAt3wb8EO0L>nY7=lSkAVq8(W(y&h0L|q^ze$i1}9f}j?8C+BMd64V7g$N{e z#>cyaxd}!WNUGWB%73_$V#wZ^MoyvvFa+h8SQsxTuL zXLnR$H%{{MCAqN>9-HZ>2B(yIi|NMXL!ge0QW|*iC`S{_A3>L9y=+^$Hlh+VR0oC3 zh8%4INlerM=vcJAbyBLnxGb{Cuq0<(yQSU?7Oa@(Cj6}(kfAa}o z|L$@r6kxDLkGFK}Zl;X8t=gbzPz=Q{jd3M6ww`sOdQh z?n71`%kgIGWRG=@3HMZEPQeP9GN7SzVAe9t|Ak*hDk%Phe|ZWpjwwWJks>gGNKR8w z75;w!a6pg0J^{$9b z7KzR!V((F-vQ=u}D?%rM?IlJ+zHP5wtCQ8eaJ8^DNIAwi&L$+r6x@t4>*#vci0Q#V zK~}^R+>m?>E-ycq+%(wB^SerS>W7Zz0f}pb{AU{_pR3?il98VorU;xR0XQu3g!(AL z*_2BDKLMc}*WdS$EJI>07H6hFj7+kU316_%s3 z49m56ExTFi30-US_fq1wkn?r*L+tbR~|Wtmg;F96+?ovc4rr^qB_U#ealfPEZOeP3=`Ns1;1^1HMU><42%-Jb*NW$GeOw&x*!SptZkCuc`Z z^B1jv08qewsmG}UsHsEEm;ydeiX68=0!(ufBXKgnuMYTs!-_8c8KE5Cpu2+>{%Ye; zjYyt=G)ap{h;Yg_ySY#)7{AJ`>s?YvOWqwDmuGT7Kt4uX=cc&1$z`hzj(H|d95gil zCu05K>m*l2L$e-$eZ<)yzVnjcP7okcU6oU(aWV};65+v~Ahxm)oE=_Ve0qO= zd;lhQ3eUWfWPxn%JH)l4Ymy}~-^x~+`2bwXm95sE9)XLyI7hdojp<%$oFi3pL)6&qP$j7M!C`SrP(=rj}uraJkIjlUbC&fyd z1PY16B%6q`td$=bX?!Hgww}H}e*X3J@ZIxrl7$3E!8s1=Nynd@@eLfC2!l8YFzbcA zy>eK~-G$gLzC$U87tp2m2YaJTP^!p{haxB3Oi}T;DyD!VvHwdml5kIIKSES&)N7MM z&X!Wn-JUQlQ-6$uf+_bU+z|sieu2>Nli0^;PKPC&B9%E3kJ!tY z36q8#p^7Xxd?Xeg5|5O8jLXN5_r&^eA%60Jgf_#J2B@48A}6aB}>Z zwT#IpKyk{qS<&5I>151$m=!tzrseDb@ZsIz#hU}5s#>Y}qL`^c1;t!jV(eYQ9wl*( zZ}WkV(%PFgDRN4JYJ2$d!wDPowi!%J=c5J~BO}O?R1O~snr6aU`R4XISv!!`S33Ba zFpyldspGclB0i+7Ps&#E2QRavNXsW-`zI~ZG{TG(P{d!9j3vt*@#MJW+<70LCrSQ} z&3Iq59*X-2L|ghx%wM}|@GK925Ky)Q_Fg*>fJvbY)etb}_`eH2NR ztwO+h;56ZcS783sh_uFJ@u);3#QvQh;du?K3N&_Amt22qn3tq>z^Hoy5Ctd(Bqn)P z;t5j}NjzfnmrO7~IUpja2PAQHH`tTEDvK@Ma&4Gx9dJPS5nmxr6eOqfz13h(p7nH6 zP#(Ub_>R|97vft-MngcjuPe�Lk%$4#0C(Wvg^)@fo9Q36e7wlz%PV(TiUQtBR3Po3 zo0aLt0zgSa<0$NTee@l*(C&$CLHqo>b$}^0Xy4eYZ%lt+y3GxtW4;K;(Z5TIj1N+Y z{H($)M0_o8ByNgxT6%wZnD1P{4O6Sw&TZ<%p(eE5=Kaf~v;Dn#<9m5@R#$Km0t8-N zUY^Ms2o+0LX%FGziM=1P|6No|`(x4M6y@U*rmO1VzC1Q$>UjC9vWv2Q5&C+`)U>&m zoj%-Z_1Zw9Itis38DXDoV!xF=$w%UeAXC&aPNIO87^Ry;DUCXD&*L1xDL;^^6~~04 zV;rHo3+yLxKo0;^<=YfzgfFsF&zXcwioAMZ%I6^>QIX-xafT@)n7ygbS_4FS@p?7Q zx|zLteJ|WzVc)U)I_%!=wk`8}H}c;a!(WIsVQqGoYe_e=(B(S%ZpoyWFsjVI>grQys%%%tU^yExDnXF~ zPZ(NB&SwSfo>B8Bj-~GH35^xCe017d4?eai2RCEl3)^u>*wjcGPuiQ2?`H<J6z+gi8Z^FwcMS8{0j8W0$GNmhO=#Uvnc&1vGy3&a=;zAO6zgHeWj92QY@_dwKh+Ig*KGwa3lez~#t zDaF)U2Z^+_14+-4uKoBD#D^Uu$UPMb0&#Z2$ds;Q)fSFzB`KMZ2xaBz$ajn-zbnx! zrTT#TVUT!cEt@?8l@J|ES`GUSU6sd44F{~!DdBs*Mvz!68uSTUj`$%)?hgio#|`1k zPlebDF%b@rCyXG9NpEgITXsSaKQGvk_3TT{+OY<=sC_}VgZ<- zJ8tH|KNTbsqOjAyrNiO4Ct1DRj^{T?qFT_JsO6tAvrIN{Nh30M!2^v0Dk&P4sT2&X z?x04C8*v3Bl}G-ACKtt{2w&vLzj^}BxTrlYP$VCmi^fz>I9`&zKob((l~&dUioLde zMp6*6qJ#?$)O3mB7NVMrle25%3H!g*tb*`^0`RZSz7y8l6*{dUQ+Y4-7N~5EY6#So zhNM*UYSFq>yr$(Wog-hD$XMPNO9X5KPfr;udVH>cog-vh+`&=A+=IV{NwWN4sw|UQ ztQ~pcC()qs?xILJj)tSbH@3_8_C)->U|%ke&ZHXk;rQ%Z6I^Ua*ekg;NzqLV5Zm9> z-g9vPMmVqKKKDjptn}ghEq}{biTc2*(RxAf0mnYoq{>WNOL*?Y$eTK~_Yu8X zS~viVF=(7v@i&9^=zgnFe`6yiCVA=D3DXHbOxbf=$eZu-(=Oa*HlmQLo1w8u4>YYp;W4xs~{hxa`kJi zsI=Kro1Pz5M}-VCKR{;A{RzD4nC2@LsMJa$Eg;2_{}Q1eZiUrTzW$Uwe&O z=PIkR%qrSyU34>bRpObiu9mK3tE;PJ7qrA_<*m0+mX?0;8|tf-D_*xOEo-@VeYNV` zMGEU-ktY#}ubO=){PCJXkumoZ;3fIEb`7J908RyJ^}JNEIga}kz}o?);-X~$$AN;DP}ujhM)bGRo8V@zHBw5cq!|v!(ytDY#rHGwAM56 z`_h}>af=*AV^ZXRyFp3+kV#oPjsvBjavct*`&P;@1&Es+JVc4#WSF|{KSZxjnru}b zvHvzVN9E$xUaZP#$34OhKs+Mx?VO@{L>1(7=Y2MT_J8Nwtu1fV%5AvpQ0^+XifDaQ zZk%Y-p^E2~a>f3pfv|Ft+vfu%hv3npskL~V(7axUn`;_>Q%_Ps`m2QUNGMKJ`;@+1 zp}Eg=L*o)5WPF8Jq;KXRN_-U6TGBL8Dayw+Q4B$?|FT#0j;E&V4CUhiSdAo5+5U&E zXTk={*NTAY%S@$gB=G`&e+u9L8j3oDNqD=T@c{VN%Z3?jrlxY4Y?;5rN>>>tYgS;@ zOkok;iYsI0D*0-d8ylu61@7|g#WcGNz%#aB3s+L^vCG7x;4C%*sdQ6A?a>kAkw>&4 z4Jt=f!M-i7QSyj3C@O=2q$fGww;=9-R-L-E*EAnzxwtB>7BYaxq#fZbZ=IgC*}w9J z?_%O<1vh29LUY!`3smn9(!Wl|NTIkXR#+Rba7SayoS>fJnIuJ=vqkp9#WN6K5s$Eu z9^asLR+kqw%vI%AYw3LvH&uHlg_Vc&3OkKP*}hv1f#N%m@OYy6dyOj2m$8>$Il(U3 zZ&Ue=>$uTwl50OK|8WY9Q@Nw1qbsxZm?DuF}FvxBgJ4TVHkP{~YY``NRojPYvHb~e+Tc0p+ za2#+CBt>{3GuYBYdqyCyX-g6HEjFcGgJXig}dwH|5(C5ZuLR zLVTu?iIgU+GkLTmZ3yNT7}q|OFE1{>J!yHpR48!PVLy=Vn#ITFbUx;RI1$AH<%nG4 z7*NqF(WqJYBId?o9Dwf|WIX1qDNx5n6g>fP(!#{mQSQ*g4_4XS87GycqN_Ec&L$4A zjZ&JdF8zCMkO+a#aKVFe0KO%ZbEqF7GI>%Dx^(EN-m{6<+MP7cmdZj$3s1qGnpGNzO@j18#K}iAV3RG5$;hjE!nc#69n~yEv@m~GdmM04|%L~ zHFelfDzxzU_Cb;*CRdiEXe1*LT4M2#$Gf~snn}Y-0hv#+?z`HknMjqM>&YTkbCLwO znnJbN-;>U4a`?o!1~~iwB+|9a@dC%Nrce*imMF+f5%CSgTm*$TGsU|Jtu%9o0!5m{ z;2TdBQ^YcA;+qs)tl)GOgQIF+QZ7CvXRyH-qm1b*`3=S~Kv6RgV6V~3>vVF}v%J25 zWRDknNHP+FgSN_3ZQ#V>S5iJL^@jqu!yq%k0V%lka$n^A*soVJ1oBB5Qto}>v+`Y-!t;YhR6J%>4;q`$!dmZST}8{CJR`dJYl%-aaB zF!i${-tooie6iO!7T`)H@02tlLM`TTskPOT(L5|@HuOjg!XyfCCOlEZIc<>mS2$DH z-ZYUZ?>1qXv7~7+%RB;??~mUDnJklU!4hsz`H}m+dr`tWVum(`T`6d$cx0O4Dj5_f zeA_uAmC7x9bLUL_vG8n{W(`(mcGo$mPG%&}%HCYK2bbFZiaYQs(19`Qx3a2l)3arN z$X=E8@Au(^KMEK8x*YIpj(%(8pUdPgNeEDFm72&TTMsdcd^7@ly<`E{V&@0=y0N(} zT@1KEBE{K+P|EFlA|lEkCpWRkOf;S(Vo9JlKdTGQ7>^!oJomvPFr3^SH`{a3OvzG$ zUf!kLf=U4b{uujLWzbKa-AT(_o7R#lHc*XI>mc!Y(pG5}PqNY&+V0~ji`YE-9Pf@b ztaGJ5&n(Ld$M;{6bA{D+1qLq7!<#a&Xz}*hxWv0-=3kAOW$b0m!*frYctK@SrXgLx zc8$}8-?6#B(cb$r`X6&swJ^(zk@zT4rr76}-VN-LrEC#)NAZg_pmmm7oe&*Vk3ebd z7Dh@#QyZ_uN!;X4DYHJ!;j8lKdKK0x%a$G!%lNBx(md;v-7urqWQc<}#v%1Ead`3K zR5q*5i1s_?-}`3Y&JmaHHOq%vW|CWNtVQAF11)P`ag?XA?nZc?fC_2>RXIfSKAJSo zW*Yt35*@Z}cgi|BTEYWkcCh&K+N1Ca-yML0;;cG=29;mlf|=L}=bf8t)KY;@))AK22CP)^xEnBRw1pdO+j&>pg1Q= z`Q-6l`K^PY&CM9cA7YAfLPMTAaq2yHi>Zh0e}ts|`&2@) z90>zaB;(xZ7RHR@F0+LK@?ZcZ&GW+ah?(Jbcl0*D12I3Z>1>{ z`zL3mGqfmFrV!mq>PQp>iX=eE6V8J;_Z3cq!XzI5svtr6@bO-w9o4v!w2_w?4xp+E zDNs==B$)#COSe`(ne3O(Zf^9hlVyU0^5~j^p|~`M&PfY6*sF3X9PEKd;1dP~ zE%>D&8TOOO1jhmQKWZeWsq+a*ND+LIfC!^&X{_T}N*K%gBq=Dv?2i-D@D^li$Ux*a zK@m*=iP>7fkAyRaGbQfMLR~vU6S%o@GmnVxuUWDrl#x2fcx}Fzo&)%mM93ST;>aFuDm=y zo}J3-2jC=Mp=uzn)#CAWBo31&(jt%)IrwK%WNed9#biDh^4UAMa;SoGWt>d->=-6R zrqp@&%bTv1@^*099m7Y}Rk+G^8h0Cp8ac@K0Ju(@0f|jrnYEMOSJ!n{opkDYQe7pS zWT1HsZ*@jR&7~3VK}O zV2Z4?L6u3@#o1O;jLP_hQdg|ZETAe|J1bt1D7v^Ixj$|g=J74RF(Qyjlj+x!vumSr zR_%IgP3J_AQjs;Kk>s-M!KqZQbNaA7@L(Eh+Mgy4ML!Lz7T*!H%vo|L##$w=5(~w}W0k`pr&we{T|Fu^UKWB?vDosw~U zU7JW|Z*BrJp2hVQ9RVkN*7;j*i#UgS)f^VPHBtHniK?KU*%PJCLyTTl;MPILbsDpO z14e>;J9~C@52n=hjj1!{RMubndmU?ol)D|PL-QhEA(gq_Cp-&H% z&^(()Fe~DCwkK+tMd~ZaI;=QtiHG951*z1V_$#yLeTa$XRn~o^MFaj`g+{CI8kNf1 z61o0Y-)LA`q}Yy)FxD&WO$xV)h$|`rl8He2hP!B#$jlvi0@6%W(i)5sk*J4_f!Pwjp0gbDBiAhHD22VBYaU8d#>zHIBHDpsM5@93J zo%Cmr5(9ykByZgH$pkyoI=FK^zdc1~uqB=n2awS( ze0N?cJRIa1qS!JN9J3w_rlAMoatoekp`K?uE_1QXI$VkxV;KAm`W*CDyhw+PP4+hE_48(rfabA zw2LCp$`n*)R+ZG&8E_i)GzvU=bT7GZIN}V42a7J?>5&VkRYCJdof`+}7F2D)2aQB8 zGkg$NiAmOAgxaz`FOdRRCzZlfbmmkXK9Ki>iJ==TimLC3m1odhaqnE9t{e6~H}JiT z=w44JOS5E>BN8EAadb2Xw#WdB1(X6wh3SVsU%D5cZs};v~m1Ec?Ux+Y5QkaAQSaLvZ|zF>jGY zjRUuH91yyGvoZ#@T8ntmhi%k^@pa&>-z*8ZTEk@FhiclNcAx(nAIVq4mVIkjUG6me zT3;1^mIU=h@q;{#R;@!-Rn;;K{#RAi>A#w8nSX+Y22E4bR2BY7)pQ88KLPcAn=U>D z%~AFzb>q6G8}~c;{PN52uX}t6tMb6`9hE$`^`Zi&8Hq&#p>f3vJl8*}xIwyl$wX-= ztFOPW?~rdRQ-i&~4*&b#yplw zMgKfb5l<;_@U*;RyuvCD{>yvp_rahIDfZo~1ONBGdy1m$p_Isd*a2uzH@wz7oFlk* zMdIK9%$Y)a6PzRAuT;8t{_;!R2u_~da8`s)QzqUsiv9y)!j_*L7!0($ZiH8L$y+CH zvIU?;b(+%QHIzqhjM`s*nbZE-gNyAeWiJ5GpuKCLM9+f%R7RF&UvmT#5}#w9&X~@{ z(kRnF1tkJ>yBtAXrh!102ymVezuC>*OeZKmI{WY;ClUFXFYjkK^O^cN!ew_T(<7 zPx{MUhWuIY`Q?4UX;D296&zmU42^K3k|n*nj3U+~90$#x3tK3{7Pr~RNgX7)K|5EV ztJT!5=*JsK4ubP_LUjL!3>bv#-K|Xx_m-pi5*`0_9 ztqrU#`-iwy6`aV^pbT?c1>0D2t3@QvlB;_`J;e4U(u^Z>y#%H4V(#*fqNut25B~~Y zibVV6*#nA$=3Yx)1n}2kQ)if3zxcJ*a>44ro8gH(`6$(xh1l3G`=W{Q_bghL&i^W! zqrVhbGXJ3l^(p;d)iiTA{~zMR=l?mM$y1putI1I2+$&vTe4e?1*!5^1q3FBv{8lf-~aAarH6kN zY0Mf&h0XMDGub#rlnn2nxaj2 z@A&`=bo=1@fcQBZ#cKGbt9(4wh0}tOADA`AWFP!_pL@(P;*I|1RaC8Qxfj&vwZ!pQh4`P0G6!(x?xYB|EPv(?biQ?`1D!- zD~{N%0#Kn{MFXe`?^J+4fC`Xx9pAJd<Pq@O_LM_-Z7NXWk@HMB>qhG!U;FofaYzf$#Z53Bmqpk^=;;dDLG8p5LXy6{#_S zzW)n-ykA%Gc&4901uwW%oVxt-OM|Qx*fDDo4yMf#ybthCi(2}9l7Rs&vJnP@B1YGU zM97P9)dj5z4mwnd22fr91l@k9pNqj?phvVZ3Tm3TF4&V5uyh=U)xEt_Mt92S{~={` zss2}b!*6f~xK#hsXU_j@-QMYc5Aor~?WX8WrGM(C+6M-dT1m(^cn8mAuwP7?)BsrT5H? zVBLpZ%&>^^t!_2g4MG&4kqIo@_#Ea&*ljOWNQOxdRB z;3?SOUxoJBI;W`TLT`-d8+=y-?w4KoxNcoJ7*nm21U;RSS4&$`o}5bfmg8oH^9tY5 zjwbv^h7`{tZzK4>>LRvO|C1q1XGui-yM9{WV*L-Q7Br^pe-Ik#PXBv|54Zn4o3Zho zHb=e6@Hs|R$eNV=K^aHJvp~%^?ny36IlldBwl%y^+k95aM`;KYM!yzOE#qJvhdj7) zco6S3Y#9bOF!ZfwQ!KZaX%bvCObH7c+bBE7Xt$)ifMB%C&G1~yT|*2;w6dPem^n5x zax~ZMrA=plcz&9uRSy5OynL;!a>)7(JpljQmn*>jznaZm6*FFd_<4!94`NBOvZ#WR z@+Y9KYqdpk&Qxk_lyDVZUuy!(p%joOHD5@mJZbXYpJSmz@c6aX3zB*>FKUWO`YcNP ztGO=*J_#}~wTVkT@KoHTS2?50;*BH?B*=s*a6YDHJ^0qgX=`sGp0ur6vhDMMl+~?| z-P^UcEk*gjhCwu+Qhd$wLMs;xq7U` zG!1}RcA0tEW|V1+oK>oaQ;TFpenV6!a|^Zh$K{~Sqjgnong_oDA1&;mwK!-Yrfu`i z3@^3x5|IZ%7Hj0knX89bbM=s3i(1S4*T@>PY*}l;DIm;}$;`^e9`4q*-P*QW+g6rL zyR~h%w*8*hwg+9>T6V@?+vd2`{#Ql2-JAcvZt2tZKUG)Z&i?lhA8!AxlXOo!ExSeS%!&Yzp%@jSo%pw7nFG){tfE;`&CTEkQxhaF<4rm#+ozmPK4 z$z@vj{b@R{)0khd(>}cEB=0(nSEFk>{ofkhR)VhHX(hyJq)lgFTZ6O`bam27h$W;w zD@YX75rGqwE@taGTy8L*iEE^Fg!SSuN7X(n3sdcu(Rv6KO`s#9x;9ZRQ) z5x%5zNPRqg(9RiWhJRL>P z#nv&a=TBL#Euv^HRkMdi?SrtH#y_+^xLp6c_U}3W2h>!1CjW=Ii~oO+&rJOPS)Hd| zUW>}_+3TAPfUiQ`&VcE)ztjP+^cXw)c+_;SsgmjYcxo|XS}QAEtySOSpTPH3fB+|l zzZXK0KX@!%`8b$NyvQ3pV+?B4+wdV|#3|F(0FH5{{L0b(vo%e-c?s9CWn13m-d>HG z_B-lb)%Q>IY)hO?Z?&fnhkyA)c~bvAKTG95Qvfzx0G7r7o0>K)|DnB;{}1w6EB_;k zqQ?60vA%_MtAT(*lV6d_Uh^;I5!`%NB#Dse$D0k`GZF_R9_>bPy=t-~!ZHyk zO3BMCDbfW!zgH#&ZO)suUE&HM91i%AtH5{BvORDjmmqChD^8ok2 zoR*JgRF8R`ThdyW>F8H&t|s&Q^Bi8f{)>(BMjF79^ z?%rekr)H=#`oFF1=Kq6yX6!%ZJ-`1ydvE_8w~ZupG%67Cxd{v-N#MFl>< zF_xVD@;-bfUq7Ymr6#Lf{bW7W)z3ibALr_qkKoDEugz1J|NH#h)k+N5CjU>(`=3F7 z*n5iq^(c=b|EuTg#^(Utl%TA;(@S(Y#4YCrO+{cmKS=IeVx6Uf#Gb1s@%?kHSdi{>1QJ>dH_LX5MPiA`Jo~RRsnuMTJ(hm0n}pG-6s;@>-ZE# z@H0jNRJT%%P=G7e+*N~sfc2vLZHpM#P5q1@mf%#tw#NI*OF3t-8t8{d48$iG^m)VW zULC)$wC!AB_AG(^oZIdx@?J4(>*C7!T8b#9|6Xo0v<`@RO1ITjR~{`N3uYpWYmD>! zI#9($OD$Ug1p%GXf>HDSNkBOQReS-Fs`aNNgqrgVbIRN0O&3L!6nEYw^uwPsMBr;? z;j;%mg5Ot(8V0mT+opkL>58@V_N-SV$^3cI=PpM7(AqmZJp3McwpMIrm>e2c4|!l0 z*ld#MM0)cmx%DFtJS$nU{!{LgLW_Z8oX{TsyEGsP4dd;(-%4IH7AqjPKaSM( z?SBJ~)0EN!e*7p#Ql!5ZDttc-nF!)XC-PGs?(u`j5+!O_^1_<^?dGL9_nKwNlCen5 z4Ml;e={IwIurkte=RDSEM@3QzU`esM{|z`3edm`NX_Rb!gd1_`E3~d~nUak*dT~Qq zXXpmZBExQ>4L5A^3;1QDQQHWVITiIdOP6!Wf9caFN;Db(w`;q~<0(64QGl+VLe)@N zIK$k*O@5goR;~v;lC7Wzyk)YA$%RiA9`HK!HOsW?1uIOFr3bvV(l^nAy(*N2<1# zmK+}*?T42SX3uevR(CIK4ewjE7nI<>_t*=rzyD}C=wJ0|C;tm^qvnOcHv6CH)Uf{> z45#BK`TtR#{Qgf95l{#N-w>Bs&`%7r%8S4%iI{G4k@7zOzJr!bnc!&(L;3ZLe(Yv2 zO)w%!wgI0$9aR)0{v3Sz|@pA2oJUMJ0qF@-h^Rv982DsRL0EI?AWijVOd z46`H9lRt&obZ-a7>!TfoJ-~SV3gInGM;0=b&$2dGA?3f=p@|pnDC#1uu%O4RsQ#JP z)|4?Hv@kTe%G$eN_a{v4gk~Go)IP61OEP870F2itOJbJ5W=-kGZ3I2nMWxMiz={)D zN1*cVIe4~ah%Ar&&NAS&I!L=}NCb0{kd##jilt8ZthQpBN)4=QX_k;ANTMTfeR8qm zXLGEs6E|pDl3iZ$SX=fXb%59DFv)=ad9SW|q9rE)5mxsUWvY&E-_txoO2V0<%H@ZY zpXj+pXq`!hmQ0DKe&Tkwimh$eGLJlLle@EXM2cfv-E!ah7*0lYOJC(S!^M)!&vpD# zKpx?azHIgCJo$e-%9GQ7q0ZjT;0$Ik4p2M?b3_W^X3sbT0u+-(xj^A+^9Hv&c8&XE zaEQjT9%qD>L=Fw4MGhl3IB5YvKe!q2>KL$S%u6#)5R&~*NeGX?U_7BrfWW2TZ5?n2 zH@UpZ)tjkJgniQL{n?(H^j}84Yp(pOLH{SClKelMJlX$0%9GRoJdomjm4A6yMXTyh zezht7@b@pT+9S z#^ye=%~ye&N{g>X!g$U7FM~2O`A>vCeK7fNG&23ahQq;A{_jV5a``Wh@y#c=q0ToC z^Q{E4c5h%?P;jTp_Jl$F$xqw+X?0|Sn$EV7##XkQcYWh8qa*N<-{`P|yOaPIgrqkS zv--P9*=^!s@1Q3>&a*VoKk_e3)>ZvMW+;Muko#nr?&sfG!*=g66T4Azhon3dLSALbq&`B;u93;@L8TgW-w+rI7CU{ zM~eiL{H^Ks0%&8lcIb0+llo+Fb0f|g^andII9v$+#Z(w==>G$s{|5uh`G538{~zTk z)BpRP|5a8{KL6*G*mC}t-?p6p^J>isXFSyBOX8sp^(sC-|Dk@1 z)lJ@++BP?wU3DpEez6ZpP*6opD)35%Epjljn1EC=7jeVX4M)nKGU$h|<7jilGS%JN zGN*Q7_-pU?4w>3{mup&9>YICzTx_c)JB|D&dSdQAOKk^QN`@zJjT zQBSlFum7=$IiFeoQ{bkt$6tOdcl-JkMQV+?NLf`Hr~so4w0Pav+0WEW+~4ajAIJK0 zx%wHL{j^g5GEj* zS&!B`ejKuzzQwzUQc|veo}ulR3pr)BANdpM#Pm5%{G#ngJn-kEZG7Ix_YCYK$BG|1 zn9mch`Ldoi^#6h5KMbc6)Bb1F>p$6lKgv_`|Ge+@uZ2n$x4+_}?ebTA+H&`+m8x^~ zt5vvPu!jbQ-}24X|6JYt^!oJ8tCtOKjVbp2oEOG){XEoNvB1LTzb1BEGSK$#P!wIg zLnK(}t$lZP`SR!ESFhC8yw~TRQsnaWo9mZ1eXT@)I_UN%-Cno1-yeAPMAsadjz#gF z8{?hx9P;?)>|#CAd&Zmn@PUb2B8u(6h8M?_=Tl-wh^+^cqWUxWU1Yh(>j_Uulb5jG z#BUj!8}C{WjQluhJv~ySDC0vb(}CW7~bN zx?JjG{4U8tju{xQzsr&(w^iVBoJbN1wrA!vbh47hE1fUfLnu}cs+~@u(CFfYpTV%3 z7nEq^o#9_AR;r@#(B>#tla!1vsAwZ=)-iUVWh1nPF~s;HOKw?1+KamO4xKHnd`@eM zHuB#C$N%U}`h$}F-&6eG$9X9e*fKK(vh^bF>z0qgUrHpFo zQbu-NN_mhsFaPh!t2d`FPtRXo|NQ#$$E%yOi?^fFaw@|&aR1M*hpLIYiGjP?SlPaq z{}k#ONCHIyc{lIP*G zBmAHI^g(mK$|Ms;_y9q2XR9cZ`9ZeppgX2d!%u!HYZsuDQl%WTUEPVHkf%gO{H{IE zh3b;8e(#ojBJ`GDROI@%7#?cL`2`3)Ma!Oi-&J4RJTfG1w8Sfnf9c;V;3@R0Z4d{e zF$VTwGV98Io9T326nRTNT?y_1ljw3}lv<##i?Sq*z^(+hrztUAJft2AsZIakdjhlA zkIrHOvzZ@2{BZieQOW*qJbtqOew3#X{eLOe0LT}Cn+dEiisw9E_{s6Bm*D$1XWPkt zd65+s;l^DpV$CZw8@+#7s?EvHDq|ZH*eH~DcYwP=jJiP_%(^JqU-vyhvxFFZOo$&W z=;8DfviNT(i7iwNz3)&$W~L!$FY|1&GNmggcSqna>?<3|r%!+RBP7Av`(Gv=YvBM= zz5o0D!Nk=6^@r0Z`>#iN8q0rYB5~a3kpA)%V-F$w31AH+KQ%Ajz2!bL$=(+r^{H4X z%Y5qB8WNwhp}u`inKo5eau+9s(e&X6o{Y;;Hh3ZvAo+MOO5PoG6&N2+&WwiS^6*813y6yqp?_DEfCv*uE=Q9VWLJ^AIcfO`; z!3AZnbQH>IK6($spHLV^@SUG=0`1xR#vSUvGb>0kY6y)6V4k#}11hzt(QMjcF2%{$ zmX5yA6v58{+sOaT_HwDLiM&$pyt~yc%wk9&4zkb#dwQRW%a)qm$-8pjhKpmdend8= zap{^tb6S?x8Cf=*jAgxfSXNEJ@*dcCx9>!JgXYROH^`}F`WdZUYAN>DruWMlKF6k?(#7g ztBD?Jvt&hBmPL|n(gei>dx|A8Rz9d%{@%e`b}ue3W9v4f%(G}lo%zzGakXNtfhJ9! zuGP!$oM%=uGxM#69XJ2esGq`>h@4sym7=HSRF6bTrtWf806Ku>lrG|&DnRneBJXsu zkN}HgM^cKdXF9emmZYEPc{eF2{K)FRB^NS%6>b!dKUNP8W>twDvX2&iCO%K?yH1I79C} z4xE0rfi3k6fLlMfgK>DIz1-djAXDa>6;%c$5nZYaScd&_RRH4E@)l;idXcNPG!9L& zF?w{qy?tCPtgTI%D06MWW|taIPwl6+{x@9*t%Cp5$^YIn<3IMsgQxr-kMcCu|6WKV zAj0E*okTubeim(Tx>nKwT2!@a_!}i`P_?esp{X@t0jI83w*}J7f}W-8pqZ-rVN|;U zN}Ld|3xBtl^g5oQB$J&jYaQj6$|g-D6r;&CDoLhEBSx$CVg)pM+T#Z`>yk6=4D6>k z*_?`}B+J{*An{S$@K#?LqNp!VM++D&yLhoLO}{!RGcfj!z#W9CEz!dL&p%aSYs*|0 zTaT-aPh@@&K#YG%LYQZiWM_zc)cJSy{CNre@aGH>_&N@t$6TirnNG8>11u65R8C8n zBpEX=R}OL*{X=Wu@bK_^qj1VrYcC3CBuy^ zi$z)d*1D<`v-t@>*cEYY{x8My2fzRAO{aa6|3BUTKGxHi|I0g-&%yD<8mr{`>Us1& z9N#?GHsba>>go57V)`-a)p2&4!HvTH{!*Bh_j{}(HeV`K&MYr8mjA$#c zOJ@6i6eaIE+%KSm(%Ru9Y`xkpFtySb?V_JoxeoU zMqR)9JN??rQoI^-q6U(kDSn&Nw+(GfE-)@!C{uW@++%2xhBjXMO3f|FE(tVsbXV0$ z^Q?oqzPekyRG8i~)h$+QEoaaAM;5M$5=gxeW7;0OpLcw`a(=x&xlpVFS|2lJPFzL0A;IOYsGmh>s%~8?(OA+l&_Q_ z$X5!_x9dP`8-m+Q#L&r4_gtST1Kbl-DuMw?vLhR9P9t@5R-$RdiUktL-rf$2f7?gfpl$x2!&3gw!K6QU(*Hch!}LFwkgT#; zBwJ!fPPTNp&PU{M(DgpGbvfnx=mT|i(RRdIZrs5VVW}8L5g0fhWeZLHU69Tzr5W3fl@}d zg=_{fB_Z6ZavRR{0UJ2et=nl0PfpfeE-vsjVIWlW;e|k969iJGFY9XxxE$sk++d^Q zAHfV|n7EDH6@U+-8~;~$w$gv;0M$S$zq*X~8R_?%Bz_dn7WzM$PD}n@)4`Me|4|+r z1%lQ0f(96oVU$hRV3b@r_ntx?82ZPZsR`e(_E;Y=FwI>)9Bz^D}*8 z%CjF-1J-$Fnw`o;Kwn>{kt*3znU;<41=uajB59##PV-Jy-VVd~W*&u%(mF~VmS?i_ zC1cA1r7yrP=RUm99yc>|!mK({sWGG&>$JP!Xp>kP!;7jqvJvUqP{xnCXLbb%C>P_A9MlnMa-z|p7H}$-mpHw%ysQ??e=F7KE+Z)NI9bZePX zW7rws4&?dSa!r-7O4)Qu?Vvfg%Azo+t_8@m5-D(OrZf-nrIAD%U}1k<0^I3zcA5u= z;Xn;rrY3i`B@?bJi6WtD$^1Axj?#sHzFLB@YG@-nVJJ^Ey=iXh&+)98>FAmtB z=V;Wvt+J@(UU9U)|MmLl>ovE{lU?AAa_}6`-u6&$ytHS%Z>`roy>IPW)$EjXmQ|>}OcN<_(kVda zk?!|&OQUAk^;ie_Ad1nH{Jr+9c2&aYq;zJZ%hF%_DB>>dl*NcF>Ybcr%AWl#{u=)+ z_JG&vbQq^?oP6M!=3&t|6f0bbscHBQKqCG(&+;AV63IEn8(UbYK1$G+Hrut-;GIR=>NHbS_tz zoI;qMBR=ulY zvP{!NA+d?*-m4&PPr~7s{M3^F=(qhFMU(cR_CLMJz>NPs7)_tz|31pYa%`P&KP}aj zf_rKJKgbd#*rzk`kFqr0CD~n+_+b~PP&jbcQn?z6=dIy&tAd?ODzZP4o2?5w@|2OEF`+q!n%K!N&56`g|Maetx zsuqP-4&oz^E7Gs+C5P#DeZP;`*No$fDFGyL+}NP4Wpl? zS(0Xm3NMA;kD1$<(Tf|6N{u5|42rwQdV=Jjc;2N1iANIG_1hRO*DyOtmMIJP_n-Z4 z|Io8&9(M3DPU2nZ1X<_;Hsxc_6 z2`p8r>vnT5M&-yf=|9mAqeEgTu zbZW}~{lVzT{^L;|MyFoBPkoVNo4Il%GakN$&byO5sf0x_72xrY&Q&W4(@RA$^>}MU zP10;SETCS1-P{+~@>w1m_$SSlW6$X~Qk+T{dth`gZ$(1X%t9{9s735%Em{JaOVRTOQ&?<+q-Gej9hnz9M$?)(fnbXK0wHt6JFa0>%} zg(1Mn60!pvr|NtfX9z|icR7mC5)l~kbm<6#-P;YD;?wghS{B7~mY{d9yK^=J8Rq~T zh{)lL#cE*hkjMpp3&9H0eq!LW&WqkwFPXwfNLe;SjG>ds??+ZjxiJ)`q||^}b?Ho6o&)lG8*3!y8QW#9pS4--Enby`2cePE?jSrH4Xxq|2KvbFpW5DJGq5A&x@MHFO2aKoyE3 z{w^fb45ksYum5)scsE{i`XWbVl64`n9tT0PiU}nNl!8=`1Z#E9joquLZS{g(9u!QQ zJ-Jp(N`jIJ;hqa>tOu1WE!{juQSMJs6OdD3qIt+BDa@h`2z?e#@krl?_pf*(t-+fDHW)-5mb`M{ci3@A*B4*K>o*&tXgD$-hTf#9hKuh_MYzl z9_6ttSvJp#<@f$K;3t^P`96q}z>fqA6owM==pdp!@^6CjV(`s=VTfR?bLn5%1xi!L zE0WA%3^Tg((gc%v2J!C^NPUdoC0U4>|2Tvp469&=Fokgl;{Y+w6bYt_;@_AyrK;5o zh6vxQK?b2#TVns+t2F_`Y_FE$rosM~@gN^q|2r7=hGzcX{%H7Q|M@5nlWy*{z3qH& zU5de~2#Erec9Ibgi;Os-Fukj+wZbs7RM}0Ih!iJ2UegSKzNDiLi`vT-CJYnwbo4Gm z1e(24o6|t$Hi2E>6|NPsH(EbFxA zkUXSHQA*^L$^G?8%_sm1Ge-+(E;#c^Rw@-9nX*rQ948F7Y+&}5tu5GklFz4JUPHBL zbI*ZSu0+>R%3qbR$zRt(q#|2J1$-AS6~ML882PtlES8!z!B^l=sSG@Mg`=Y}@^7tJ zENWU8sr9ptU2Bo1nD*-|U3W|MP+!!yFJyavs@knPC%$8S>pj{sLFQ^VzqqF5^Q?U< z{HF6zcPCgIt0XFxU7$59aLuC_6*Q$t0#M+YC9L4dL+`{w_p3S% zL%2rU(YFOj3Xm=M;U&Lt3>8bp!akK`H90Vgw`ajG)l3yCm4}&J)xfo??UIP~yGBmx zuW4ml=E&BA&q!2Q+N>l}99At(Q31Uki6YCC#ac6)bPPe~C#-f=AFO?5ICXLgqp@80 zE%!YSI^kRdC9%o;^k`FGgEet5TO~0o%ocO4WdSg|tFf!nEN@{=VuEernbty$snsS{ z7~mDtDI-&<%nHTxR?JET{$(>NIl>xbn0BZ{h9%Z=Kvg7I6xL=jcMURko+xZ3z2$FB z_MYr>y?s}1>!HZ41MTG4=w%sSd`L1L9gnv++#Q4G?mz5eV|`(Wg>4DUfmsQ_ys zqvZyhkOf%{lwORI-3kl*S4*ZC1hY~Dhtuu^ae+>a%rD+70FeZNV zeU_|J3`hdl-PM9ec9DLXItyYc;YEd`7l5)0FrFMJ<7SI%u9qmjhH(A8>)SkCmA}be zrz=9IE$hITz>H3_G6K;YimfAX%ygQBSH@&puwozBi?&dV)q9+#^bJdtM+Y^}r@{iH z*+MP~+ORLD4)l9q&;x^V*!lKdWKPrHU%c72(_}H*3K0DpjX=LQb@nYtmbWP8mLXg_ z>_?GfZA-SVu4cSSixn3nao`huiEERtpik*(#hxv%4d9hK=c)bZlq5r89#L>38JAU4 zVOv&W)@315B3OZ2B}V2M@)S;nv-O^3E*U^o z)149AK%b)L$8*n9lO-__?F?u!0j%g|xurqdB{8V6CI;IU#o)fHV&GZ{n$Tn9ui>Cd zhsLVaA%q-O#?a!ksPrZF?EaCjA%8`ZrB6`cN7070a&mlebN=%B=G(LL)0?Z8mv7Hb zUY6PQiJu;ap@rcFD@>B5^E0D;&adGn_LnGdewR(3W=UGrw&S~O-0`_+-Cm$VqSGAT z{4jKk_(clgMMUHaU@U`{uqISIo?HOa$7eQr<)*Vpms}sr!PRi zHyBZBnbSxs6g8A=KI#`-srwt|z)L3=t<<=9WMp1xA_nTM1aquhA zls=4xE%{;SXYDHR2s8Kf(sfW?A5M5b zTxhuhqj3Pu`yYQco@W&)f`R|Aw9m(t;q=vIgB^ z|2-T|&G_G=(c~%r&!aq*`TxlRg4<{XxsS#y$=I7^vWiuv0Denu0a^G=NtmtTom)6d zGU+G9oXaDwF0RNLrx;S{D@+N@$5dn5O>$WuI>Su4RaBB3<|o=~J+CiO;;hHl$_p_g1Sce}NG`n1y#;jIl6?*M?7{#^L~ zi;??Lieh+1-*+>ZCK!<<+kj7>jvR%EpXYDZrbJ|2SjETq4Tjkf=&={Yg~Sm*MzOc9 ziw3ofD$&U_pHzaBe*@3~$FE-P0FXh<5@qL^gqbExc0T{A>U3)6C#K8Rk3-&M2YCCp zDBi~lPyX%%`JXUYB;YT{nm#2+vJ3`<&bUfUyWPM1$A=H)ydQoT($DKuCg=JNMKE7? zELm+rcs>wI72(*0Fe~l>mRC1eB=2I-xdh|M!O?hf0QT2uyf0h$4-hPtNl3rX|NWi* z4Sf6v_?UQ^nU7>L!*v>qD8bK}*YPG<(TR`gIM2VkT93f-$t(PS*dRG7c}O(618<&# zXN#1nAk77?^p-9@K?gp4;<-1{WtUSVo=gMFh#tlm+`TSC`Shu}|63Z)M@QEH7eo0- zj#MS&XP;uR0Qr_*r!j{sHc8&|BYk#Vx=x)=IwwkN(@bWowQ9rqj+Ty#ea5R>{iAqM z04SBP^!`b>bv;exKj9J%vj%=Z)$(7zKc1NJpN50}Q~bY2c|LHTv}-EY`6veY{7RRz z5TMxfY*rl8+;SWRcOs#2DNZ2_+w;e;?OVttW(D@8h>oP!xL8HeMG~Q4qscVvTQ|)= z7K~jJ3r*kDKfYu64?^@6M2J{4n1m?SKCw5Bv6%)nZaKMu z3|eX>LNgd_0;xyKf8HN5p+aiR&u~kKG2LQ0&s9GDRD3&9W~VuDWqVq{D?8h!VuSJe zNE1XZ-khC^9murW`n-v0=+aVpM7RRNo2!?XH}?i|Zva0XU;Vfp1S?hvrDwnFz-n>44^*=Y4uU{K;<@G(gxuVFdzFRhXDm8Kb_U!cR_~z}|)!DbN zUf!I(e0z5C^2%suouII2N+GTWl+(+zw=XYmPL3~*zdd_(c70ZYC-n>UaH5`e29 zn(3fRFXY~`U~|ueW|3N+sdmsdWRf%=`LoL264(`RZ4_ln+OX}naxUxjfR;QmCqgVzp3Uz^xVeNg6}{^FBV}&#c8U>cF!;_i z$0#0|XwOxbcHLT4-8iCRAd}-79arCP>$qCBX~(s?+dFQOMdubga4+)Gk`)UD#%pFM zs4o)5CqYxri%(*_@|U(*)a9fVx2$Xff`Nnb=|hC7@-BERMV!I_%{HvTeGX!lWWdHG zYRvn@FZrI7c9CPWx!c12V!`{9epH08kg1r$}0TmTci$EIag zT5+Ajsydw|x6t0}+^%*1n;pP|$MCzt>ud$jkFUVh$?>a~K*l%<0khAKX9*u9Em^*U zq1<~1Xl72uM|o@Ku{fs8(6=Pwe$21cSW(p+tN@f-)fTTD*FpBXqi5|ejlN9fb5s5A zBEcl}Nw9b@{co>79-H_7!@*Pj&&PQl`Tqa<_37&)5W)x&2*M<|gBb{tWtw2f-?C7e zaR34Ozx3z;k}GzC3k>bN>1dzv?F03O2ew-UWDr0}_GGJ21mt6ek4DHr=KF z{$_(YN8^+gF)Hl7|LgA5x&Ta* zP>uhmDedxGI-Y``NmJ&#%4>_VZ&f)&b%kJWi)Y<+C>SlCm8`k?w>K_FFuj=!B@AHX zV=R-elwQ`qR>8pnhN}o>5|;L&J{(HT&UtDsT0;5R42C>d%fBmYtG>lCF0O;}9~uMK zis%PZ$0!syC(#NMn0<#bOnydW@dGbuoI4#A$|AlV)jy0yV##j86Yg5RuoX#VuFUoo zLqDSoUUY)LwO;C$+hW)dKkk1CXzwvAtGqY@zx@3Hn^K2Qn%u z2Oj}WGQx7T?in{lg^i3%$nA!vtErWXgaV3g>kG>EzD0W?3Vj)9>AJ##p%=jC;T0_3 zls0V2N3qe;2<*yBni7mXrncM0@=8>`SPgH|dFF@Ex*Asen`1SUzqVWrWkB~?4P|J5 z*lH+urC1G?ZZ=*GB^WJNL%xqxB53S z8Z4@1RY#Mw_OWEc0lo6yun()y-tKlvo^uqho8a9oBXPt7ZYjy+tC(w)it31v1e;H|-17zF%&vaDE z|392O<^Oz?hu!~Nu=pdn!cXS8(-eL+)P3xhTZt=}M>2}^@J@F3cO&;;?)#*t4Ahx+ zD&nw+2r3l}nU&Odaj7te!SjHKKy>0AuibHRZIj}C+%}ao<@pI)9;K|u|h)`?uimRm%QfL7_L(ArBXs3xZOGpwV zx`Kh3^1|Phuig*W*B2hM*Db%lvVFKdVdc3MhsOepua zPcyXivyIG)FHXxQu`eAW#D}h^&XOLQFlE#&uV_w$W>Q;J8IV#>oZ9umf^U?MG?9;S z(Oq7w=-VzgMiO87?NO}}c`_}Q(T}}7>n482uzS5pd0t~ib@H@)f;q4v=Yk#5zqRlM zd}3Ad#|xFXtI?d=n*8i}icsGJrHbO7i7h70T~0K~1Fe}UfcZC^!oX%FI?#Bm;Y(N8 zdKybWn|PJan_Xgl(|Uot2>e|uf(eBhNN#W@#x+q|AEa>$N9GmU18ZlAE3j01g(A3Ooe} z)>$V6C$`xbNRVD7!CmzzDp9J*Ks8z=cq($PGI+hnAYLRH=URQ^*9sp?9BTjamNus1gCKc~atll=D>4?Cj173;x3nZ9 zHcKd43xyYgqB-T|3kVgUyCrCP_nDldh2P$dp$fw5czawIU_@ClBCHfHFFbm>)+MFa zT3i)1>PmOZHHHF1ddBhs@>f$Rd;nRJ`g5jk<^|2STcEm#tI60uY)`(gC9`*5Jgx)H zRmmNXQmlq`Kyv3)ZEB>9u?|QnB)L}0R-n9+*v4W-i+xpEH1xZ3;m9^kS)A2!uAB1L zZPQdSQBQXW5A(F+|IHLYTloKIJT>$G52k}B|Bpv`nEq!w|F5MB%5Q%S{k0^BDyMe~ z0Qrfkc z9C(Nh8G@**Z4<$>B;#7est#?fVG~LV*Hu}Wye-5MuCxp2pSg*6-lBd?!!vhsf6*vws{y**bE?$qpQDQ=!6x4*%FMD7d>{2)s(2CFn=s|JRMU@2F!rR6+7 zXl^88ZFP}YTg?-T8X$6&?hPn0o?*2jo4eVpcA}tH+5>XU9*`TRM;= zJ_76h&K-)wBfy;ycb1U&p-+5DCwUfG%Q zbS*+nfkL{4m`lO=Y6-?YJ8G$qoe)( zuh&OkumAh&bw{*vG#vIOOyzEFF!BF47-l@6kLa|%R~@xZed6Ex7y>!}rBSZ3C{8eL z*318cakNZA_(Ft~c=TSUk&ogu$p|H6M%NiFV?A{fv`V-xn9afc7TyL1B=!pb9&r~> zhGWYbco;0vwmQoVol8q6_=iX6fBTUgjB)?hr>88}X{<+AN(l6U_?oW9W)%^S?UA@m@MCx4wZS(&aOicTaQGfj8 z|M4h~<@_hlcWDx0nLAv1_k(;bY{0@_L*RoDM*aqdfa0;{F|QOYpz$fMfZ!>2Mn%My z9KPk|sQB8UtrsD|JS{-DEM&$7)5C(9<#=c?&lMZ&OUzwmPg}K$35q~Ezd<;Iez*ah zH^4e><fBFPE3x0jTC-l>&{{UeEa0For27vyEp=V3iaW*?o$VCP*jLAO@mHl#` z`_TWo3czjpzv0M?|26InpZq@_<@vJoe;Q+GtpYTdLrw1Rn2NxM&;iy{|E2TKq5M-= z=r;YI=s;a);?F9umd3ZJ?i}4MK{Fd~0M^#;){4O#XVxOF@mFgGw~kY`+Cn{8z*dip z%G>d1IM7aw)#5|-+0k0JwbHO|-`(oNKVU3dRf&}}@nIB+bs)NQi3ZZ`OXcAZRzshr z9C4J9wbZKFfTb#^e5*A8)ljWwPEWg*>MGYBrZty}jjoB$*rZF*_IaAMtJ}Uf654oN z4n5pw-Rl308o9@PnxFqN7@`J;zZ(Ak{hpcsbu^ef*?&LE^JSg?*xI_!(T@SJp87cG zKkC58TEG99uK=^<*caZOu|vzzi#$Gx*YgZyuzz!c`e27c2Da(|rx)0A$SOl?bF8v7 zS#@06a^7LkR6fmLOor1#jYTVH-olvk341t+Uu=bk5%w#A)ex^)eF3JWP|cCqObAxG z-57pd(f2-WxCCChk{-Mvmzdk2u_qzxpY5q5|E&m$@cxYmV2PTBf7&MhO(uhK{J*F8 zPml93|Nk{w9&sNK6hTVOUo0tFf(1O{&R{H(-OeQ>t1JdSz{!k&I0@mgjBi@x4cW2e z+)!2yt%bW3KpsZv4sJZ)efRpcSHwr!Wij%+Z;vlM`tM&o5h2MXMLJsOuoN0_2D1!? zr>hLb^DCYO1I6>Rd7R|0U%rRIin)>R0MHQ*dN2;4yqR74Bv`zBpJtGU*;j9DW!lWH z7N(g#NlHcOBs&6UvGSS^^QaWPMMOsApLIxizI$up&XTvuJBa2Bas>Jsoi^ri;b-B! z=8*#Uyz|IgpjD)6O8se6WBFdgY*}P}`t!_X#q8Z<;_^A8o81E*-z}eI20cADC;S~q z$2Hcb>JV0sYIGHVildNpb7JeI2~=J~gKCMRXrq8>5=#8<)4yYan$Jg?ga$oidCOuL zlYB1Vdy@G-(M9`89yDdL65|W=o+I!*$^DdT%#+fE{J@=eLOViwpj&*%%a%H!RAFP< z1LcmkC(Q-c>86$&j~&7F$lW>F=1p?v%#!0SKf8CA8hQm5_muN|zXwVl%elAnG9?=Y zX?teTT;%rCw0pO@g;@*<#9fr^=ar7Qw`GCgQghbWT=p#5Xg;#*T(# zsgKa;CZ%TrYZlE#39<}R{v#!~IznWEsD^y(;dZ0O)&7{>Sg^gv+l|c`Y{$Oq9&XQ- zl7!dVaQEMCmd)03tJU6UMw8`D)^Ll}*cMu?^52vSno0Ajtc z|9N0nWN>FcFO!5QH`zW}bV<@B3&=|YZyqJLe#F>j1p&}o$T?tPt1Tm7bn{l#1kZT| z;?Ipz^vy>=k}DP>KQCDXfjMH#!)S>CsysPRu&mss%73Pj2xB2(!Wq!gv| zVX`l$h=-+9qH>E#DQ=H=T^OoSnphDvQ;s0B3m^XoH#w-HZn;&x(Nam}#A}(t0#3yg zDuq7h42tD{%JY{q!+&rI=LnN*Bd!ktW6WSTglPr?pTO`4tS|)nB=MvWY93q^V*>qf zuVNjfMR8+Wd`M>(v8d5K`&DXDP>pD#b7Es&NIHO1OP+ zWU0dab_7}a^G7rPX8d0W?GMiXd*h**|Dit`KG}af%F}@V|Ck>l049DM(nB|26V9bC zmW(W}s0H_SjY;k)HOPl#I<^2hzWWwq8b7HI9witaW zlbx-U9T8hlQC0PWCGMrn^t{{(8EwVEf zNAm8@8|=^Fkxd#XRuDf77Xkr$Z5IXDtJ;U{auWtYq{GvaU-H2iH!&oQ|B@vj6+N;mF+oy+QwJ|3AjlVE_Nj=O6gD z$%+Wob(TaCQ(^n_s*Rs79Z~+;pI4~=FO!5+?QttKRY+%7#HI%LBgo(!zW)xzA@Dlc z-~JZ<`?HUD;Sa`>BOX5c=i|%sv-9tdz-2Ki5JJMW)Vm)(09ExY;=u5LFMH2H%0wI5 zwjhm&$MGjw63?Rz$RO=LB}yS63Gmkm3d>l;0I}=WED2XU7blF@C`;lcj7fLr-%&hE zz=DtzAMNjlNr1bzh{XO9b%SKNpXbWO`-|jVha~$eMze_@haJ&MhqlsDN~+5DFM}vO zJ&*R->3??tqa|W?9}m#RcKxrR|LKp%Pxrr%^Lzy^d_rIrGwmv$a`0{eV{p4dQAnv$ z>IZl124m+dz&r&-=5Gw}0!9&_XFG25gW~yfkip0&Xbo9VdF8zyhdW<^7>XQTyJ-ez z=sgU1V5|SN*99z7SQ4|Ev`Zj`8Hi8}yF1;}tD7s5WN_yzaKhFoczbdMLX_d1?i`VQ z_Al@LPWSd7**^PMzF5rn=|A!(UdQ_dpj$tKz6z)g#JD+o+ZESbk{gYLb(5DAfWdBfAYie z`S&khz5c$t4Da7Y<^J#Y`s2yO-2a2&ll=E6&sX4N;m30rCG-Eh&Hig=XXihCW}EOr zNL!u5ZofP6{_8*Y{r}qe>Z`B7FY5ch?@C!@j>uwl%cKyJt)N&>ewwmHmHHXnS1OLX z-L48}59|(lgF&Y^?DVI5JG3F%GrC)Mz5y(~jkr4J?!+L28P_H4IJ!J`ba~vi%OkzZ zH>Xyu&u*B@mO&usiG?=z|_Uz@U2#7f_Eb zAl}ev5@6bnABNytl!f2=83aBCKF|7wZdWA9SW=+d)tt4~JLolPt#{DNTl)^Zr;TNB znXDoBHOYSELPjE4zMsuk^oYa9HEFnbCl!l#;F!!o+r``0=W(FSW3L?{=#83PR7 zZ{IQAe%tZ(^zru9@lNsyhCX4-DTm6oejv)}C!*Vp?g`dF? zpj4ot9(^g$Fm$1z=RiZR9U2b0{i#l~dpaJ5#yeFre)+75<@enUdj@7WQ-`)$Dl|Iiv0g8~&CQWY*{=smdpE4YR9 zEcH$(gSbX31Spnb4P7*XJR*WY?thBGEK8Ogc^O>#i0R;t(-d=D^_ua$UeCez_`qDa zYDFwr&Ax%Ff?N(dgM&8YvVYi&5z+D$W46&t{-O1ld&Zdi>X^sI`UsLNg8`w7f|Cc9 zo6RI0Y}}K20#`on$*5x7HVVN%v>f-OG}k?K+@lh$jFRBaI#{|Ff(+7yKtFR@ief}^ zt);+6y(ud2(Rbow;#voj*6Uzmtb>WZ4hAMZjxkdPU;mW_Rp$;{{5pvZcGz(8hwjOr zxF&zndh*BW`G`YO2iq^n31JBQ6-go#-_cPgDW(1-0Vtkl5Mw^(K|Q*Yk9ja~j(Kc7 z#qbZU$2`==JXQ`egHC_cintvdHX`V>e8rd@%x~P9`Hc4&#;uvy*dT0UjfwTzF|mV5BcYd;uNbp~c#T^VudzYA#v1Wzch2b_Od3hJw0vEK zNB>~laNmrp_Kkx+j$6~mk*f0IkW_q5+TnB5a1D(P_pF3CX51C|5kPT5&}<{lFC4MW z7|+4j&3HyuwH*J@8nHU#87Z2%fg+7JL+r32K^nRV(#XYlMy(mo$Y4Aph4J(|!+zs2 zix2GnnT>zYaH9?!M^WBc*ZA8qp^?FaMhX*B$1m47*B}3S{`Tzj?D*#G+11&%uU_7q zzI=Oj^785kcq<6*qYD|4MIEA2yNRj51KKT>EO`3Sz%%vm_ea? z$B+;d&vB8^f0ktOEm)=C&DFOcgliN)H(_v4>|tw)Jv1oxP@~xGZc+QwL8D7BTE1ez zIH>xtHB}#!Hi=5r`&O#{{hKp3Uoj-_lI)JBM&pBRrW&W^*$E21XNom7{T$_gv>^tz z*Kh&$+|td!wdn?}H{HP4bOU|Um2k+t)1nPs@T(NC_&gmyo9CuWV$cm2PS3q?2CmIA zXuVkm#%3Aln`K}SfG`R81uApTOETg|REn9Q`O@cCQY>F1A|UlM44Jt)U1PiqL&&7x zOx-r=yVY$2*G?L=-bwuuLV9+DC_Cx;`hT8-tLxLVbB2Pmi|_m;q6 zzklQ(S`NF{ooK`EmxpcbO3!Mw!#}j{iY}q{6vLft4wueC7SGlbcmCd}3zvqiVSUhN4SG$X&0shj-vT*7Uy zwQ$=r_;ybdZhME8Tiz&{vr`v$1)@WoG#uijYKRWD+H1{Ldj?zWX>7IEPH8Y1H5~J( zYRnF<+H1{Kdj=EfX<*^Jm<0!+?4vU{v@uS}AgPGp zKL;6%lQqQygHF(G1fPpQRx%I<$Hbr^VH-FJ8|}6g6ZAuCOlZ86LQ*l&?f^3BH)LRa zCj+A$bd9+s(?0AD#>SW@>X=*Z@?OJv?oDgo0H7aQk9lB>d8m&0 zz@mVWRvY0h&t^o4C(nGt$J^{uWjt|Ss?g54#@kXFIP4Dk#&`$T@z$N=vV6o*k)ON9 z4b6APZu1@5c^5ufN(zVFLC?TPU&Ti|Nnt!}IObv1nC+4R{m^#I{X=8Ss-)0wr@0^Z zn@NP@zEdKk9dwMj=KY*)%m@0I`-j#si-jx&BW92pq8T&OBrMY{SY^>)Fx&OQtqRCg zcFy4(xQ0^?XD(lZsWGGjbx6+3h|+~Ho4$sue%z}d(|wmn*KaM-^$n4(uZna%lT4Fr zBb=^%fFaB10SoDNo+Yc4O<ywj9-rI&MfYFHiweiHFcKChYQp!(nz5$T)3$ID!iNQUNfm`MYC=}+jIf@VHRw7h!a zF@QBR+!`^%Ehn&Ma^+|=tN_;V06!W`tAI7^*+A==m@AEbvsDw&qGjI#{gZzS!>zM5Y5KQ00-v1habK3H&|F$`c#tkmryvf2^XGZ1_GFo4i+Kq zlUO2!qoUcR^T_Svap<@SJ8XLqcGxx4ULzG1=Fx(iObcm39sna0-$Cc`&!x0#ud~wo zJ5>AY)L7_ib9m6q&~A9(G_*T(+*uvAy|OwqSE)7 zKKf>o_OMD3>l8ZLj^5Bn_0`ckl{4n_HnVmZx}7Hv9amL{ZEva$%<1h}2Pp5U&X#Ee znavAR#$dEeBQ!$+3os=7X20dp(fH6C-Z&54H_iu+xjkq*w+H&%9_Vx1FHv2b2p@8G z=HcNQQ9K7I1{h{*6euZW93!w#-a*^RGhBTS^vNqb0Oq|9R+uEq;vSI)*r#klj0AVZ z^fe?*Qzv0^dHuF_`Zauhr`6LZP0`u1RqfHaG1gCh3Ko7GMq)w*OJO)@=ruNUdyTm~ zfLl8NPju^`sbc};}u` zqRUg}(m=70n$j$}rDwXx-!Kdiw1mluU&z0M{vFH!-e3Zk4*T7SLl~O06^16dFf`GG zA@}u=!F|RJxzE_ieI^d+Y0_4Dn&{HgM3bKSP7gg}fTL#O>~Q21XD1HnY0_4DG92_L zn)KujL1YZDp=;dG?HcFuxo_=qZ+P5KG%DP82VTIC$h%v9eX~xY)e;7gkCu5TWFFRK z9sEU*oQD4RL$^P^%N@V9H~v^Zgika|tl&W*xAMFqueTz9<2tsC9Y^YM+avW@KT?mi zBelhio@sr-Dg`WmL3iUXxw+l2;ZbtPj*_l*-tdS%-`pRyuCWN{t{BV~v%%%~Fkt?KNB_y^2*bXclIV zmN#{`+%kga#bC-4UY2{K3ZFg{&s`|CbNSXmEsU5JV~xuzx2d@lj}t~dMff7PyoDJ^ z6HMkA#J@)%OA-Q7ALDmP7P`h@XXLGeR2VTT#u_89d*wEmHj`8aQ>Ucj3Q5sAB83r< zVyrQ8ODusaelp(Vjzv6u8a+Bc*JNrTYO~8TnHPp3ktzo6AwKr9^}qN zF<~+0h28{SyglL5Pk(KGxX=-!B7%qW5LbQv}cTN^eF4a26PYS`58^lIu02a{$B z(ZR&25FNVAorW#VomkDOF~|dTkToxy1`SO!2X52Mq07c;*xJTvXxKOnRU0RDkkUl0 zIL?4LObEM*?6ciXg^e)ANy=5EiVNsq(o8HGOq>VTq01_2*xD*;XjnxJRja68XW%@Y zi|iQtg-CM50!Q?uiCc)~5EF`_$#giKjV2r$4R0U^x=ls3=hI-=a7zuVwv=7Q9=5j4 z8XC4)L)A8`3f0Dz8a7-{!>aXUmvV>qwaw}o10AUY?HSvOr|;&PTgol9G<-~2=Z1xf z^vk%1VoI3AfTz-97;5NlJ8-+(4t1k04MQ!3=wY`%Ft9UJuw$|Lzu@T*Ixm9=r5J+L z&j=Vi2Y%?M>~4aEb);u^`Xi8G=NT^g(`NgvKdrD~>NmV7=<|yLn}(jx7S92Ml9*je z5TC%=DvB^9&e^aF{PaWX+2|XyF;Hj2yo)|b(hblPJa$X>pd6;t z+@E1$-0VctA3IMpLx%y^u&n{tuxkjghbkJ%`f7TzTl*QMDPmdh6Aj6rzl=}}L3j&R zS%iTO9@5>j z-_Y^3?{<70Iy9lfwwh2QoYt_b3XE>|9d}T?enX9a->va?1>I^LbIS<1HSDS)o7->4 z;F}Hg=Y6*+mMg+m>i}Cue63+u71fwGzP%eRv8c6FWC%sWdfjlz1MS5Dy&Hpi-Eea9 zw%suKc)f187-ma;IWQ-sSEn1UI7O|)6d6&92KuCooZYZbO6$NuM%Q5y*k~nr!P5Zo4(|rYX%L{vEi~scZTt4i;Z5luZL98(c$Vx&vmZrwLaJNjB{O2 zIoI_Lxq+{vEB5`;YkjEc8Hbvla;VwT75nt`T8rF0UF7a5B6oF9>>_WkoyaTn5`A5A z=@oJ>?aP6)FLuGT*H&=t>4Iyo5L{_DCeCiy1=n6%!PSU=)hh(o>TcM@$=1QIdgi1| z>UF~|2eppPWQ1nw6><>mhU+xpijUMXJW{?+M|xj|_4?wXBkjqE-i<-MZrC|Z>(D|* zWT9TcX{x*7B4zh+!Rni~EiZ1)cj8=cP%4;{y|sf+DSTeID%!FH!6+jS=k(T-?`&F-HMUDwZ3 z7dxM}X6I9boli}6-gmfXyh9nBuly`zdB9k1usI|m|BuyVgg52teXH%uYW9rYs~fl! z2O?hGao@kU7w5uW5c9n6?;r@1_%DQA80>B!*#pUnfMg~T4m*crqXg5|Ld{ecYNn=8 zQyLMiA3*|Hu6pL$xQbU8hWY52{yyJvFlNcBv=Xx zMpIodni_(UBRnaq<>*E$4H&IB(z`LPLYtsHejF!+xeL8QnD7hXCB2inY`XC%m8%6dxoH_#gOdT@gw5`lI)n&%1Av4xg4jwi$4>;u30eVzs6jwS+ z^P6~%%x3l&huj>4wRW~lvt-RIoY-FwgfX93xXJ(ZbK3U{(S~!25p$IZVXXuB_Sv=>?3>nQR!FXtmjghV5V|<>( zmr26rqM$*hxhs*5mCSP4n3!e<3|AtospHf)ZF}mQ7|C#^#)+?pR;(`5ONdFf3J4E+ z!4^BqeM4!bVjx?fs#wY)l3cHuKi8qloonLCs55DuQD?&PODLOvqNLO@(2}#LBqMa} zx%=?l0q*#uvq*%w1V7cgReRddhx&P@=Zx7Y#z-J0h3OLF z7QcthB99!p0*{CeI!E1p!Vk?sJ0@I@5U@&xC%GRn^@3*4CDNp@7%+Z7R(=$1=px~n z!48`_{2elXzkmB;9^v=3FS^Q6w}1Ka`1Gfj-DUV7ZS;D*-efdl|L^sB=KuTS!QkKe zqd|W>9t?WD{=fD5qse6QZ=m-et#5f&nE2Vh_3qu4Ik-Q`^A$J~jsTS0@9ccHin*m* zgl;oG+b~{zovq-Buo2r<;0iHE5)dU!H$(LRE=Fr)G=__*`2qdXtA|Ixn~#IxMti;aV!X=mq}A_HOI zgCAhD1g`{Ixc}qM&&QYNXXoD^f$Ja6uE5C;$CuaO>DlGWlj~Ri!&n7QJf9c07KidC)S&b`NtR%HOXit+9dG7FO2jyA<{8? zw;wE$1jD_ZPN%bT97W&~%@+hyp$TSd7=jMC)|a+0fBk}Jd!5Hl{}(V?cEnlv{!E~f z{`Y&sVTt}v`s2|P{eO&y(lBmGODRj|Et~V59c5i34AKnIbrNkD5e_L4W+Kyut^f1m zD`9aV$%g}hbXQWu=Xob2bhtSAJuWG46 z@FS$u{d$v9>MpTI|KfULmDZPud`IH}J0HRIU%^L!Nk%FDNARon=K93@6?_C&kbpdS zC%8sS_>Uxp6tZ$SE3$ink3tzqfqeMHAh0~38{o$q>v;}?1iWEJJf#4yu_+`&zkbEYC%Lg2^XmR}EaWv}V6O6e!1{B>l`cz;_Yp)0vjy~v*Xj5xvhbdJaS}uC z?{Y;dh@`EtJ%VBg{A|v)C+^Zki%|%RY?GbN3d5`u`o!;qC}YSf97+j@5+1ROZ$%DX zL$U5S!AEeLBy=)=o%s=lwC68{=4}jiT+3Ia1?vm8z*q(EOf5j&tp9h9`Dt;6IMS5Qta!~J36w!6Y52Pd!inV;2 zga%6)rWCp)N#)2Fvbs`}>n~XXph)HtlqAmA01^7ir@V)0ORuhepu5K1a+f=`bLy-RR7OoN{dWw4gjN&Mw?2lGkp&+A(19_n z8JeKG;O7O5!EHho%Eb9RFY9xL=S*~nc7%ujN;4QhdX|6=(xrFpir-q6yY})u!fd;U zdrdL%^o@yuYk5)v@O{cIvJg9A-9o+*W0KP>2!2K3O@{qnD~M|s#q$heTw^c#F%X3n zZLmpKUCjswZA&v$pjTVTgW)xAar;>Iih#GXu27{gHb z;;00TFv;p{2I7Qpza+jY{50j2rGz8)^D~yhxJL zrfk9Va!>`wBU!Sd3!A+bscQ4!C5SB8_Pt2Ln%vOR??yB|@8LFru0U@`&hwT`TCPHV zAWELM)sT+o^=eY_G)tDmN6`Z;l^m3^RC4(!O6FX&#tX#a_A}`|O72keWg;6YNiVs$ zl6S=}tXP3HS#t{f>NTf8Z@1?1mdrJ$LVln%m$%h$&E@qPuDLE-6lTBaT1$Phzl6Ml2g6qU zg*bEjBK#}*2jmtS5^a2CvAba|k;o%FT>@_}&b#j6bn}a5opEcOr=9qDfr15FWO8lM zn(~NyEBLN{fOWMc^Z`nH3>%89z!!^F-VZ}60`moM3ukmqkc^ci32&Y6ET1g8Y;hLq zXk!o3-6q0%l)7stI?V|KGcs#N6X@QkNe)C$ABc#3{=QP_&O$zl6Az3jMA6y6SlM=9 zU3yfG`Ne@r#ZEGMJRr!AurOhWX{%zqw5cm0?C!F?!qQZ9{5|kGj%3m+8Ho)b3}BqB z<_ohUraeR@ain}pHm<0M2*vXbTywSBK0VIP<4&4{oj3{M{#UZCjvt2|KPIRn-v}Zdr6`7HY$-Zc z7cWw|xC$WMbQMJxNrVF9YXmSQ%$wjlf&6hrDQ z3#(S$lnI{ra~`4FfKwb(D;J5X268VH16aGo zq8@MUE5>Z5!KzV!*J#+*Sa}VNy8UiXE}_}s#P84i+k?R*4E=-I0qg~X-ne(``!hHg zPX|GNcsm&P27YkR3r76`JiLYBpg--;4i6@W=b3cEGcAJ&RK6ah0Lp58Qj55etj>P(O)=-zlc6{^}Y)6 zsasfI+paH;m9O;t7%JLL871EeHuQ;afmhUG1(<1SOpJRAVWb&4dc5^)h(TcTp@w+I8eFQXb^NcKY?E|VBTQqhW4N@K@ZCA8-K zTXbvqgf*?eiY#x|ccPbewMaD4rfa-*9X#BxoeVOoYB~rilY9if_GugED;8=unSl^u zL{FJ%65?{@HNq%~e?XX0+E-}FRP+MSkg3Kw{43@H!%Kq&FAgGJ-hi1f`;<4#T(Fz^ z89|(vDD*W(kwk4}$wEB8O zREi{UzH!0Tmo8YP^UMz+$g6#qWZ*P!8$YMAHwxupgi5}bGR4-e;0}9CwWjrwYa6b_ zBwRr&px5y!j39yK>ILX7IAu$ef&ge9v$N^~;nJS7i1qm>JjdXjvb_?hxY!{{rmZU0 zKGPzc_^E%3B18~0HofPEp?CDl-=BM7mZbDAMg~rbTWV(2K-a5&Xz2zj%w$FAp;De0 zzkhQ^x3z8sLA%3kMs?!w%ilGAtc28MrAvit1lJ~#(c`m$4^Ee*els5yG{sv?aC(#;$7)MER zw@T%GL=tnS4n=)}Az7tj^@cIFNW5aNo=S@lk^t`{T44gS?@)$`2hfb^bI$Y255VLB zwvDu+KO?gEftR$^qD+nVgtIkqkbi~ZJM0!V_JyFq-J*G5E}_nFE0T+xN{x=SqE<)T z^PqUXFBA|RKjm&ebgDa|;Qm)!-%roMWC7*tJuya`I_f7M#rA%8!F5SIyJF5;l2#mn z<2`Ww*CX)e`UHHt2QH4Uu6{l}0)P4N0dy}#aD8Tv`RUVNz)4YnJuqH>mnBQ_3xIA{ z&INm4V(;?fbsAa5A-^(%AyMC6<~@N~>_=xYf!WLtVEKIc218*Hg@o6wPY5&3VHXU{ zl7jDhB!P6L6(`->@B9oN0cHwyyGeOC@4Ew>F9O+*%s;jrZ`o0len17`k)mjEi9(6y z?M5C@y5J(W7Lz26cahR7+TJ`$ZvCh`TSXBi3i-jOf=$AhpbRn}0@@CW3$Z~!Ls$^s z@@7$s)oIX=K_ZLD5%Aov`Sq*lI)hBNGK&fBm_PNqkmg0kGZ>Q$@wfYs1pBlk1|6{U z)0B4W?1GlgAQn~WcSd9HzjysG?1<(&Bw?y4NP-UQLFXMJ3-)Kn=l$N_%SS4SmIcp0 z7cLWO$s(k~CRy>=)H$^!3Ha4PCV$PFEU81qTpdSI@=hv)na&)(r<4ehqM9@vqOeev zc0<6lt1eKL!a}R5mdPuc$_K56)C;g*S272lCO)xGOmgDdp1hRLF+dk7^zjCyD7cfy z^BHrkmG{5&xc(fVWtwEfkBMVvN{fuGx&&JF|7Y)7pWC*TeLnlI;AK8Eo{?x$qF$cU z&N$9#o4IkSv7OU<=T0XANzlR#Md%QuQ?)1m`xz`A1YdgCa!%5TJ|vb1>@M+GEEc;z z$ijH1JE1K2P;bHtk@P!7$1z29_@f=WUwzcnzBBy@hd|tT2zdWN?0?k8q{t~>klTj- zMUm5lKQkIeXlE6F0+&b8Ebob^An?t@RrP$7iaT?eS-V95vG)B)e#g-jiJ}B^?ao@Z z#@Z~P%1%eA*3Z_8*OgV?WHnZ;SvfWK;knp%(<1`YKMWzTaEx9lq zi=%6bhsJtWD1d1YAbSd>W{ccu8^G=f0NW=n(C{y+CO z_@k;iU`qD!?`XA7u#?abC7?*Sl2waK-32CRDVPgw6G5|s(|PqrTaeTojxCQuzInVl zhb394MHuA~H>^{dTYNE8SvNm?Z+VXA_uYLMskpMP6-QYPV&to-4W%`dfz*bCiF4%x zxI*&j-dv&d-dyFE5+-|#v1OJO@oXx9UNg~3O6E#2b7KWbQnRKEoxZph1ue_&tD9Ht zYDO8cit1OaWE!u$%aW~}CkR`ph`9~BqemNzMDoX`Wu3X=mL1dTI;mGCB^)bbR8o?$tH%rs3lo~zGP_Kt13fj>#hB!K z=ZDk^???=(lAp%9xL@}(XflllB#q0IINx9sp~d7EN%7J zxH_bHZYv8pMb_qq2&e0UMD|N~vbwUB9{EMGJCMgB0xkvENk$nz$XU^2#GFpk6FWbApvAoRUx=tpQUbVJ`AAb&aW{sI6UDoWpT)(jVU;fa?rE*SbWN!BBllLu+)cyTLU=XR0q@%|or4T70BoS^N z8AY{qlJ61RW|DbWOo8hYa>9-v7yo(BG46wE?@8Vue2q*Bwra!j*p@|%Sp zXN2q-38I7d4bCzMqDxwpTU(d486wQONIPN`yP`EC*}ldo`ZXgt{v{2CZ|$NislC2s zlA;JYcZAI=Y*H#`C|Lhuv0TvzYXe&bii_sj&?3{f(#VA4?7t41&Z72NDOF$MZmQFk zKIhL)JKJJ=yba&oRAX-D|G3n}+DSe@k(<2v~7abxo=76y2xLbm`#6{rK-U%CC6iqt7E zw$))mrnY1q3_CZ>ysHu&AGEud;6S($5HFkYS1|S~;pQ^KLT-(#=BraV4_%!7jlbi2 z8o$q%_`Rt3!=k4h?>V);>whN?u$f6cDDvvSFp}6h`{2mCUNx&bxMdhc5Io&7yp>ue zvH4Ps)B%gr=$HG57A}nZQ5#aT+3Y8xGgpx47#eH+pS*SD}p}w{s^SsizH*^9*oK< ztzj1VRvj=7J0xs|@vQGd6~EI|-(^0;nh0dydqgo`dWHr zcw?``isb9PI4*6MbA{H*zujd={9Qh#F{J*hh}o4+m)%PBucJN9ml6%tT+LP+QMSKA z>*l`GSVhZrlx;4uw3OQ0Ex}VOR~R&X*~$A13^B?&MukD`FEJp@_xX%H;RphpYG*Ev z7+#_`{vrAC^3bpkF_@K=+%$|K$RQw|Ib1(emV;6i3HX$x20*M1v*YrfaVjxQAkmZR zBUk~!+~-CiWm@`&2>*O3WjVEOe|hzbB?C6WjG+~j`z+c8itznj+CVppkmooZ*CkO`Cq(%E z7@c5p=x}WPXHryKCG8k4pL>+FX+?GLRa1%}!a*ugGhsNN8<*U4gqFa8BUq;9jW{CI zDqPZ!skoX0Zu@OzB`mMK2mcKe|BQ2>lur*-DZ`UYh!%EV_Pj6z{t~8#A+e3a{2wfQ89+YvbM4gQ}yxpl$?Fzt~Q^N0|iE`YPtG6!*)Yyh_k7x#P2< z(^~xk`#metuVltcVZYR_e{_=Z5i^6=G`iS{M9~5Zq0kbm^&f~aVGw(>Km0?Z*5Sww z28o+)6s^UdcFca_hPHh^8c%!b+a;h|iy$fc-2MgbD!U?Vh4OG|_iVVr%&Z4Lykj_% z-_2W$pj??wU5!vx!dXf>H7e%%1+p9^U8sOyYJM^&s0#g-^_r))CDCmWBNEc1n#n90 z7U&vaH$ac&cNu2?Y+#lutv4@AYz?F>DSgIR+LGzkKs)0tx5V1jh&?Ra&S2FZYFFoS zK(t+1bvN5KR!#gS&vynTfYWdk4+s7XyAyZj&+s@H&-|f3j)Tc?HVXVn9L7;RcKyg3 zP7#XY00sVF?9F_4?0Ie&@0LnO*=2;n%-)ttb16=*R9P$3K@??TX3p1SNOYH=mNHyZ zMu>~7iLPO>$1zxr*aujh#mtA0Pra}kzbE7#r2pP%lJm@r75B$e1s}mSDQb9^0sUITh78FmGeG6Ej@I@K;`< zjZQu1%|5e*9e}K#Z*S+ariwUHC@L@p`13RV&y7yRKQ)rKRGl`itafl(zd{3^#{`Q@ zu6bXx(&N=cr>iuVqax}=SR;o| z&UyRkTmD7!K{0?&PiZc_xB8^M(KmVkceT(pju6>raB51&9i5tNV|bPf_Zpw&n|3$C z=N+LX+anLrYMUKxjMmAvzRHt~QmI_Kn&?J8-Z4TYmE(?2NwhIK6|=p@Cab(a3zg40 zE)~-wk4m$pjy5K%L|b0s=;IMk)3@878Vi1l^=T4%pzT?Oj&E3=6%L2kowDLChD|0- zi*w)@ptIh@!|pT+qsWWKp*suWc;?T-;UvU<>`zAHV1}{l4F~Zwn)>6RH=B-Qga(7* zXgokIsU0kd`rQPD1JM{ z7ub@tuAoQuf``%&b30tly4>Typ%jRUDd^LJLsgjUvW%OGUpHo*6j}d>RwN-UP$t|^ zC2K2I&tYnnNBbhZMdu;Ep5OaD{_nVx$)?Rvy8$eOn;eB78deHfOS8=2W0db%bI3V) zRiH%vAQ58pFHKpFiwjdBedKhp&OQ?t0_`;~ZcO|hlEyS!i6yTwGX&9xPK#xpueVJL zp#IRoE1-(DkW6WW=N))Pm4FykPK0DBUGavZ=p{-}8sZEVgtw}k>H?W`|5zME4OhzP zK}I}(iPNp`)`in_s~RR1(A-;T90;ldbax=?bOP!~A-Vu{#7OK!)9HQ%n$r-3HUc7rXUpSW7>GL1to_~!#rWUepFXt6t zy*r$jGZm0f`TTiz{RW=GyfzM%w!Ku2vOApb8o4E`pHaT%ToI1`imHbOh%>qp_HzlF z3s1m}uqX*GAjweObR?Y!=J-r_=o%H(^U`(&XlU{sda%jkz!}3TcOg9hhHA&GQS|qmIIJ7&LoY(wxunb1sWfvk zj0yb>{CYDsgUUab@Sf-BcRD%aCqMc4K$O|Mt#TtkctwZGfyk!aZrR_j0b>JL5Z zyGcu|^v=*oZa95hV&3N_KBpvDT2pFg+rpybg09;}glCnu*nK+c-d6^(5Rn3RmoVTx z3kf2GDW!!Y>BP%T>|qV4Xb5=V9NcQ71KB)+5coz@zEbF2Wm_6SL*n9Q8d+J93RFu; zsdBrDpa9+M++`@lbDR+fouFxCUU%Ux^oi%TgU>clVpY(mjQE~hOQuPXZviKK|KYz!gx+m#)_hZZsR5Ik;;9SYx@tV+);HC5&}5?B6!|^_`u!5aNgb%?d20ao z!Bgw@_J6ArOWq{%r~5$vB?k z*pI!ypZLLGFbJmZXoB6D7a%wA@hBb-X0zE&$;2th$wiV_*W_-QGwWL1FcMjPSZ;5# z0$;-WTJwzZjy!qx?Q_6Kf=HfKZW2CI?o4MD9f61Iy6)Kb;eXe4>;Jp{#C_)Z18+1M z3|!ZH=6a*C>pipFBk7p`H5xqt(=A@{FjsGrDK?H zPwol+cyjVLfVf{~IR4&Nt755e9Gcyoz31AQglBn1?l(@zm<@Z7@9iA_o}a<@3@6{) zEZ-!UEiuk*>+FY|KwuTcO1 diff --git a/stable/snipe-it/2.0.4/CHANGELOG.md b/stable/snipe-it/2.0.5/CHANGELOG.md similarity index 82% rename from stable/snipe-it/2.0.4/CHANGELOG.md rename to stable/snipe-it/2.0.5/CHANGELOG.md index b6d1eff30e8..a4c77d611f9 100644 --- a/stable/snipe-it/2.0.4/CHANGELOG.md +++ b/stable/snipe-it/2.0.5/CHANGELOG.md @@ -1,6 +1,19 @@ # Changelog
+
+### [snipe-it-2.0.5](https://github.com/truecharts/apps/compare/snipe-it-2.0.4...snipe-it-2.0.5) (2022-03-26) + +#### Feat + +* Add filerun ([#2242](https://github.com/truecharts/apps/issues/2242)) + +#### Fix + +* adjust probe ([#2270](https://github.com/truecharts/apps/issues/2270)) + + + ### [snipe-it-2.0.4](https://github.com/truecharts/apps/compare/snipe-it-2.0.3...snipe-it-2.0.4) (2022-03-26) @@ -84,16 +97,3 @@ - -### [snipe-it-1.0.0](https://github.com/truecharts/apps/compare/snipe-it-0.0.41...snipe-it-1.0.0) (2022-03-03) - -#### Chore - -* remove fixed env from questions.yaml -* remove PUID from per-app env-vars if set to 568 -* remove empty env var declaration from questions.yaml -* update helm general major helm releases ([#2021](https://github.com/truecharts/apps/issues/2021)) - -#### Fix - -* BREAKING CHANGE Move some env-vars outside of env section ([#2010](https://github.com/truecharts/apps/issues/2010)) diff --git a/stable/snipe-it/2.0.5/CONFIG.md b/stable/snipe-it/2.0.5/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/stable/snipe-it/2.0.5/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/snipe-it/2.0.4/Chart.lock b/stable/snipe-it/2.0.5/Chart.lock similarity index 60% rename from stable/snipe-it/2.0.4/Chart.lock rename to stable/snipe-it/2.0.5/Chart.lock index 8a81cddd4b1..1907014ebe5 100644 --- a/stable/snipe-it/2.0.4/Chart.lock +++ b/stable/snipe-it/2.0.5/Chart.lock @@ -4,9 +4,9 @@ dependencies: version: 9.1.15 - name: mariadb repository: https://truecharts.org/ - version: 2.0.7 + version: 2.0.11 - name: redis repository: https://truecharts.org version: 2.0.6 -digest: sha256:9f5914dd098f84e6026bd13a218fa92fb2d912d8d77e64137fe97e788181d964 -generated: "2022-03-26T15:13:45.807234306Z" +digest: sha256:34ed83cb8656f27aceb08b669f72644f0e1ec8458f978a4dc58293982990c68e +generated: "2022-03-26T16:09:06.524094844Z" diff --git a/stable/snipe-it/2.0.4/Chart.yaml b/stable/snipe-it/2.0.5/Chart.yaml similarity index 96% rename from stable/snipe-it/2.0.4/Chart.yaml rename to stable/snipe-it/2.0.5/Chart.yaml index 1e4cb11e7ea..de9defdc650 100644 --- a/stable/snipe-it/2.0.4/Chart.yaml +++ b/stable/snipe-it/2.0.5/Chart.yaml @@ -7,7 +7,7 @@ dependencies: - condition: mariadb.enabled name: mariadb repository: https://truecharts.org/ - version: 2.0.7 + version: 2.0.11 - condition: redis.enabled name: redis repository: https://truecharts.org @@ -29,7 +29,7 @@ name: snipe-it sources: - https://snipeitapp.com/ - https://hub.docker.com/r/linuxserver/ -version: 2.0.4 +version: 2.0.5 annotations: truecharts.org/catagories: | - management diff --git a/stable/snipe-it/2.0.4/README.md b/stable/snipe-it/2.0.5/README.md similarity index 96% rename from stable/snipe-it/2.0.4/README.md rename to stable/snipe-it/2.0.5/README.md index c234a908c42..ac3ac144e0a 100644 --- a/stable/snipe-it/2.0.4/README.md +++ b/stable/snipe-it/2.0.5/README.md @@ -19,7 +19,7 @@ Kubernetes: `>=1.16.0-0` | Repository | Name | Version | |------------|------|---------| | https://library-charts.truecharts.org | common | 9.1.15 | -| https://truecharts.org/ | mariadb | 2.0.7 | +| https://truecharts.org/ | mariadb | 2.0.11 | | https://truecharts.org | redis | 2.0.6 | ## Installing the Chart diff --git a/stable/snipe-it/2.0.4/app-readme.md b/stable/snipe-it/2.0.5/app-readme.md similarity index 100% rename from stable/snipe-it/2.0.4/app-readme.md rename to stable/snipe-it/2.0.5/app-readme.md diff --git a/stable/snipe-it/2.0.5/charts/common-9.1.15.tgz b/stable/snipe-it/2.0.5/charts/common-9.1.15.tgz new file mode 100644 index 0000000000000000000000000000000000000000..bc70ebf1d55c126644fb5be1a5c686c0ae1de960 GIT binary patch literal 43530 zcmV)uK$gEBiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYccjGpaC_aDdQ{bw5ZtPs^X<2q_r{}khyOa2&A3kk&XLo1k zxFHgfFs4Wb0Oi&={oQ{DPXZ)JQGO+vF?T0zkwBqPC{z^+g+h=lmr2|^SwO=)!EpGe{$Myd9Q+CN9{`uqlTilApZa%h ztJt|e$OBXS2@#5ucmh_#7EDv~GlC3J)(Q~~2u_)J_k9)z{4WsUDS>1SW(ffoBtwFM zXls!y(F80QOX;N7n`5@frrjV}_87@fAj7p)FZ&0J+uWV-sz zUtbQogK@Xt>3`E&LL4)QV?+cnw1haC036Sf|I7h*6EbfB5JTQyivR#*B+Ah*RFK6L z25g<8iAJxr(zv|n4!VPb)+3F-n*S>pWr#kI0H~e+gF*k`;IKIV4@do{`TrQtGtlXP z_bG}$oxKAzMFF1S00c=q!}E+lKG$2%z<-8l2D6Cq!siHqDTp$rN4iCnYX|N9u#?xUicyRzn(@}s9g7M*O+7E{P7qk7N{{Hx2I6%{Ie=rVbLwFdD zkEWyH!SqEiI-2hH8)J}WQ3TQ?!oj))#IG~)V**ZR?-F)K5ak_e31~lKf_}Ad&C zH701zD^}Azhux6m24(|jHlbI8ZofP14+s4hgOQ>4Aw;9uQGal>e{^t!!tws$i|KfF zG&>y6j?ip08%#%sqv>!soF4TL4pINbU<&)w5jvQShc8~dXoAC5q)th)WDrN&Qd-xm zCbWUvkj}dNW>^lDhuu+ksL4Ax9H9PD7=+;<90&au)7k9B=tZ!97@*N?ba*hHzCfry z*dNZ0!lTi6fAHdHJcDpJ+&>r(p`V=#ZEr>07%{p?61FXMb-ilp8psW)tIKbORV^$I z`Um0uXuprb!(b4O_Gc&@9EHb_gI@+J2X*lfnMB+8!09-6F&LoH?129{I%?MZ zR$L6D6vt>=O3PZ+R6dqa8xmMT+XTlU>wb4|kc)=l3l#2;j{2~V&}e^l2xsG?!3>25 z;b;~N2L}g(F`Ui@!DxVBh{iAWkEX+Mcoe({hQZ;%(f-D!w-dVwWpje)FWU=VQ?o|& z=Fpo8UsIzAJXg&*>^m5Z2jM=Pjt~2@AQ%l^4EKW>mwhhBK_ znuUWP7z_u)eHcy$!~U!vc*$I9ek)QhA;B=5ZcArXt(wRhZbJ&I;u|5kwC#5fyZf59 z3|$wt)H& zPQ;qHh(%r$@Wp6XeE$R^9D+nF_$h#dBbY|XdWmAT2SSLJNlXy~2?3NrhGtnr5!bnL zJ)0MHC>MsJhcE&#juQqY^duH|-Duc+uOJJ`ADL5E_=W#;#)WMX0)A;kLMQjlKh1LC> z#)X!a@C(RdxPmz1Q%}^ges2SYW@Ih_h`$O|t)VT{O(9`gpn&|Bkrp51h;kqVtuVz& z3>KJjxeg+{#7vC3{P3fE|AxPwfc;hrJK93Z)LbvPO2RFbOMUl!r9@WRP3R|Zjv^GW zga8;t$u$)M7(u!QDGsi1JO>bjcs4^MUyz45V0!>B(}XY>Gb6KwI0Zj^Je8f%kSCxm zez#kyVJ(CeuP>J{4tMCTfuofwp9aEV*iwbWRQAAtWKL^p^Uqe*<1mypaBM^jV2Os5 zi8%%M@K4toTDSEKoDs}bUbOaf7=2*`9=q*uJ~+`xfD61t|4d@ky7-?7_;_(*6_Wan z178C{)5!RL-yNUJR$B5yQ8Ud^jHET9Riy$TEtMrqZDl1Doq}K}cm~-5WR#Ef0!2%( z;(C1=Au39ykS!+Qo8C92dc3toLfM|=nJ;jeMrgu`CV@c^WRxXKaC#={^0E^!crok_ z#z)=pxI6ZOgjvFtkl_GE(HhJlTOckqam?*FD*7ktsTXGnVG}SOk1c}MtHm@4TWJy= zdsLrCNqAL6>zUP9lNN+V@FM7{7*+F)tG$||RVDstk^WSS(Ee2FV<;31_5SS17AsiQ^AOIfG|HKQG}I_g%klpq!k2 z{K#;G|0%}$43PlEj7xJ~@F*|$7A+I9t}QBieIj)?Uv}dF!5~Pom{l$}RIy`Otgzs~ z)?h#l5h##=E|M$?!4v^$E`%+h{xZX$pjo`kWhD$lEiwx*Jtm!oaj{UQxe`@HY*+#^ zs?3tp8Hf`mq%gNSlr@8?Fu3;slz=eR5)g$->e$N#z|b;{AVX$Lsoi!-48cj1QHIEe zB$D=x_4_*B5}r(9V95Pia2VzGyW&DBaA^R)#GbZ2cw81Q76?9G`7e8dS6Z=^ zwM*ivF&4TbE>!eM!xkSl4086!e0@&Q+J-8!dkUUMVMIi)MOOR8r4PgNyN zLSqPOo8AzHTLp5T7f@BGBZp5~2zlL!AutyZ2>}ExIlWYu`BIj4!TVH=pi<#`0I7e~ zi;n!wtyWR-LM(y#-1S07+A@f6fQ8v2-$+}mVHMT1Wxsu-a`^&6Oi;k0HGqu4V4>6) zmx9Uy#4$r;1_LpIXAy#w4;+Bkke~^;;4r4^6jF*PxH_VmZ74Sz5s6`RssT`IwaV=! z^I-zoD5m>uwP?jDTu#*A%0ti&7eU&ts5>S7x~hE5g9BXx$e*WYC$_tbno0n4KwH~! z{qA7c?+r(V${&)9A-771D8n(75fANtSNvbk;3b|pWat{MCk}kGa4;jn5|Aco7D*9K z`C^wzlY;ZBTDq>2OnL6sd|bX$0|M9r3Y(iEdy&hv4T=M@PWi;nE&n~Ke}tYCrs#|> zYxyFMuR@;*Hi*~LBwR}bU=VQ5Qd7qY001)_p>9heYdi#J$LHrizyI)R0+#CzXOZiK zgsQu5p|Fltm?W`S${NeO3oevq%dMwp;Cvl3_(l7eCaq`Sco*p9#xwBUu59hq1blOI z1G*oO;MDFrt|`BM{igK{oR}glH6$oreNU35`3*p~+ijtEr6k-l@JS;j`>#mK759uJ zOQVAMESF0JUg>8+DnKL(+A5fU5G|8E>B^IZIRX+UxW-Wgrbrg*z;KCUj>ttC8ERg< zetY)j_~P~Dr{gytUr#{W(@$BmU4y&8d&gST>`*9V;tGT4EsFd+Hp^sHg+=wa=kFKI$iCr!c*j%Nv3%Cfwd zpEzn_By?Zjy?^!k^4;;<*Lsr8Fp9ztXqHbp@#ah{;P^!7#z}}c637;4fxYfuAK;My`j4On=6#Rs<& z!g!8IlF?3%NELMSg%2oZLfi@-rid|ayyzF&*YfiM#d?jMQ1(u0Xt0D=2vBYt2w{a7 z2xF?1Wdc4cljM6$DC1M+M_KoC%K}ndgXOxrZC7stJagK{R8|!7tzFTQuNJq!yDfvL zpq^b_duUR%!hQAbT+@Z_nJpA;tH)u&sFGP=3D8oAdGcKP1MX6Y3MQg6X zGCnOig?XU~I2a$b0QmU!`242{==X=(@`W)sgEESQwZz$5*F8yMhQ6?F08=={5oUay znq-XP&@2ys_;|_(-F1V>>3m{U<7k8=N!9Sd&~_8%#<%d-sn&sN-q_%0(m`_WVkdmn zS$s@6O>{5CiyugmrTWdx{YkSljSy!A7>N&>u~fN}1(z^-?!1pbBnf+q=@PPFu^rY+ zZXe`sPFlu3C3uA+G`Bq;1i|oq9Ibh~-{S~Ld1`jDgd6xw*LzI^7%7v@0N@mOmk7j7 zwV*H}&Y0AXN`z-9SO*cR>X<2Dt*S1B{bsqBly$(d+XIjS7y}$*W=iaFLlMVwK7a8N z0muN3DT7f2k~ms-Tk4nb*wTA$4e_M|3bEMY%jAxN;&idL>bBHgj~4^I@e1R$Xelow zmW~{U5Q`XMNY(%|w4`0|nm6f`)*hb)Tp@tD;JuE)6%q#W#R3&!@K3U@q4w>`I6V>~ z(gi=F$TILikk5BcP8-RJo>+d+pmB$MmFoIchh+}Si|ZLlrl_>*-{~|F<kh0;vaYUd9gv0F8sS74|yc z`i>m1Ex9ak_rIMDOu0b&%s+kR_5-(Vt}$H*C7?!son%A|k_LWeU`r97%NqroB1Uyo z-4uzHE4b!n6<@g(b{uj<-9EQ3PR`n`eBpa>a+Wu6Is*{=cyV#2TEJAQF6|Ey;)#Fn z@&B9~)xImcoI?cOwhS6=J-7}l}K;H+G7nyme-amULJ>N?N zV+t?>3vMTaCH#Vy*^*;*@a=y8<=~*tSB1Q;U?Ywt$Wkzsj#kXXtf2lGRXuUW{Z>m_ ztk8+kahD!qY#{^J3miz_@eK2+kyvls#mF}lSYW{tQ3~hAHwmr@W(>t$-JG-&>&!%g zgd;3K*2fM^agVS1qXdQ>f@qSF0MQ;dAy9eMVrM#vu;)B4d$U zH}6QkBdi_lVO9L%XTEy;EZj$*zlTvYg~8QD@+O(n_wj2&67u;sB7=@{QjNb-ViMpu z=QO$J1!9CG-)UMPFeflTvn-0%kA%IzU9@^u(ig?`vbFZnVrr|6M5_HjDze149^U}? z*n@&vQ^7EldnX)C6*^{?aC|9A@e)Un=-rWTI7@z`!ED5OBH}P`T+(IbEl^d%qtf!a zZ{d~RPO<{9bWp;M&=EM6N`vlkbtE=1SkUcucP-&8c7?cxSjvD$7=wWZvuC+@#lBM# zN9+8vs0GOt3i*0hp&&u4A0@1vSSjgq&So?GMS|D5O%5HV4k6qCXb(uEh17Pg)C4As zPwt-=VpVldxZ+h`&HnB=UZxS+d6U3!3L_W?i0tkG{_{Kab5DDYPtW$iyCg(sGQ3MG za`RPsk-X8$6|udQ(Y>kzXCztiPFDnrNd>TkYvJZWzhsz5QRt0t@dO;-60KW>9ancr zfvV|EE>6FPOB}7Wm(>E%a_uvmf*CK0h2Vg8NR;pp%*#dVM)8{JSy~}qH^^8)iwy$Sf^$n5 zD=A(nU@L^I!yN)dEF$>xItgKuLRl`gct2PYBvIG;cAljIh81Y=nXfWF@5z79`5zZ2 zXUdHF`0DJlU0p6n_$ReAN#S)2AYb3)(Q|PK=7{BTUqqvDR{Hqijrc0GM808V^Ok~b1^_G&uy(A(m##aypL5Wk`G~3WRwz`98*3Ph zhQqNrDj_|<)`|zmlpz>`WM;L)OMgy96Jj*Fe1ugv2d7Y|rk)N4p>pVKWhxd~Iqo^u zMSgIOsVc3eq8PMMWotn(N?Q9l8kO3Vy6gU-*(&6a#RfX>U_R3{rjwFcsDh)o@ZM|{ z3SWJ-1e2dF!KHu~tiQkgy=AppX{@R;O{~?t=-td!1*h6v)uCj~%~eeTN1U2yy;@nS z=-faCR`d|}`O^6s+;xLS^Awl*CeviMP@Gbv>#HSKv#B54tvbHRvr5Ym; z&G41|! z&JXvM~mg-PBFvbA6;7;qPF&Wr5Q1>bRnEkj8~#4Z<)lC$^- zq$*4ex}zh~d* z=_=R*XqmG0D@^v3uG`CJ+n&%A?~6tHpK%lk zt4A!E;Rl=4EFo}?z==7UlM8AGfN&jABu;66?tI<@ z;W~y(9B_+FrZnNi6sIMrC77LR!usg^&-dq__nfE~0|F6`|3LMt43E!gwh#w#B8nu) zIbNX{P}wWlsdD`+7S3W6f*lKuUBQ|Xbeu)e9*7eMk}yX_K#$m1<#T6|7*B<-H?mC| zhFnH$=!fJ24h|DH3m83W; zZKe(%$_~w@V)>xZl9P)hDV(bl2##1h7Ux~wCU(*=Eg)Heb>HSr%|w~>!cLZFHJ3?< z%oNJq{!FVb=)707mvffR;t&ZHR0rE7}V& z*{zR|pvz^dWK7$#8 zj8Buf%C@2Cu_q){0AsB?^UXp0PdWdV0vu4iQA3dPm`Zd7o`Henv_AxEtRRV!IlU!s ztRU&}>QCJ9$lM`?9$Kb}xJ*IOrgo%x>01snTc*Fm0al~?uQ#}lH}y#tPpTHe4W>TH z;wQdn&KE6fTR<3S#$`?O&aTp`loYtuxf zyt@m_EEG=lEb|Opynpo`sAQR936=dh&^s9=ohdFdoRL9sB9@&c zsic?e_R1Lt3mMt2+#0-0dDYo9J2Q%B6*X(u;L6%>xB@o^9XPXo)=hmb&X#tMf70!@ zZ^H@yDqQf}a=>pn`p(F|R>@zI8GyN0YN?WJJ;o@C(FoCMg95lm;)iHuEpBy)fpAEq zh%7Os!oMd^LT}^KZt?>g;9C!v6a~W5dk24{mMzlnD1Y$|ID4sPhiGD60qyOUPRh}+Z+((G zam#f_XML*RE4_8ygtc^89Wk+qznq=sa!j`6M$gfZ8*!XN@?jG7<%f5wTX{ybKQRA3 zH2Zo-T!q(c9&VLMuGv`2!kY(Lwcc=)i%_3NxJp2UxqvbO(Sk-xdvC^~rz1KJ4-dVv zPK}m~z$g!vc%MfUUZM2_WE2sz0S!!C-g4cUlO#)f%XP;TX>Hi{vaWkkT$Tp}e72&k za2(k-5_MCy2aDl)*Sa-Ik=V*g(^1JE_XNDB@N`5=Gm4#NUdS_C`?K*$HZk z?{fD>xKExv1MdkCTZbURlvzpRr!ct6(o!qdYqJ%{7U*35y+!-OAF%x8>~jVS1k;Xs z*Aaofit6t;U&viJPVgX!DI*Yz6z5whF`1wd$MX(a$xxggq!iC%k!&eWLezT}i(A{| z5!T%n|8?#hXtnr`0yqHC_Xrd#X4IPAcf;f{W@+tPn|kYq`kM9F-8 zp7JSqaz{+{33YKWU7k+Y4Rokzp_3DX8wyp;QI4aT>zaa|yflYaqy_A@OiqPK3p@iqBaqQdTpB`9kSv!d4n_Qtm7FHe zC!}i1!xssN5L_u|oybzcSw6r?MmgkQkzgxYkn51H%xwZAngASgT_DbtEx5p^GMGPj~h>MFo0K7!**nLIg&9 zYIOJ_Sf^r?;VveNUMOOERNPZ-yd?}nlgqreWfSH3>Fk|qz6(xSgQkJHR!f|(!|^QH zQyzgNW8iN|M))G1%E>(GiP_t|I-(uOI*Vi}W=Ai{NGH#`uWxbh=v&tnIeO2`6~moX z8v7kXRu1wO0ISqKkZ9Y=yr1H}I^SJ&DyVDET+y5mU|(-+?x|A+?Gu3Y*I>(X)o0XI zgZbK1ZXSjxW*EvSN|hK_`*nC@=S~_AG3z>T*TCS0tnxwWr0a5TE6L{i{DQU>jhh9S zvU#xL6^^3wYs`X$<(Nlb#ElW5N}5bBPtR5(6Rhg{Ixgl!P*Rb1#Y%FiDOgDLT0uj1 z;6brgF`g=ltlY)s2)4||sq-7j7-;Q3OJhKBhyrL`^kaFo#EQUiXQ`DK@0GktY$h)r zGXaMJW3}8{IZg<3ZPxD?VJ9XTfM<44GKyEZi==#W6DUO%=T~%u0`YS2w^|kn4xgGi zELUr?^!GS2hkD98O5RP3TX}(e8q-2>uG;eM|ef#6%`>S@*uqx zE*d2&a|cU6N@OF>U}!*r$ZReQ;; zv9?ofULn3pze1GrQNT?&outTWUA9)l;k6ESSAIb?A^97BZ)84mY15-GskrD1YqxJI zZ=*Ic7=h0?yd)HU*0R_^>0I5}qm918L0nrL<|!!hvlK-I(cP$#-Lz*y;8@&l4jL3v zN@*k2PU=(^-g%)37!3D^1M961Bj98T(wS8iws{5|s~xMrvu6*I3r7GZXf~<4faeyu zaGVD0A9-#Zus4ZQr?fAyBtH_Fj4LU7zUQ&L&GqvSbiPmO+-=WKlAgZXde9DbOiKqT~v1VW`#H zOS=6!Ysui))Kmh^EhPinYbM>&Dl$NCWfPg&k7p5C6!zIextU^}B9#pG@xvS5>o>_2 z79TisxWN_|CbNX#ow+$eDlGt2%Z06a5hePBph+B|j2vE}_idLK@UGWY$E_=A`rFNm z7%{p?tzM zGs_syjrs!iK36&sU_#@aJqfBRK;c;Q-vR^Yk&H^ zJyI0+%&kMc%lr=Wvn0%KFz>Q7x@8;ve!o8+jl{qGe!uwdaDRO8r@?4AI6N4S4u-=& z^@si8=DAW)S7%H!tz(!i_<7WDZ#N!bhF5> zw@(w9UQRNH3Q1B4z4($^U(=r7b?z$tZtL6L*RQRc8xxk(mIbQW~+j-=<`Ji#nJc4OMMr%fhsqs^?mDY&~|gVq&}!wIOEQLQCnP{!5hP{f;?yb}UFwJ7BQ3GIYz&N7;`bnz=&7X z*J6mKE=2FtjjI4SSf?rNtp;j~h+}(mQ_=rC(ul8r6cqrlaQ6+Aq%8Q=I0I~23jj+T ze?TJbF0F)Om9an#6ae^TGl0B|1z=wRK#btPCbOUEB<3e)A3ri2;eQG>bcRU4&7?Wf zrq26#DL)jv8)(&)c`YoYr)ddm7AM$sK~z3v8Lt=K(V@x{jA&#Dkn*(7ul8SA4ZX_ z{(IkoA7ny!?IVYAXs-!W!uoG}w#`t`U*h^@rLa7330f)-y*6WNq4Cw=xef7;ELzI* z-yAczHz}}T{tt$O{lfe|*dGs{=Ko_nV*Y;+Gr5p)(M$%N8%~FAs7rvWCa~e3s%b3m zFtAcjLaPmD<`Edr5qQok?1AU``IpH{Vp;qJR9Ieeym;d!eA{-#wxp8NMFOEVJwnC_4Wop0fNmNhBXj{tt)a zqWyO;>JOge|6@G0{vR&XTn~`&XbJ{7Hz(9QULUm~vyI!wuwC2hTv2Wc>7p_9OSl3cS`W%+Zn(D|(mi#wdM%A#4Y_xaND-2MpNLQbV@uFFWq@B;!!lN2b z3rp=>B1q5_$&l$w+vx$D{vEZt43n05<6V{n6n;QU8wz`%n7+F`nD#f5Ra6YXBIq zO)LOY_{jwL7cc>cZ~MlnskUwm8qX;skfHgSuV?k5y!`=525kF)m>TxpB8)?@6C(>= z4rI6VC5a*&&p)Q2{A>|z25|&-#6+2a_Pc}u2v*{BnyJp#sSKI1CeY5G>25o3Vz)$R zVCqXQmAfuCHx^nA*pb+XgQ8nP&;b2X*VCPZfG*9*9D!~Y!xh94oJPoyz-eIOF)6G{ zdHYNFI!yci_5e59fBPl> zPycZAWdA+JBb?i||Nm4S2B`J^gDN9VF;BhgKfm9$q32&8P_X>|`c=W}ubH>P=dV6n z9)AtT=kE`7N~E$UUz!aGD}Z#I`O16{e)*lEn9+!;+i2V1`R;C=_us{Qqwl|SJLkU{ zKDWK5j{m$ma9dWx$;IfGJ@A}G)({j)$jTxf&p_AQS!aJ#{c^TYCNIGb(1zHbSDinv z+MvxM*{KkH0WO_Oyt8Rr#@A-4NzrN@#Elpg?4HsH<}~y%LmlRuw}22~KZ+d1ZL1wG z*@}#S2wp9=q(`q39a*rZB4@6 zymxvq3cXVZy)4M9jXlvjr>edaxM^Tsp*8h%;a7F^wG7+^@b4NTR<{4t*_yK?!om7p ztiXEvZ_pnPMg{wCJUl#jvi~0A5&pmLNCJ>hn$_TT!)hPcc<0 z;I++cv!YO4w$t)aIRd5A&q2y@4(8`&yH`izu<2^xI0o+FqP=l_U2Dz;Y+{j#}yZmf!$`4>6? ze`_lZ(EhvK-KLOH4dB-r?ri`olsk0|Xw3IO-c~auSuvHYg%UEyz;jDrbFB_wNzNCl z7E5g2dmc+0LY%X5KHzj(`jBIc)9<1rxT^fn4RA<6VG);3!Ap7Pn+Zl&#jRulI3&^) zSPjW;2Ym@p>Z~o~8`rC)`d(eB)7<;$U#^wkcov>O%AOPkCPygP1v}D8;^f&abu=N~ zYF%sU3lLRBUVlkBLkMqSaXBakzc?Z#IEIp%^!3QtYYmSZ)(E|NC?1J87+SE)q~C;| zO^6bX*2kuZ+VHl=_7<#TYmY`uV^t`#OX;J_C`E{ZRm{tRk~HXBqM}n-$XOrjL94>G zDK}NszXKoDQfMmUF@3 zB+HU!<1e3d+mmj4(rt|;)01v{(rtfa-S()e&G9q-);`Cw|IZw6d#w2X{qcU$|93Fj zA3yp39^(=IzjG8MaR|xUJ_O1|s&?c@2@DY_o(mOQ!IdsQ>zJgo87w!O1swE+Ariyr zG-im*L^gM87r1hpv0SYUy1<%|ec&AQRB4+$32^bOV*lAb9xw8+ck`@)wsR6xh3E)( zXkN!e9D2k~j$xj_y%sZ0WSzdeUBq*h#^NFvck{-J-YSio;Z;miw*}dB)#gOgHJYJT z%oMf-YPxE3)O3vvsC}2=D9ld;E@4{F*7(4=+RMw`r8(=er8cN< z(J5NnrURxru(XJbj3uo=b+@?DE*Pi8za^~66b4m%St=}2_cSc4xUX?}S~)A@fc^9%BSfB#AT zKgzRJ{zn)^mVWq@-xhkW2LYwY=?M`MoLPtrvZH{+cbGAerc#`2v7&)w2$8z4;6oCj z-_gNAfw+5Q@a7H&2CG`w`n+FBT9;vpt33H<@rT}ms}4m{0J(j9x8eH^$03gAPoub9 zGbD+SN(2g1`~yj{w1)C6ofOobH(Q6qWl}gy#FndsckcKe1d((6r)%RRAJ^!gM*Rni7`jzYb z(Iu3a52 zzXC~ryQ6-l2Tv#cZu3;?e<&AP_hANXvi}cD`#MSiJcB?Rn?|#>c$C*%Qq~x>l`g$5A-n!=nh-d!iaSHde z2G}tFNBhG;(f&UiKb`-5l;;-t|IQVI+;;|GCqPCOdA>5Hx|&+%3z1GfeP@&7^z#W8 zH-VtliQkb6`Mxp;)&agpS@b(i0_fzfyGtg(_wg$fp$E(aXiudEsQ@$4-1!y>0h?v_ z+mtb|n?k~{xQJ81_U8LDr7B0T9_Y;@CgM{H`rVe(y*__mY1&n#+4Cg&tDJUEnfLNh zTjg8M7usSep5HSuL#u$9pH;e;se>9N68dMZScGl$@;J2 zivLZXlKn4(<9pU&iQc7k_Te@wf=%}Sa8StqI2;T|Pv?Ig<&pNkHvL(mZ*?mimPz84 zzV=N|;U2)TN(+Q?FMh@KZ*#mt@#eeVN~dN#Q9#w_akQ_m_boV1Q!WqW@+0p_eoeb_ z;lnT#CJ2m9^e2<<@kZSerD}NYg)QRSHKnEYnvrBFRHSnZ#e(VhH;q5o>S-CdwrI3t z6R8BSOwsv~2c1W9ay#O=6VK?`N7h>{r_~oEc zUk|J?RrRDw*JCMvxx=SQY}El7*LH65DOZf50$o3ZcA&C440DCnW-~=`ZX2{2$xs`# zmq`}0GsqTg(C+Zp;-=kpkWrQ_+n~L&a8nrU){!hM&jIbtx5!jGyQ+3E{2OW;;ZzW; ze)FnblnEXHx81L5xLZ|jHH*FNZZ{e_Aw|>Cs7fGt<4te75l$5`Ytzk^Mngg9eG6V8 zhRBl3ba7Hm-u>+Clm1_EraIp)m29*Mv>(SxqiQ$P#KYSufIQ<3HQ`Bl=G*=taJ1p6 zwZ-Kgc)my|vvUV4==?RU+~eDkD+*D$n?kmrpucNzr{Y%G7ekLW$D?gJvs{iKN0ZUoj@#C)2oEAP$s7G4TxLfdf|>aVB#W0#;bp_nCP4ZePz)D&cJ4!(YE zOPFU_6v?Dd1#hHVCpE={LmLGd!EDX#ZS+MXNFrH$Og~aYCZMl>s<7#P3&pER%Tf<0 zUcJF|gVNE3iq2a&DcV+K&X!X$~s1vV>4Ft6x`kj$ygC)J>NNwIk)b8Y#%)B){I zM_2~@&pV;oRxMQmP-%5vVPgCEdTr-KNXa;}T)A?Q@|Le_l-HRNycAA6`;&~jwPJ0% zo^h0Eo2rqWW0o)DnwI+xQZyblEq!ichI5uQ>pHn9pqFqH&?8C0dR>UUQ;%tLqM3tL`8tpGres7`uOHQHABh2L69!4+$5OsTi9ec9h-?@a^HNQ)Y z(s2bTMmFdy7e-O9C~F|RHAF@FjVkzQ$@e>Z8p(gDs2@)L?-$p9{n7C0{Kum_M*b^z z_6|WaL{J>ycn;>6<;Kl!VG#&$%o1w@MY_$m*xm7a+#f?jY;EgFMd-Q6VGCD%Lz_Umi^l#L=!MP7;`1S&{FBP4!A;VW3Nj0X6iFxpS*g1w5Lk` z>r{7lcK$Vx|Km}~{y!K##s5FbW8}X{qeh!rHpu_};Xz6M zkNQvNKOW_&ivP0n>ON-hSDs?GI`pfQxYr-}WxDVnQC~ha_rNhBQR)_sHZaI=;KCR842poU!U2aU31GBHC^K)1$6f$$%-0ToE-zEa z7MGW5t-*hY1w+LVf`2m?MkD$Eu^@b(xYf*305Sda@z z$0}%-0$X%vbTI{~6fRN?(+wOce6EOcMSe% z;Q!wrmezm$;nVq#M|o=Fewi~w_tR5&>g2zg2E9wkrVqCM z9~_Q~_TTW}>He=rd8*{UJ`N;@9%v;1O$v*`k~+eafn?@gTDM>viki@Kx`<0s>3^Q# z&6^8GGW(bOi9W>i5G#Jw_9HI%O>ehe@6$Ub_R)Q%_npk=N!R?oo<{QjVe>!iAC8Oh zKZC)+Q~dX%Jf-uWcisN=NXdNnSAFzt{;E$K_I{mGO}2iW3U^EPutngveslic=a+Ba zzxw#*^%lFvoO*xE4P(wf_qA87sPORH#1)$iy!|U2Md#O;1q-*e?@vFx{`vUL8@sjk z`*&@t$cOhIFJ4~`oDze>VRta@_PhPwVA%FwbS;Tl!4zL)Fy1?PhdjMJJzI@j%w)4S zH^SUfS!{O9g84^E1d>D-L>d*Ceb;~_njpdazri6DVena1?VZQ`m$4VIXAAer8 zz2&-Kx7f#fA^zAy{BeQ$gWFKQnoAP`c6{h*v71pu#B|@SFPB0}uM-kV%Ak1lJxP`_ zRzccv>XJ~f`DV_7Pgcu#3;A+9gcbE*$LZt_jV@h4g2JvTsL3dikzZ>#)pB?^V`SVU zrQi#0>FAnGf*p9-2(M6#C_N*|R5awgXd3U(+0e>EMpHDh{~k8~M}IsRmg2vk^8Y^0 z^8oojifhNtL){Mg+!i-YBfFnhMRtEWdv|&K@#4pc%&1;aD@{ahGjaPXn2tv%4t^hD zPIdF&_@(dY0o*wM$L09nr}&@8d8+(>KkKo-7Z0Ek8TE3*+6M7^_i~)>=-)FgyHa>$ z0Taj9xBCDdKC91-&vf1E_&1#Yck%#j^8bwYi~4^sI(Ulzf0W1Q|9o=Y)dS?6J-H9a zeD-;P%*PFWphCGOo}faNZG1rocCJ%c$%! z`a}ARemZ^g=KSZ=i<2Ln5f)*9mF|;~aG$t-qX+S&j2ik&5?x7*QVaZbUY4a1*wNs29Vcd$4r!)Bs^vfW!VrmJbQ&{6W-vhX!Tf)t zQvBcH;3@w5QJ$^j|7*n(!0<%1638fy=kmVrljAq9!4Dr#H;ex=&*c%}g}quVnzv*& z{_?t1TZ)~Gh=~b&5~_W5M7u$ZyFnbxx;W{r25lv?lo@@@7z`GCarz30{BJmkJyHyR z>2N_-yoOx7G`Gp>D_y0yn}Bb`SJ9KNU%&Y+EWzseuWuT=`vH*p`9By8$HU_JkAwZE z_^(HKwzmIH)x~iSVf~pa#_q%RQ^2;g{Oo)2?rirJFWLJYSba8C$~K?it5F(M~r5uUgy$dfn3y%AGgC}ha1jyJE=yeI(O-Ms}b z@Ax^;{-C)76z+a3a*dy9HcuAs7&()qrnn%oqHzHsMdYS4%t$nP&fqliib8uU!dw!n zE2wj28qP8duL(z=rpktDE7aS-J@@X2u@lY$`TDE^RPG4HUpjy0yif&Yx3m;8G9Q0I z;aePr5xRy%3h1^UH+i7``(gzxMhiw`0kFKZUjiz%>Bwx}qOs!iYY(C?9Y^pU5EJ=7 z#au3xEfTMUUHdAV0H#1$zakPNhG;;-HrRD>$~RjYqGM3GYs2}n*j*wQhH+Ung2iE3 zdPiir@HlIUXn&B(c=bW4PqLw5X z6SpifvQ85mGupNyk*W2;zUA*4O~t;r-i&S9j5W@x8GGbQo5uBywJkhpdUb7YejA-x zugr>X9qLr;KS%mmT8ZhQWl<@6s*!puvTo`wR|TL0#GTT4o>L2msjTju&KU`aJa#PQ z)Ozkx+apeFnVQ3-0gTWI(zjUxP`YlWAl~f%FRUZlERr`)bAjE)UjihqwDvWYdrv-~ z73LGxD|PVO7%@2}A`97W+ft82+a>Vl1#Z}>+L0B-B=EEwk z1Glr;T07M8s&H%c%wbEjAo7{1opOy-8T}qJ)xGZAVT#hV{a!3y8lhocnUz9Z#>d9U zsw#dvD+~`#4(Cdmr+TAW&|D<=^)kNA>qagVzVq4_;;n_Lo}5j4YJ+7dYb>;qfE z41g&Nu239KoR^!C0Q$=OVntg)X+oFk0&&BBxhep0wwxj&tLJysmipmXHU*5{ZEm0D zjJ2_;BFU|aJx^D`cCPCCaqTK7al*h3 z`o&+e-Dww`WE$DB*HM3|ZL&y&yf?<9k`TulDYWV@mP6yKJ-JZxvRpCFz`u&q&DnHH zh-sT3264RQuD;bpRbQ`;7ARVF>7u7YzdET1Fm6x46+)@+qJ_J!f9lNETi$iCak;wn ziVOw;qV#PNB6FjpSVNdzoA37e^86aR;o+dD|DX1MAM4p#|LZ-KhtT+n40mIO)U4#h5L|9Ek6c5Xbh z^$uE1c6nhHrNIJmIxQGWX@yHuVxsw?*!Y_ShTp*m#sMM*2R;x{H0@?F=B=PEoAqE6 zCD$E!E}(5scgyEEY{G6l;_ z66jB|y!q*9`$D0c8#_sf_IWy}=~%aSf>IVLg6CB!@fukrU8leGp}d#lZSC}|y`iLs zAu8}HPA03Ori1&=LEcxq&LgiodqLoAhJ*a%Urr$Blb2GS%5`npIGzhz^#hFOdRMIK z>!eDWR6(m`@s2xGn+Bt*8x&D4agS&6_FGw|@X|H2eHH3~%0NvoX!)s%Dte>A$(lv1b=@t@7yDj$TD?XlAe!Vz3v!Vm^`w6%>Icxb`_<4!E z^B!c2`(R!OP8)fJ+}iTcXGfU2j*@tngkpPut5xZ>lDbtO7psrEyQY)+mDL6P%F_9M zABb;4$askuRqE5-s?S^j?kXu2p@1c1;*)LiQ^hQCKPzcceZHegs@Nk`ZO59{-qf45 zRhupwEP+a+{B<14K!f`>%S)u8*_0xEa1|PnY0lg$W3w#X4SQ=@v!%4DlQ*(ypUlaH z$x+|l`>LKp{vGOj+8o>H|GAV)w7YnLHl6?6FW&z-I6NF3KKXwh;}QO!4~S(XR+lY_ zC8uCr>GM%{IJkbF#=e~53g2>Hs0ni>X4K@R^s46H{qwNv%)?IIL@Y$zo4h=3!*aS+ zN8(r9{LlwG5sF<{yY@5{$uD-aQ|4VF#fcX-P3U!PT`Jt6wx9WH)U&j$HFIy@|%|2piCpZx!i^7tgUN&Fzk zzn#0htz;hZ8z`q~QA}f*LpS$)KB&(9{CKBXZuD^~>H81Sm(n4!9U;YvZV=SHJ_tKVw*#;XY5tyLbfg?Qh~->HTRpv-o?=!3I<=5LDj?2R43 zIw!@jQ_TeY^+g)lmMynwMGs$sojfd(7kXY9-YLraVHCa?|_Qqd%*Rz0lu67RO^j##$6^9rl z$yJtu_G-`uZIi^IZMWObYqaxzSrO&DV{RyUfzM1y+cq>WUwX?G30W3Es@Fm~Sdi_> z@UpIsZbYALDAUKDGdoHIl#9ts4t9?mJF$S!E#TC!ms-7xxlo)5*7t(YWUiCO!B(N^ zY)!eon2Jp#e*=X>FezMglFw zGHtVGTMFSKNfaqp3xRQX9Hk5RE?a^FJJ3cWQE;9*ep3_bFX`-r>A0Ss!Z#hRF3IS8 z%Sco@UNPzQ{=Ay}c_m}>Gzzj&30?x)-JI&Jyeul&{}G<{0z_EvlK=PoZkgZZvnl>} zFdP)^|Kac{|LdbXKKmaL<|J>|(JtmBP2*q}BTd|NSctG6lPGjD9b0icRfXO77~kb% zDip?hIH~Ovs%oSVHLH&+RTj?=FYS8wTbrTh;&!`Moj4^|W#z7~Vu+Ml>ExhIru$tt z(r7#CwgrN+6M1h+=e>5laaAhlq_k$^YzbEoNAgHJS25}q^^Q@Q8nge6|4jckZi9BG z(-E3>>&pk8J15LKH#eYsIL+R;*h($QU3fP(hegz=9Tw4Upfre|5MmcN_zA5gA$|oc zIcEgN^Zb4RN3n2-S7==ak>C|%s42*s$H-3p^gQ&lLI2-J`lpTg-v8iTd5)qH~#1_6ni& zBuUqn*DTj+I(}AS!C}2mg~jhExS!Bk?(XZo+>IFJjhWzRyQh~aK@`O-kN)r2OGf=e z(z7ThosE%}I}B2|gDbQKi8BoKgtv6U?~at9ZDGgR%;Z4T?b(JNJy$3R=D0oL`68#DHl{hJ{bG!L!@71batUKID>cuF>Rp?XWtpZ5 zsY%4=UX5^jG7f*wkKg`VKyCn9uCs@X|LKp1rTp*X{ipoDkMf8+woc?ZE&C{iJgEU- zKoTq2XXV8|7N=Y%WFq%11E{EzH>t~`Huw0 zpuGp$w}4&YJ8epXExZ34h{?M7?0(OTp@CjEK`y2?=OSy;6>Zx zjoV1kuA9n1VK7AuI!$_)no{5|P;h04L78lCy&XC7?4q5*UT?E5IcfQJ>nW(BU0jVwWc^oOoVY$wJFjs#0r|;VfYc=P2w<)uobpFX%ka zf>su@=lZ129VlBOL&uBXhD)=p1J&iaIHnB70djk0hnYP|*MHTgPX0^QdGP!%qr=0Z z{XZV{pW;6rk~^_LW?JGRA9j$|g&w{SM76i>Ebu|fr8{-bwx6h-lriWTbdsgO0v ziRtiwdI@&SSzOO&y=;)5oLG+C%5x+6szj&x;%Qp!my;|Gz<6K$iI?Zu zY=*ypcBk#P!doXIV-A1@gIN|uYw$}3BRs=gQKYFDkZ$W|B%zD)jJLrDhk_{zU`7$3 z$r6bLoRsQv7-twop*(UF;U#7$l-H$W3U;PzF~qOlo%6Cdo{I~5ce}0A86Z*vNFeGC zXR5eCyu<1)_$dMz<#E3PTJ9#`@S1;D9Y|lYEmLWMsZru`?hIh# zB`A$VeEt7xgZ5>6d-RbiY5(t0 z9uLckVYec`d*6b$h|J|Yh>`$CN(HJw3B7bs*&gLLC3z|MwwDJY6!=`9uj~S=spE_# za}*=OXI`36HYbSw5`h#_dYzDviu2IcvI?HB`C!7 zP7MkOjoMm5f?+tlQ)>!FvAsr)o4Wb06F@$!|980G-yfCyzlTrppO5kg>*h|=+pqUl zr5vo5k*Gj9D;WhbzY!-?p?9^lGKz?&%1*MxEMM`-n#Ba@OWx}+uf5DD6O`bqqicd0 zDq>|f=YTRXfnCtfk5*`GoR)l+M@zuzeG5cEkS5`A9!&5CQzjEgx$hj^_jvmm`aF&B?Rmx9fYMfvkCxW)3WB!)CE%-1oUcm!D*R_rDluZYiMXy25r5C8EaoX+CH3VE4`qOhFEh?Hr1$vei0vky(WLOSSu3O@tVWum26{6Q#g?hawN`Ahq6@A*5w+`Z@Zv0JTB#`tjTz&& zjJruXQON`)v#I#$(T2W(YLZ|!T4G+9w-{^Z7JwqUj=Cz1@&?tU2H0nwIW068T4!KY z0A4SyVNEpys7?f{!pw`I2DQcQEoU0UYZ|~vOotLIi`NCkC|n^xvowv+62%Ng zKaeC#DPRc@dshpY*+rkzbXAbJ5?)o9yaZfbfP?Xo)o;OEbGJnPHAJf)s=m$Bto%)5 zoo0*=8|k2!A;O2*>Vaww$KD=PjC7iW=Y_%cP{rS|m$!vd;NIgjm z+c9!p&_{hebYRd2!#)_6)6U->MR92QhqI5HW|}VM;{b)!VH%-J$;fOZ+Vwv9)pWEraPh+G@#ysVBJ zBO%PAG8(8T8@#hI;8Rn-Q>!uW{bsw-H6kflm5oSEU<+=Y8EJ0Fvoskct6k4n3V^n! zn=rbCKgGQtuX>!eVTqw?XUK~wU^$xQmWH=wiD3ht7;a*U;a$06Sj7pB(Nnm;MuI9W z8tb@289Aa%!HX}l(wEe8^$){CFk{IQG917tT8marj?XUNy}r2o?)2TO%k$SCKAoPt zF01Pkm>!3rN8tt;Wy!Mgvygq2U&D0_mpG{WuA6>ElC-YvitoDdiqCoL{sJ`?opbOF zhG9jIU)};hF~@2n2qEu4MaLT=;ex2b!jQbG`wl<6Y+P@P_6mJE*^1r6W;5o6om)4yQt2 zsixd+Y}pbF!?uA^UbgzCamih+B@ZiJWr=L(Gz%L^Ud_Lu|M7}1iR*npd))ds{oiPalnc=L4H^WW<6$A6l*hu$S$2&B0LxJ@+Z zhWPLO{lh~3@8MuPe7gVVQJ&iS|Jee8X_O&(Mq`!`@n)H1v8@!qKawe63n-j~B#T>9 zG)ss+CnXM-N77wfb8DOxNaZq|m6%Vs#+;qxvOjc2g>x&fq&3W2jioazIgC;qqf`FAOHi6n%o4H&U%yT&3NdKzZ+3=6-MWy)$MhpbWCHr)MZO_1k;^FY zwrZonE@NAC`kGH}LF&H&=z!xlZ(0BlM8!qf<|bj`3Dd}%ueML8;r+y%ZDAbBCOe?r zo8q`f7j6B!6PQ0yut>l+$BsWGNC-gz<0Ed%)^7Kk|G2p+-}?c>kbhpK`f{%CafA%t ziOXseChr6BR8a@JFcrnyK-{YvERyRObUuKC@zLa9d<1%{H16pZ{sRPyWfJo5^Z$44 zegnV$3S^&TnHj|TGQ(9Gt1Q8L;?(gv$@sv>yr1vBKVOZ&@yQ$d|A|gYQp%KQd9Q*&lDtfV>Wm(RK2&2}hVu1mJ^mXSHofCKAk9$O zlZowweDEPw3@E4kDvc#vHAxKS6L)m0e4VbGtQ;t(&EjRYPOCnux18&^#AljK-H+-; z4xm)RgZ-0nTlH+T|I`_9L~ef$sNVh?3=YPH{7=LF{^%+H-=jP?@=V$Vx9cE|ff;Un zPK%H5;sm1NR>Oe%~v(=?ZSyfsJiI9C(i+|(Etn^x#DUqr4l&=*GFF_}}L z9*kCyFGMZ=x7YL$h1@-{TlVQrJ#ui$yYt&4W_~c{au8#RX($VE?0gb$D*9FosHwJ- zx3ED=tweZ+f_0$%Xy)hLAv12I#&Qj}M3nL=W^}Ig@ooNXVvWxBz^&=&0dLK0pNkE} ztBGTXoP9ifrDmY;YP;j6hM~(#xf$Vd2p`X1f4ICekUIl-dwl-WW)PxSEsV?a*B5t$ zbM`|`Z)z6i72tmO@c!dj9ffZJ@;;#X1aEPRfgl*ZkE8X6Bw^far)$d4(vixgDttNo zE{S;+P%_rf$Cn>oAHTYM|L)CyUw(N1zA#qpLE9g$sBTu@DTh6knt1o=^wsI{<)_p0 z)9>EAzI^ri)9K0U^FlkT1c!N3mT)aVdG+D+)9VkHC&y>U-<`fWy*MpFf>Gqb*}%E@ zpURQC_@8o?MptjdE6+mZY7abL$vYgJg@K74d45&+AOltTmsM#g;%;2JYZ}+JL(nf7 zCMX1L6t6Hz;w2Zdd3>Wtl_hoxlNngTlD6dOL1|p z>}IEce(_=ob@_GM?q-2fFEx&ShqVu*hlr~i}tGOa@4(5?TMo*2KsW`0^;`jO^DlNw?*8kyBYDKSgf3aN7YPTVp+u~ zC|-#`L6=FaGYO7!UVT#i)xVs{VzZM|+{4)g2n8CHS05@>Rr^flQlu#g@N6v_>`4%_ zgaDtC@ZCdgeu%$Oywbd0-cD8@-R%mX7|>#(4lu8B{&Bb`uj6GJn^}REPdgP{>bA0x zJ6+;>1zJTeI*xv`{x)k z=Vi89sal8CAx)Ag@?&k{T6^ENfJ`1E_X;mahTa{YgY%Q)H?M)taTEd(pC8W>*-2iq zya&UzcMCXSPWeZ@Yu6TeOhuq?$;AEDY^#Z)b~soL$VAoVuPU~K{Ch{wZ@+2u`*c2U z^#3jr%2LRJ#Y6dj`-6jn;{Jbs|LOkE$9W!k|Nr9stM?NSq6jer!X&st1O&-4O(>FY zMJmlWKmh+2UpfH2rv)%;5A%G$#c9~VR_AdCp|92xueIEdQc`z6@gsApf zzknX6buXhtbV&|zM-OoUR+I!+9F|+E0_5$%dG%w**#fnZZrP>*|Io=O>F5uhdfqzx zpC;j5GXQSb|LgDfi~0W!2m4R)Uyt(0{lC`5LZnBNk`)UnT)qF-Z8h2e zOq0;g|K~XE%r2e0f?rru#do#a7Ui>5Qr@7mh-+2WYy+d<}s zqrjaa?!vU97Z#k8D5DIK?=hk5XUrBq%94e3XGMjwiSK6h4`X$)WH*r)?s~omj^s8M z@qMKT60YDC67sEgQ@7lfpoaQ!_f0@Q#-gnCVgmm5_j_#0?moA-R?!Q zbJN<@8J01-C6qjoaSaGQsdYB=Q+g_w7hcJsmL54Z?KS)J@>l0zr{j6lhorC64d7R3 zO>3I@6=X5~1^fzVLYTPjb+@qDl!w{qJH4x+xt?xoFCvHHh6{so$Z+1CN@QOKTH5jO zQ0OIqGDCyso7INTf2rnb8i5_X&r^c2D?ERjv}Q?BGJK2HgP;YkuxMj%!({FNW?qumIRJX@djb4%EN0N2_d;%VUjBkYcM zfNa|TIUJSl|34T$-T(P0kJ$e?6ZuDs!%yFH=Q#WtxckH|x0P4WWHO4}^iKZc?}fVu z&DkgS%0O4+rYaAM%AiuCO+`sZk(LTe81fzvm55HgleIfls<+A}l~>21FT8e-@MW&t zK-1xWR!XiLoo2-J!|JT)#dDJ+rbr<7V1*UHa+62H*oj?sN)h$>M{C#Iy=m=zM&yPb z1z{pg8JeYnEWEu?^+jwE8em?1Gke9Q`6rtYct)rI8!r%pD7cDsXuD{F! z<17VIlCUI5THPora9EW8B}snkq%i?#x?>iz%h zz59FHHqtQKpZ!gsp9=XLC~_1Ro}Y$rYMcKg&22}xK}1WQ16v`x?7 zejeON5F{j#anf|3=!e7-!NCkJbHmI)ncU^ZN^Vr`kr+~1pevgdxILA@Nb0FPJ=%++ zj=mPl!sGC;b`$?ejPA`QmG>G8u9IKOr-XxO@=A$A{&%T-ft*;A{mDiZ>1uUn_NE_q zI)+B>fy#^OoJlOEQo5Y#QWjdXuK?|2ezeDV#Q#WgNYpqSBB6{M__Z>}HDs$*7X?iXIG+ZLC@Dv~fvQ7xj(H1nYFuf+> z-F7Or4ryu54fUj^w|oqQI->}veR(G}&7r5e;npoB4OPSj!1x@+aFZWn8PmwOaj&Kk z*gmWpJXbl_8M;|!h%QMSRbksL_5{rE3XwH)qFjEyC(yKfnrFi-J+6niryWuM=i|u# zo%){{In`1N+@b&V18->8fAYrO7ya*3e1wVmR(e;rcmSODd^!WvZF7JB>wrvmxh&32 z1kjSkQIrii`KGW^kHsbwJssK(1@wzqdGKj|N4zNECp$842CwN!S8Uc$N<9==2!`8J zwl5%T0o|)WE2A&;oKpGirwKAabh@2G=?k!`tXLIRij)^wJ-vjIfpw{_idl7~x8n@L zfT1&EWdr@KDHKUSMpC#CzGB(X{&fdb7jv}*`>(q%-!ENe?>;rW4@;>^?s}AJHQa|R zPfjgOjn*;lLsltCUV5vpL3JgGjU}2E`>L{N_;csN(S6#wxOmICZmLgrP1BZ%`f>p9 zIG;V`{|7mMcF6z1a6Gp2KfKYG{Etua5&oau@_#R1P=0i4`L8uYG$p-T0mvUp|CZOCL&+|kYidcU8myPB(+q&%99+R$(#A~)h*#o8sNHiD`vwivYOuFi=Zfy#A zo7eX!%Wza%NI;~?3nzl>C84TR{W1o9xkmSADlhifV^*B~9af7IB=)&d#X0a82w94# zt8aUN=OmL}#cc@fe4|b&EmBwY%j|8TmPn^v$p6ek#Pc4@hZNdBX6-G|L93K)&T&@W zU;5Wl`PH(fXM$Rx2(K%i!s0M52iK7;J2l$#_8utyH+q3r*gn;(?Idqp*N^zB+n!kD z)_61r)sZAwb-&2b%u}N~hpr|vsku|S;^t3e_AeB&oTcSON%B=}G!SQbNT&ChtXSA- ze5vbYT$~zeGrL za~ZIM{||@0?f>z|U+(|-G@ly&uj}?u06_+mh^&C-4B`|*%LmM~W<&uDGeRj?r;%7h zD8h_tzk&!GY$_Q3rK&m?p)d>1CAm41TjKZKKi_wX^e>^zcNB;Y&~Y+5#7eh&08{*y z6GD;`aPJ@7Va{J<68gakF&IGxIb)Hxh#R3TmJ2}NGG4>OYB;f=Dw?Gky2oTK<75fB zTc@CN?{`2)B4E)+Qy3OR3P2sb-~SZNE+M5VLQ4P0Ia2v&Nse|r7#I|RQwq{I;3<$k zHltaOzn`O!3ylsq1nA}WT;^BwzYnmI7^;D2cPi|NW;mAMl=|BfSOrJTZc7!) ziXr4%NaTaPTCc#+s~?)$Mzz#xz+z-j5|&G)xd|(Jt9!E~W7k=%#v%{5`6WI%KK}Fl z$)E54`_K1X)yqi`cq4J-YHu+0{~L-jSBHF z7p3uvMCcn;Qs|RoEmXafWQ;R13w6QE1g36=wiT`mW^-`=ie{k&N&G~AiDinv7~`5X z@HnHy`|1jvstyVH;1eLAfY+g*9(_b4q>JQr3V&IngI{Z}xm1wy`Mk^-(o=&)NQgO$ z+70GPF^L?M!8P^;)>~&W=!jLxK{Q&BE&AXq|5NnCcWzBTdu-a4ojC}5^bSL^N@K)O zxv$@mY*K2GVlYBle|6fTkv~~en!eLM8@F^XEkKqH{&;6G!K8Ewp5TU#Le+q$pp{YN&fvxF$ zhwILPZUvg%c>}O@c(-;8=3`dd#6|yh&)`lvb+0Ylg9U8UWHf#q4uXEkYTT|qY_}b2 z-`&e;*iA^qt)xMG-k8_9JNF%Rx8w77pk=2MbSpQ192e+55M5qSYtZYL%Hs{#9-ctM zI5Q|~=?|;}mYSe)CeZ*?Lx-R}J?(nh*Dd%sy}6u&d`*1BE?q9dkJD|vqwuq1{;lZ} z;-Q|nKPqVs=jcb}V*iP5(*M}c9`=8RBHZ5i-=qGI@7eahKj?qS|N11K&&&Q7OYK8U ze*vJ@>X)E@FN0t7{^2%%0cMBUAI&a=(R%VtULURFb*#Y<|K_~=(VPPU>^1|w++c^1 zU4_=htgh*Do4LHh-WAYHl|cS53dYltHed|%4jmw$u*b8T)K+*LlW8lkJ&Y9bz5>(I zG?9bZ%#<+DZVZ241L8yaaG4E!B|UmaE@PoVXJ7QW|Flo7{OX#(kEs81k5?x$2NcJMbMtRjd|1LII+4lXqLS^w6=Lfw0T56!XCNUF zI@QI=i+jTkYVO=J77~Ap_BepNjN%>IbU^3Z*RMN8eZ;4tMsDZX=~ajS`;U&Qkm%AP z9X)i#6kKE0Yk3P6P8Ju7gycUze}}@gC?j(KKvyN`qa;N7WPSx%xP1OD z&5*oi$2_su*Jk%hcP#J^Nx3RbvJ-HT7(YugPb$^hRAprOxD1K+Ba$X-FYc~nn?4}C zSh5q~m-w_bk4u5>djbqK49YVIpdqX z13GfIe3TjNl<($7zW|-MF8VYR!uR7EJp-VTD6G?*#d>K1RlZSzT2n{4jsvD7(&K;3 z|4tZgJ|8KGEPg2NElp6u^0`3oSO#D6Mf*YxsyoXXqWv>y+#dN| z(6Hxy4^%3ac4#-vRc@H3y}R`cWeH-4_AoilUpkT17K#C`bXQxOQx(~{ zLz^S;C$VcqEwIXf+Zd?}fmCTO@m?)Es&t%ae?*CIa(<>pt;TavfvoQs`8#K~j@m_~ zOC(!^&LSo=7z?qvg#na%$R%JAtFJ3y_3~bgK>p$d1{YQ<{>yv7$hEj4CvRC4fjbex z!|F)@+G;uQ!7D}$tSN`if22x=ZW&13MBP-rV^E6LIho?gIhJKAK(ft zFlE_B9UlTAn8DKsr5Oq#L(vIXQv}MBBrk8ZG`F@@E<>F=%Rh2I z>mL^TPB)U@_t}IctR8U$5!VhN<8!E7DX=)Jrdx)oGPaLCSf+Bndw^>2`Mrhz4*9RN z^p7q7yVY$UFJWKZIc2skiFI<@a-ZQ)3XWRa#jASCG@dFva zF8x0k*!usNKmM}+Kf$ND{%^|fYq>(eSqy2dEY?d%T&PwEV54$oy%}H@qAiR8uvN}l zedQOW{YgC#NXpwn%}T)L!(5#tYnHCf%jWW^s7m|X;qVmw0y^DJxkR@7H+vaM@XKM*^HV%w{~ z*3`Y$cfHkvv4-l<-H?j)2r5_OJkE$ZZuzLY5HT-KVvK;S=`4&ng-_RvRQltH;@{=7 zP5!eqzE{__e~<>SOaC8vV_W_Q!!P>(C;2pz|J;D3vMlx*$(t(F?aYNq-aB|h;R2o1 zX#>TAlE!eM5Qv}aRRQtS-o|#d3yUFg@=BLqOJb~(7?#HRi9T`xwKe9;uRQJP^Bq}> zCeB+XMU_WN3ljeT$O_bh_C;{~7(CKfR|* z*dLBg0xGJau5n|Fy{q)ygf$4fyb%12SpTi@N3e|@9tym+L_xP}k zB#U?hGQ`p6Oeq440C-PuR2@YMusD9rNVJxBaiioOXCzsng!K;o4^HL;EE!Ab$?@C1lV zLAp-mz4>&B;uvt-PR9J;WN`#C6hnsZk+@XG_#GzE!4r@mb%*EEG(&Uz4n?xC+5bB1 z0dZ3(NyM8RC6J;F#5h5{gWmb|&)1A(=->%B6H6AnJ-Y@G&gemJf!VS6SE7H=oBcaG z7XRuWmWyNlkN!&Ulj8!=42E~>RLDMh@RuHaNDuzfo58z-zx3FO|4lNyIQYx|ckl$f zg_+2QyEuPN4|-`v{)Iwz(8Cde$Fg}w{&mp1ry+^Z@gISKs{McV{pqXkp1*kgU2hdV zdLLW&zwZtGz|Q~Z2Ve3(KF#L|I9tMGfnu`w>n!`*!NI{_p@>cRMrm8!Y0vNZgU;Xn zdJO+|@Z`x8@MG!0PfxWrvcPP)o(VmKWosnTe(5nxQ!0Y)V1|y(H-lcUSAuj1p7y5otP{qb-wS}>(+M2~s|_wA=7h_>9r+uYEkKZ(2A5K52wvY9!?Jr+pqSi zV@&o#qGm`YW?1+FSMOcu-l8Or2oi3{bS1Lgh1SPja9GRnj4DDShI{po&-O;3?Oo$Rxl73^kv z#h-53D=z(}wR&S|H>Psq58I7pL;b|xrk}XflUCXZLzH!cUSKo7;1P)S8ZID@FCf{` zISHxeEzfWkJ%btITm{N|&GBr_RX@&uXX}ON&715e3UzPZ#5=TjdWKfy9)Vku-AXf> zXrmTpi}ea6l6U!|hKqN!W%0T+w)P5Jc^*x5&1=U9yg@U1y}=fGo%&i^dTnjZq&K%j zzD1CUh9ZDdH4OXlmtq(K*D!dFVer}w z!=&er%RJjFk3(SX^JiDjPyc@L>N_AkC*URD^+I1k$$j@8W)zS$qc}o<%=vGCBI(Z; z1F@&hoezZX)enTkyJjThgVsY~*qRd3wz1%5_RT-Q4B=z}9@KG%JhO?oU8B?*zGxJC z#EgQx!U6^JjI89~WoQMlIAuCbQ!2;GYbN(R&ms3DVXm=i#Vo~}zBN__yX<%SlQ!(q zpEeUjy!{rM>-eR7(3)n?qS-fT9$M=oBw2<+#utTT590Q5n{^1fNBb#UIo+ed7P{*= zgnZDF?onl~J(KQ1g;&NTysIUa?}ac!d?E11l9zHbFh7@51oqR@$G5NEUYuW?{`~gh`r_G(=Rco6e|vHE{Q3lR?g@@M$|IE!@ZIGb zfGL2K;srO-#EAF}x0>%}*8`V`8nhNs14~2=3=!qGJZ!cDS;$zzS0a?~n*3#0h0Ej)lRoP8S)BkUVZG0sx)#I7GytwTK8T5iu}C zM2Q}Qb8DnI0h$<^q7ct%vLe(tFh|PwP7z}`Sx}(MmWh)b^($DX;LY_j5TSbfZ0GuJq8FDxkZPB_-g3wF8u;~fdGUc&|GxwV_VYt!{xZ@Rv<>H6hOR~bW@e;sf5 zf?uaVRG{m^Y>@}&Dxw=M9M8RQ`mW8=Z@pRi)@JFKH%s4Q01*l00jfwqCmDk=*J9>) zv4ZkQO58||8AxG9kx0nmYfQEg12Wn(h)oa3$alNj`mUYSZ@rWJ%7A$F17hr?o16bR z0@pX^7q7$+TwHz&SC}u1(mH6kr#$y@LjC!pe9)3?&x|aRkZiJRQSoY{cI1QBsFXES z&j{S{+dBV7lV*;a(Zubz@m$KR*IJqNEM?X!DYI>99*>*RJRWbM*`dsOt(95NQf9r9 zGP^g;HNFM$)1exJX6$z~cC%m4rQCY0m0Qn}+g?ez^` z(IHm7)?(GO#Hv>kt6n>&!D!Hs=D{|a9a7b6Emb{Bh0zAY6QO`_nqXsRblg5#SNXP(tqcI0)zr&ti0>N;T?IPjV#s4H;YC$=EpB zwIjhFv>u6)Eai~Qk!WXtjQoZI%y$Yfj-ZR?mO^{l>kloOM<&fJce&Sap1twjCpp80 zC!j<32`DGtHJ&XMf@!Zmu*P#}j%PcCVAxOz8oHGrj-ZR?mI}eN*AFb32L{b8y&l6+ zvo$mvZQ~X73IKo5n&!Smb70ausd2#QsEueQ@9X2tQ{L?+>1}qXG8{P%RXB1kdRuA( z(_Y`V=ql}Za=UBTFnnj|4&UL(yT+rXrZDaGJ!?FCb3EE<3d3eu8NB@# zn(H+M{-7<*{?ww`)D--7p8KKSOd}lnPK}Tw=%9Je^SL^jCuN%bX)VoaA#24*1Y|~d zF2XdKxDg+$v-oQ&cD+tk)0ee6$*D_2k`F#8*I;asG%-nX9!69SgvInV6!k-I3!C;` zDxKe2rSmP7&No#$&t}ss+o-Z45KtuUtU`r$yU55o6%&|Wyt@G`gE(;#1+O|mLT`!@mU*8nr*tlWZR~5DN%cBzI8-eN|bLZQSR^}i^y>^xAkD`bX!mBv$*Ah z588_M@*K1xw3&K1aAh|M3`|w2^t*vrH6claro%Wc&c@9kbwUA4Pw1M0W;sc`y=n1Sz#0Z_4F=O~z?$imgF&zbSVIGT&>wFD))2FP2{ScUCH^f| zVT4jD3X||d*z?V8nFzkABG&AoM_gHtGAb?wvR%@9J}QM* zQz<-T4nmZ%E>)MfkVFrP9ExU#&I5Oj$JB8WHf?(lHtkt%uYoxfwrL?lrj<6K4Zs*D zcgSh}xtvz*eO6_B0~24T$D+J8gGsYMyI|rBw3|B4tfp;`tfsbT>DLmdCPXoGyBs!H zAdz61L?}a%k$)$tZ>DJn+Z?e@rK2tNmPg7rsdqYO?CEV5?GU(=C#R01s%hJks);?l zUM+$8oa$ng#z@4x2xkn%t2D-Q9EuWpDsT3gtp6!VZ+PMyxKErXj=7z*o!d!yZYSlr z^($PL5|u+PY#v#k7$*yW6F^aRk3-|qGzSIslQ(HQc~+|Lq&#`m1i&2oa7`Im73YZZ z3K=dY6eYB$rmrDm8ao-2E9fYE;&zMrD1l8MoR1H%?P?EuIp=K2`Z5 zw3?v|q=d3XhUhOb$OvH|g_J&!EOOCMFUVULsjzBP3`>H1-y^sFxS6KXA3HS_S4oQ2 z6)CKO6vL7ruc;+)EiL0so>(L=2<4{pQAwv(soHG#4ReyZ-Or0p2_Lw-!|W0mIuZh2wBcg4o5@o=S~oJ68^QUl15QgE34(lz~$|E{gnSDq!F3DGgkKO+o9xroakp3e3PJ zzw7PkFYJ$+IYj#-r$aPwg*yc;!=1#NV~fa%N#vdfPW^_VnSFO?X5fl(3R=fF1y+nx zV8%F^MCuT=!khs~M3^{=^u_Mx%0`q>l1dk;kpkKuHB*cFBd6gSxT2zh)=^P`6%`ej zQBmHO8xhp~PsfEyav};xcsj%_!V5$hAED7W7|#bIIT{U5Ap7N*itU+C{h;BN3bt*j zdL27x9h((cu~~r`o3(AItt}NaTu;Ha^;ECr1|J%mO1_% zfh%?@Xc;>t-n2KKUr&tE&A33zFa6e=O3JqiQCwS9v86ahpMc7b7ujX3_XVr$rMu0=R;<0bD`PQeda%FjW23+_Jle8Rsc#SxAe9WeBcfoFEX* zz&eX5fD30xci@PK3fe|QS;6>$5fP=Rs7J%4MYdKVEgf=PJDB;F(=G!;nys@~rFiIc zPrqT}tM5*H4IG}(psgp=DyJ3nOoh>%zT+;6=Qs5D`)-fFtLRqinp;-Mt)OSBZ0@`r zOKvvwpZo4mELVlC)&;h#`dUHHRMkW_emxp4wWzgLWGO|#erUM#f%fV^8IAsaXgDQ# zTQqDrz8@Mcf!R`C_U%dW_Cdo{r>J$ABCASKzdR`eCmQvW(z^g5M1AHB*)bAIswNc|)MvZ3}H9JtLpB}HZ%I%d^ZqHD;w_{ST@_Ox5UgekY%bJT< z=)D}5i4&K4#no%8xO!#9)hiTNj>gD|M!n+dwN+fL`d40|xNb+IUY%@R{K~T@Wwaj} z^?Fe2+DukyCa=(gI2tZ%!c`xsWqG80oes*l1pDFQ;v?8 zjy8EnMCzsyyFZ;avd^Ydhj})3iQRE)u{*ZJ?${Q)?#n_-Cfc;w`Sa9u{5*Dv^Kol& zKDNa9*cRu$BR%5*XK1m8StRZO6L*6x5L5U6)P{`6u3Xr++P>mV&%)l^z?C`>$@)&_ z{=L0?rQ!wo`h*NTAP|w{YbFj1o^B931Z2$snX4=Hog~$9f^lo5W?WWk#V*G3-*G4rmsOQo%t^+_!$o18vNUe1ERD+w%GlDADeNbHC$ zH*Z{%WTG|X^X?;jsK^qp~AeP>+OcgB{!Q!{DupyEDF?8qG#zIBSxxUFI|E-OZ3 zOEGekClzlw&}iiW<1Y@%XbiUvo8mn%NeC0^LN737a)pcZ6ZutcW6q7zjD(0%RYzN0 z)E1dJ2-9Y_kxyNhk&hiZXY879KE_(E;VE%sAPaEG_uAKR4QMwhK{T=u6ma42NCaIp*fVvc7IVv+p0Wf z3^!c*Gol4%UTjEiGs+bMiX#+qBIJBD3J;mOF0vXsY@Bgh8)sa$amJR7QyolEahwZM zt_eXAR(T28GOyDjQ)@Tsn)vXvPVKL2Ye}Y@M9aS0uS2M9f9OgY0lu zrV}egf*w;>m1BivJ>_jfEaakqyH z-p4@3{;Vm3*;n2N_hl3J2l+e!7b;DH3&VqhZ`X;81B~%3gV{!CGB?>8ov8@AT@9|W zNV5Sk5e^})1Qk!^t?pd>s_%0mG!Y0WUf~#KAcc&fEI9&fiD}-)1EgTK#<39184^hy zD~J<@63Dv?31wi0*aJd|)Vm~j;jQATnG*Ue+W;6YF}mj{E(nY{j`HIA^Q-^qao!28 zq0 zxcUC#8k~K9dUXRXuEDFD9tf8xyc34NkH4&Oc-Q4ygn`8xM~D`ppy2;Kk}Zx`Fj>R+`2P`aT=O^n z-1oi{?;Lx6_cV%dvgj6T;rI~DaYkA1pbM@M66F5)1HQwq9u5z>;H*IH9Mh0wQPDb* zKlB!hWA>I_-hBVV4a@jTuTzu&2!0d-s);B|(8F=KB!r^FgKoEba2m(p3NMz7a@7)L z_b38ga8q95DoFSbA^{cuU!r)`Rjz|a7Xn-PzwZtF;n?E;LD2WU@c&Qo;XF*n8FS9k zeJhs0!GW=!F$HOcS1`lzMlj)sGhv}nZp6BOb$YGhkvVto9eht7&^^kIzyng*v$8FW zW5xd|pbRDv%p%#V?5PJX63O=So4z;%yb|`9dHI(Pjg|`*;6!i)dG?^0qF|X~Pjd={ z4}Z2PPtv(7De53Ugd`PHW22CvY+NrE_J!*ng~J_YZUtCj=# z^)~@Q+>*KhFxk{vyA&)@Ci4HdvCAK38-N*F(H?jX!)3jROqXOG=U1&!;VZgBo1TifoOjP@$#H6V*4HQtmm|)D`?~;V}cvErFpMWo2 zDeDYHV4XxLlM6^7RCL-4NhJAoX7_KpOG{X2)g#9P3IPTn;J~^HnnX&tRKgHZ3g$RQ zd?m9z5d4;8(v69eIXTM3E(1UE)ftgc30p4PNJx8zsV<}zS!Z3rxRvNqR-wYYs|M`& ziGlE8{iyWB)q(FpjHy^aKX$rZxMs`FQ70h@>incvq%n}ZH?c=>f&k1GVtdjaU$hiQ zsJM%>+g($XbtA}NH^P}1tRmf(ftbj8W^yY^@TEc4fTY)vI!KVt#|XR!GeY=e-p*l6 z5y$+w@=LChq&kJg(#DCpS}<~UabLI3L~(!(K*>GMNFun@J% zCm^2(G4NdNC;+OWRz>r9&Kj3~EbK26HMXOO9tEzMHp;459-cvE_J#q~(B zzG+dj+r`?QDF?X9FZT-s-(d!_LT{dJL@@vlMlKm;crGZ=pOiCi4rg)Y-vm!l(*I%iE+*p zLL3oU94*aIh`23*9IUI1+O<5>t)lk)9j0Qts8e4x@%$Hi1a7pY1kk%w9P?peVa<@- zhzZMi76P|8`Z=TUb_;Xu;bf5^O83}{FafHu;VZZKs;e87zFyM}SLDrJ@=}4#J9!}4 z9ZnYKI4ckGamN&{9Hwds1alMd5o%A86eTE9nMx)@V?wjKn1h5cnYATX1x!=%<`JU@k<88k=nmJ2L=NiB)e8>jg=kT{ zdY>kHFL}!_$rt?F%U8K9`K%QGJn*o4pC*SE**%Hiw>U=S71>ccpmV~d=}|`?YIjaL z$M^>EHMO@<1g@@pE66-6$be%eYDL@HXFP1hUcC^S==E&ui?%Z$@X^Jbb%3ZO_ zmeFB{6&0Izz?=8LTNvX=uXJHk>6eaxo)MB6G1sEg`5Y&hZEAMGIhx~yTW7jSND?Y8 zL}MUZ3un%cKW1qDQ*m%`m+!$ICW1pBha?G6%IGl-mnd4tI9YVjy>zP`b8~i)bW;*_ z6B420C%UgLOrkDK81Cv{6qAlqoS+M_6dkKeHrcwk3Lw379mkg>#-U{!U(8<-b}3E0 z%9x+ZF655j5J0LxSkN=`)XRXrScVxNA@g)aytch78$5%HGTeJnE2;nAbP4;z(Mf-b zqF^xbpoh>Pn2+InH1X#s8b*V8*!PD+e*|Z9KOFc7Mrbq*CbRx1nuOD^AC8BUU^_OV zcaBk=j`{i?Wf>P^!g%8?w4JF9xMEibAZtcw2xCb}KCyq*OZab`)kP72;CqtcfAe=^ zZbE@m^`e4Pn5kPAiRlJ%FBA({yTxLfxAiN=?xw-2F@W#Uab0KCH8kk;d!AlGlRoN4 z6R(ek(^-Es9S*$dXxN`Z=uOZhn4wwJ_q;&_N29?Up(&h=!m010!FTCccL>yijUa*+gl(MUm8FUGs?|b{s*p zA_+xoOE0xrnlNLH!lNJFquax$VvW_P==S#e&f(>#7T0jJK~28B&p3QoKN%7+=bQ+x zle`DFKJVkzS`;ECa}Xhlxs{och*n>|#}t#~drUc}eSufPMXvw_!Zj}8UyB4G*%~Zm za}dk+7EB`IQ{ISR%3caHhNUbq_-le=JrD+w;L3az7_V;Yfv&R!azQUf(*nMN?|^!9 z8}M}k?;(!GT58ip>HTs?T#ICAv2npIFI})s7a5EY$Y1-GWZ*pSn;vo98%Nq0;hOK2 zzJTnhk`9N$wN}DXdK<3QBwV9fK(CW?6eEVJuNR*uYtFN-d%q z_#`?HqN);_IAr{LXJb9d#&zS-3+@fFlq;_~JWker zmEC|9+<**G65k_`(3p_Bb*j%JNFq~S4EG5|Y@Mpr8zrd2q5gRt|_ROl49OpX#n^c>F~A`?(#=mPr46sA#NnN4HoPaksXW-c(xIDeS{^9%teEsXMpm(LN9uV=Ezy0<# zI4c^64@&O8&B#i91EAN_b0L1Oh=k_%NqbGp(9&{-H=HFgAr1>~^KK}Z^{xxN&0$e`(`=K!XgeQDZ)m@O_;#&t2rQ{j;*rptq_-z; z1?33vMT#KZfE0&!+B~0&#AAK_%gyy8fLAHW7)+RBXX=QIoxTMAs%ngOx)X|qZM_LA zh?B21oSunlk3ZUB{pLqa^_J;_I0WL#!;H_Li2aZ1I$1Nq1#;ceKV35t^Jm7uNbaoT zPsG()Bx6T1DoFU|#YO&nmC751srhyd0#f#Ui{GK>C61yPaqdoQOygWFAX-m{NzR|a ziodH~t?#0deIHR_&N7JR_|AO7WtiZE zDGZV3s(gZ0kl|27nVkuhnF^gbpY3AYO=uz=G)++wNysu&M08s8Li1Rh{7w1Lkaufc zKA~(7X#9%x_mrZPYisDRgb2rutVJ{yp-RVH>3&fXi9pKgNDHq0qxX~eqs%(Qmh7T; zaFxcW7n2aif{}10tA&g00#mzGs0(!)A@5F{&g(zwf}}3RvE`$HuO6>n3Xv??qFCh- zSF97l02hWj>*jCY0KexCy52q=>9{hN#L=3AT={xyi`IFe2gMCBmFLP0dKIa;d-p0@ z@7=5VQWO#2qHLLMWjvb>pwBzWnUuphbP-Jdi zT<7XbJ_OIWgqG2>uk>C2Qa9(kOBKq|xpMz1DBGPwqAm;EN|s6wDVpf;kZheCiK`W46^OjW zkw`yH7F=V(e7c$LM=UwnbByOG+=O)cLXM(WVC^<(2=mFl^z zYSde2b#92T?Aa812`17`kiHqABl1nD*zB9D7uUS$nj#}$lM`_MtY`MP^~^cHX4QS* zY=UWb+N?XNH`hw=8yqvM_jdGF>7jbI?0da&FVKg}qhLG;X1)i*;ix~G%try7ML{%& z{lTa|orI&&coNRhY>LLi;WQi#`=jA}=#56fWH=A!qaFBY15!u)Zk?SXoY*}*B|y&k zIgKCShE{O1;*Ra9DZ_3sH~Ph09acN3Opo9#OwZ2H8%Dt(@K7`k{b&%(QRGjeS>*fU z@oYRo;cPSygYn4sgIPH6qhJuhe&B@zuMY>4;cyp1#`HXp>@FY59Ts-Ed7YT30PP`d zy_cmOS6fJ?OIWE!VotD9EG#h1jX;aI3dq8-@L{OQl~lC_I#poW!?Z~e?WywwdQvDC zNd2#V=%PY$CL}UFF*av?MIx?-$Lhi)BVO#$1H}>%#v(D1J~$QPwsn*55qW5WX~%+f ztX&x6!p&rF_fj_vcDs77D}nFVccs4_8-ErCa5$RvLw`DigV`WN!*Dd7&%ChjP3OVH z3r54fk7iNekD_@Wj-%0JHs}v$({M1E1>SyG>Fr-SL)*3a&Bh<5A?_KblV?^KJ*x;6 z7q&X_*~YaRzfE1Bds4-CNh}MdbA@2^Lxvf8orKcyd0Mp0UGhZ+smuuINrOZh3`Ffv zVVX%zWb*o z<$$Qmw`X~?dXOy`xjCCcUw464Nrq=J#H%{<^I|UC{SPovHCsf1yaebMLCD`cDy&m= zw30vP+4!|L1Pzj7LXCi9=!68$V+{M+qO zek#HU_`3VGiY}lg^x2w~7lx5x=$wN`c1h@6?dUB-FcOjNHOpJGWjr^Ds^oP54x?Kb zc{ROI{BLVXO{dfEaGq8K<;0MA&ObCU8Tw_7D9b6T&5JkdTy?51*`Qo(GKYOJ z7pHA}A#`t#K(tBV3Wt)vQA`qbX`qfhF1?W7MRMp=!cTTP(}iINqP_YsePgX0fP^ATz+V?=~v7bY3A8Gb+n- zIxwupSf%%&4z8-Qa?!jJU3F4ijDDp4{QmL?r1#+wK&zB(&T)369AQUA?CDWa=9J5O zd6r#|=L)9!@WG`=JXep&T-0UI;moT%mw7AH{~YdV5+w(!D$Q0K*|xiaY1QsDq-ZgY zYRqK{oo0KxG5FZbRVJhFoQiRbfE;k5~{UJ)dwUdJ+JK>P(c9%S+D2Th$+L zF9x=a!mPFAs$wi6P-fVfVD~+tOfXeh9f9D)sBN6bKyrMKIg~kxMHVi}&⩔@Ge&h z3C*!@gZz`F!sQU$ygq*oR5YznV~EhD|6j0#6wG4YWn}m4qTH3pI>Ske{MFhX>bFZr z#3C8}RJM(hW;-{HSeGzfi+y~n>A9^(C_?vpaf5tVBtDNbaW0HplMtc%$Cw1O2Zv+p z_sJiw#niD}KJ_Z8sj8vXTM%V@GBc1ogq1dmTJGAMXbaWMn&QT|ol~-1quBh98yxMg0 zr@#GVDdwtM33t2AXQA>RU^ZD4xs7PqaH|2W268X!+3NQr8*Fq5GvU*(KSRnB#k2!Q zcftq|ujXaaOBYqq58`j4uLx&V1wvxmTcHTAYtIRE(4lI<2Vp$x4KO~09#JLMeJAeWE<{+2qbCQ*&wRpCkTzmd+7tvk}-0B*1G zzmdf8nZQMw!Soi)5foR=Ecg_N0xPO6$%d@OSq9Y+S3tOxMXsIz1Qb8PmXEcoh)z5Yk?_s7Yo&6#9u0r?o-@F>p&w1jrwNqRD z4Cg&tCx4I~uaNy*r~ZR8z#lPfJ0;QS&N3l2H9K@E%kujz3xF8FUhH3+qw-esvKt17 zYj=sW+h03#`W;uaJ14`@)Xwgu zL9|`*>h5mqx~d6)E>+j^2O~cU;A}MZ=3zMSr~M$D_UA$1h0~z#P5SfEXc!@rNm&fb>ibS6))bXySSK@>&SEaNg+R3T6mM^(6{ z3g4G0Ev{v;$1xa#^iD`;x${NHXD--{-(!4_5=3d2TZCBrC5nfy)2_rppPPvA@e z*$e$#w69yMWjH;3x?f|;3ig7fi7&m1SjBu{x)iF5nz4<(QdUE~6rI;~x3i$TOt2^s zQ3uCPNbDSUq#gjl_cu3}>P;PSq)Xh0HNc-A^M9`MDhY>1W}SYgu2*UuoZ9!Bi05;R zEYG6Dz1C+z zse2GU?FucredHxt9A8heLaej_S^N(yiorZ?b8I*Qui#^^{;52r5>8-o$AG1 z9acN3YMlMvpr{D!kA37#qA-g5XcT(W*?c}7Ov7LtqQQJH9*$;Hggig!&nMAjFbe$X zWHg7c-w%ePKCDUYun^MfW;TP)b*sHPK-IUoBC*UQHoiZ@Nu;aOa9F*tc(&VAFWa|f zH+Aq-UmpN=8@B4%R+Ij;>J8Wv`Uik5;I+txXfk!8R=5MjEAea_a&#?TbLA7{kJTAz z6_FmmNf@tnl?XT^_edS7MVcMMFw9RsGZf)%su-r*&2sVnC$z{jM9De}D`g!;g;Lr% z`Lz?K>&{7M;CbGvbJUUUxz0&v@*VE{cGOYP_(n^=+-~T-#GT(to)g`t4&|rdSXM-( zj?`|6YHljJ4A5%fs$2jRW@cVrOdlmzhB+?|#|TJCx{f8kQSI|06iP@687O<~foG~V zob<6Wkuh(S1LcwlC1JKnRf3d~tVc2~L!4HM(hVZ8<{ne5$_>F}Gb7PPcCKg9IM!De z2h4G-WT-B-Y0c{8n~QVhID7N*^!o3elYVJtE>#VNHxy;y;v78XFB}4t+;{I`26T0u zcvI@6-rpypLM}6Wk7Kkz&uIu_vCNe(?WkiG0OiZ4T1oV%lj`@Q{55?Jd_@TRHg|gK zOHqV>@D&k$MEP42Utmo|0bLhnui9OC{l6V9=e*sARqoOiZcIc!Zso30C%ZJ`D&x-w z(*}jpZ{Z5ZxTekwS5$Ed=K8tVTE)@6OmE5akS{Lp2S@zhk+YLcouYOv3RPS)7~WO1 z6r3ux%;?8xe*`W?&dK>2#_9)Ez9;{sip%2`?J0qN7^Wet0EX>BC>NY)aEt8>572uY)y*-luU-Lh1&Mt4obl<)?zr5`M zY3cJHl+B;QhXg=yb9Py(dbmKW*r}pSE#E(Hu3m_zVqY7FO52EHFk2wDYvmR-7mfCo zb45D(ORQcDz&s->sXrGrjl~n;Mz}2i-ijnceGQdzBADw-vnLfGSIBC^vtS*6-=+ev zm;_NgN$FR7h$6*sw02gcujl+vxG-F+qI_Oj&j1ZhzJm`|`)IghXz8M=7B#|l>>3S! z&y7Rf#XfQ&lslL5wlgWP2i$n-~Whl>e zX|-Z3ji4cUt2T*1woYWpQ3a`V^^Jrern$GsV2CbJhDGQENh0$u67M!Y@!Tfp^K571 zVHc+Om<#)uz^I#B_{S-Uy7&I^lf07J;ZGHuR)|u#K(2`8kBm^)--42}xb!DOio{Bs z*4&D#^*bn&B8rwDTD(X=6gS!xP}S))BPof=Vso8xqxdW@m{dhi-^S;9qs^6kdhEoI z$#K)*yHvpM7B!sofjVQg0o;wZ*3HfTlsA^T=H;W8Fhnq10u*6!TgqDA<)X90IU|wS z$hb98vfw5!yI51j-cj?wy7lG6yq4wGxVQu-5x&RK8phmIxzi=fMJY+jV1DO)erw~_ zV~-zjhQ1SbJ8n7mD1&Nu@KJPBfAV4V(ctJKe{*M_HT~4Y+w{C%-|PF{)F0&at;P@y z<`d7K1e4(eMWbLmosH&``FJ#+p!s0#&j#bctl#g?Cf;z2ys1Bf-fVz|^HF~~o$ka; zo`M{l#xc0UizTDrN?!jGfvym@H`yAU33|b0M)*V?eD&q?d41&7(Z||F+FM1B--qXU z-e@oo|9hTi|L+Y(C_-8HvaCpoz ze81_1ly-!f^G%1LckEbv&rtkLhq6tK=n^5;0mpwkIC%0z)c)-XcEP_sdGZ8YhcMwh zWgRnmaBy(&9=sypC8i~2&t=IviS*q)oL`=FcYWTA9t#<)d*tF>1PPdr>ah8}r|rw< a%je7I%jbhX|9=1g0RR7e@mjk83Dc zVQyr3R8em|NM&qo0POwycH20zHw^E;brsynGkcPrCJBINPp4-b+ew@_vEx$?z30n- zBqVW6k!*srZNQ$InC+U{fnjS|&6{>(j;fKPZW;k@PZHjwS z97e(|p1J?E@ecq1sItud9{^DOe<&;Hzo3kuCL=|L@_zw{6ixjv4s2eO`0zZs)xChD450;BrIKmS@ zbO_zyzKl4I<9N=-5jHU;%cUnFw#g26F~Wg!NkZ!Q-VS$-MmPwHe?lN=f;6&8Ks=jx zR>FG3a~__N9nSJ+Gv6C=Tu1_+I*}jV?r_s63h0g~E>}pB;{F?VYjR%y`>SE38Sf> z2${<>aiVE#3YI@Bi6-J8pkfpfBF-?4NGQ@MsaDK}FRY7KhdPeEYX=w5=Kc` zno|maHyK@#+Z#W$S(D`)d2V(~e|1Ntp5eLVi>ufqMZ5p`=O<8rssMQK=g|y1UW6Tw zgp3oJVaMI!9B=IZeW{hxo;eR=!aNBbaa+$nw1?^j(*PiJT8P zp6AX;#6?rW&41#O30z>mUt-s>IiDds%Hfc3HVIt+c1FDDN6yA%=6jSxoF8%tkRs#Q zrG$ykFu>w>thzVx%p@V_k2#xACnPo(_%=-&Ex`+Phl4Gm#Q}r79E}n$Ho0X*pZOuT zU&uv&d<7I zaIQ0RB4!2Y4=>X1kCLx#i0}3?)hFsK1b=;#rCo1-k$n?^vrQdx)Ryp#@MA~G#UlIeO5yid%N^`=*Phh z2S%f7-;HNv&&AH{oXi3jM}&!)EEiG{iI?~Y|Vc7<(H6*|M8DUIj%?+BB4hjLKEL(`xX@=Os}Yz(-J=LZ9W-T zY*AAB-gT~tM=0f!mT=f#iCd52fDe-DsrY#Gko$XP=&4l@&LpmXGfE2-9e$Lt;({8v zlQQ*OI4+l=WO@gz!I(R67uYs5XUTy$G+B85Gx_PCoHOQb{g}IP=rsA32E=m4x5;-Q z=ihh*^OJ(N71PL{Rau`;2_xpl4smTRYe~uk%zVYz57|F+B^Ou=8LPuo9!gwdMa1U* zS+4G%Kc?cRbxeKNra4E)V}mPkq~$hQ;N8@`9FsgBE9CS1Z;ruL?Ah}#IF9E;)A2+T z)9J#uJh2x3{UG)t$K^ynhzbKv;{(N16lp?A`I{e%dsYQM@9zr(~QrRw~k; z|MMU25f=q6CtRj$$HiK>|HD1zz7$sRh;uy4jcvj`NP`PP!iEat*maY?9&iHpnEUOw zKWCL(k=q^aL8cfVWLiBa33_^beEw}pn>2b!8{_VGIFzxsMSswqX6TQ#zuWHNVA8q%4@8z?w2Mb46j%V+1>6|#4kqGCj|8yFy z@fOPy<8Qwut6^*sH(Sj7=Rf=sS^9fY{0rwfo=v=nlT*^lmUKdW<3!V9+AIB@5~O7! z{{x=6bqteViDxJONJD(b0sb{6qg=Nt%3yjvs!p>xvMRxZ2V@pRw+|R}Fjbj&7Wakw zHTENtR$L1R>baM(Tjv@!(Es`P7pBCWrSZNEa9#YY8vlw`J^vvAu-*T=m(N4)1V<4G zJr*y>0=_p>;&Eo|xVGa>xBy#MctWT!ddQt8>$L1V2<7OMxGpzweUqEv$eKFd($hnS3gpsg+ z_USD0Lo#~E?J*C+UGAN6wiD8kFmWQ0{WleVB$)pWMfTtPi|Is6{*(WcUVGx4k%_IV zIN-*POX%naf!+k89|RL$jeZcKSupzH|BfDVmpF9%m~w~v2XrI^q5m&pMI*tn2^Q0G zq5rRua7``WCJFE3cW(|(&lpp-LVi^QH%IAD-w3!W_Wxh(zIlFdbo^YH*_*DTef%r( z^8O!^HLxB3_wjki?M<;aA+A69$qauUjYdCVHrYQZmb2;kmj^%pB;ub(4H%p>ty+}0Efi^r<4>3g0RTzG52V`!~b}cRQHg3=6oKFe&C{z9mX0vpScINV{@J# zabw4`Ir2G3qe>6>2b|;Cj)fyX1VD(o;}edN#u4Jm2GI_+Po&iqTJP#d!R9HSflTF`C+?n;3P? zqF0*5D7Ok~YLx`VaEx_!h9$9>YeRs7-YC4@B)mRYc&#G5UKSoy?D`#cA~r`jo)e|r zhtz)Ehtw9U)tdCv2J5F*^wVnf>uR!V7@pdsTek+R(@m-9rj~SrT7Sb+(=G+5UzY;Z z(xpn1+TFZeo!W9mZKaditzHNk-9}KZGc@!rUMS<;Z-_vnZHUNC?I{m#PpQ(La=AT~ z{$?bnYU|x5nnG)jj8M*gA)!CY`&D&srQ)(HWI=1_L|> zO4SDa=5Pp%Ht5obTn4MXgx)%--P+Ya?l-D|+%~Ek(b_Pu29t@d3QNjh4Mg%cya~N~`M0Eeo8GmMEd6D;-l(d#RMs2zwslnisqX#OsY&@Z-D{y) z`panC>8}y&cm2588I|^0kuIg>NH{v&SIDS*B_)XP1>E7Pw9gT3VcN=b1 z8}XYu9KWem{HB)i8&C)Ic{-=*O3yx5ItQ(wuJrUFN~;fP#D?l{Y^YYTp<2dtv$^iDd%Ma#?Nx5I*GBBA4#%Eq6?>{>>^W?m1$C*XZuarReWei-cHGUa)w_xb6{Dwo&LZyle6}6M@?S0;{Gv<10ZF)E2wvO?#!>-HOjup|Yx_+SrO=$})D2*^q z84lx=DvVR)QZqwiSToB#n^}f!dN;y2WjKsesxVHG%6j)-VoL&S)}Rr_DZ^o$QiX9! z8O9Ae;Q%$%(;=dCv1qvjdz|ZM2v9>k4Ii}{ej@_xIGk&nuZjSbG6IDC_sFDdy{&aT zKv?JwOFo9+D5;Bl4tz>D3kTSATqkk}JbRxe8B} zGCYO-VHy%(rh8AA2HIen+z3%SuE1+`uR>JWSXcMVwECU7O3JtC-Uw0U;Sg1>LR7g7 zQDJ|m1_ZTPgGR6^4+ooa6>Q37usJa3tm^%&R@Garwh?G{JZ@5}cNJ*L>IU@gxRYP# zt+fG7xe;i}!-1w;1)6dhXoCJ5OCSrjt3A=5+KT?G zlyB3!5&g--(VtvJe{zQY68Ajdu!JEXHPs#U^Ux}4_0WyDQ67#PrV$t5$eMCyJPSCJjQx;sr+bJqL+n{o-XD+WXGZ@?Y$rRyGElG;i4 z_94>oa6zHB+6F15Mo1|Qhm=wkQc6l$?`3$w!Y6SsKM>8Cx9NCrya_jTY@2wcxT4ZC zY^`+L(r<30M(imK$DUFZdrES-k$U59LqN?DIH?guO2bj4R7H_e8AUdSklM{#>K8sz zq_)_p)QBLZ;RsTyB1j3f>&^VS<5{uE?y)9}*|UAj&9etw*~CDuNq8Gg9dFXCPa`ty z*le}>RFR=nMuyGtn&RP3jy*cu^2#tXQ3wPz+iO%{zdbhvw(Yq|jnGaS4((7C+DT<- z*FTVB2vB3X%RQl;+zRbbBeX-qp&hD1J7jdyed$O9>+7CN1O>FsSEv!vb&TBC>RW|$ zs0`_v&)h9~E?Mt4E6IA>W-4j~V`w-SLsc+_%3!SKju-PwnH~EcXOnC@=x6G#q?@D-uW!@P05(D9y0tv{=-7f^Y<(0q{hj{3V% z_r{e*$IhzNy}HssQYYOvHhLPhZCqb;420KeTU}ou)U&6Dd&qkj9F0pDG<*qzs!JGD zUc%IDVs)EQd(2*q>NYM;I-U`!Qx{ejC#bwQsoA%>yJ@dUZ`imnfx{Oju(~jTM!Vkq z0n6Qks13q|#>Q`4CBfmVBv@S~!G%>)hgIQlK+vdY<0=UbUnRlnDhbY4NsyNscQ!Jx z(kN?VsI}wfVXdsyP%BhQvZBTi^D0>z5lqL(O|7g|1Ow%=tc}a;8o%YVOfaw!fpmO2 zqgM7R0)bLl_QqJ}qVY>czdZ}dXxp=Zjoi`03T@T&`eoMX?k!7#oWEgB(&~gjZckm6dD=#n!H*k{X(4y2goau;A4tFRT?jKT^-uHGxl~Nl56g zZk`1_Po&5)DPqqqmb|R*I-UV2`c7&Kem5?JhpmG_P2Yj;eV6FU+9ac|6&qA~ZsGg3 z*50*k?sZal|0#2%X>0ad`AAZ-^6C5jb0(s=cl_qr;axob-6j7ARIBfQLm6)0|GtmU zLvF8}V~#sc)8?l3$$s>R6|qU)=lp0&((?$TETNl6h@JdmrRCC-XNd(DrFVmXCZ6v+ zjLDnbGwy6}_vqk9E?^PmG*-e2$07I2k>gz@RWX`FFCw9bUH5iA4Cb~k_~AsHVK2t6 z_%?Q|E1qS}`x64sW5*^`1S;>Q?07az9&^94Vk{RPH%ST!xt6H#4#$x{!x6DL*P#*TkLOv4iyEAirQ^{EyDn>Vk=Rbe zT^tHuAtyjS{!b5f_g^1;mGO^MZ9D$I*5_d|&O+ag*^8Z{(KAdVmczqIto28ZTG&nh zN@hTU>1_@L{D62o_2bYYSi;CY|v)OxT!PoQnz6i1A*8a zri)G@aWtIoxwiuMj&K(C*o*&@7>C%4NH!c(Z@}I7;T26d-~^(0HjiE3%TCvnhng_@ z;fM2rE*ZxO&lz^o;H}M>w`_RE0gXa}XIz%*gK3YwTP~e#(`W??^D{nl>c_5~s1ss` z5}W&FN)`pNA7`SchKpN;9C8>r^% zcX4)0e|7CoKmkhJ7gqgY z+T;1slo{V>bnfS-FrTKX6BEaBcBZpYXDgy2*U10^xH}_*9OHqGxHw zpwWouPST0LB+JsgOos^r`CU6{On&Zg#K+v&327vZ($ug?JO1*{xpJCncs$~{y}4-n z4z>Kyo|m@MFNDcNj4tWP`HOewQJ4@N2gKtr_X``&0|)+y=lRjD>vE^gWExTKlu#00 z6Pru(@Rt1ONtS?UegB`&|B0vMud|e78wLUG^FIU%fYtn8GTi3>xtGtwB69d5v4Auw z-NKxmVBXM4?8LoIlY+6BeH;YtZNS7(ra_aA7m6Owyx-IqjxhZ|&UXf(lKfeuM>_l0x3gylcsKNElv&rA{~{hnaWkl0+{+mu@( zzIGA-^1`7BFgbE&PBdpEC5%o}{%0iO^3vQiEzY@V`3lc;7QbMTO(DQxl%_BL!qF&9 zCh{-bKRw4ycqdHrXj)<~r)5&EMA}vZjl&6P;%<|`^>5jrS!6!LpSg^(jd|?NSFMW; zypsC@>0%u;3UNdxw+m7~SYYuWuOqd@oHWNhT*2a*A0|*UlY{=4*rj8aN8%~5LXt@J zC>v~#8Ms=gPGEe_vc5PYwTzCv{S;s=k&T`e-L58>*ii;+di2W5)?-};QW|C{HEUm@N?I{S{A zFD9BF%>S#j!6L(j+UKR%MIj-GUH8Oy9jnp|hvPSXbP^Iuyr@bOmRFo5n&wMKRSprJ zERtSBAZUX0cRIyLQFpK`8+fcs3dFW1jZLHj4JaBwx@}u%j1)^!09FiBH&k7nP1gWW=Jizv+Cr@nq0v&&Ql{Wa(Zm{-idT{gS4a{oS|TY%Yl|>}Z=YpH8~1!K zBA+86jJ;j@JoMvWK4pM8LFk(#nXP@31y#PVMVU!l|Aza*{qjpl#{ZbFovw-qL(*Zk zZ&5MA^oojB7O^IL;M;t0@UHZ|>s%9$P|AlSSzjlAvGrvf@Tm;qHu)~({2PzU znVzt^>uO8){Oy|R4${*A$xPxd>QKigsk*5Nk_9OHee4j|&JpPX8qANo=5Ap@aDmHq z3@CBaWS##^8!5ZCp5g11`_y;s;`X}Zr9j9ZFX)kRE$LD8b(0RK#KumSek?d`v?B|y zOFcQSuTxjf6&+_Lk}BDNZPMW^`*}rIW?Z^8EM4GP!{vJ&A++kI z3AT?t_coaro;fZ_WA&xR8Dp1{!f$6MiG&$;Jb|VDp8r`|GD$#PNfP03LZXvq!fW4+ zXJpUC&g`7b0v9L#-^LMc>B1F+?6$!Pj;4!~SrI<30D$`r!F|U#{cf)^N>4CvHO1}32LLijS5TH8F3uXT_*;@o|j2RF?L5B$8oIe4){#NOUc~oGjH`1>cJEE?|>)&K<>W-GS$M!Y$tlGvuoBB80 zZuUDjmo5QM$=Z*uYUR!iR{n`j{hLoTHVZrcgo9S`6oz8CqvP@IgQswqar?{G*i$+@rH`Npj)16+s zrrFXD@#0yX0BO^?G1=iB%;QpZRV=sS{)+N*&MTx}W_`Abpd@u3LF*`VQ}MD1g!tE{L0LXFn@_+E{Xx#W-HnW-hR=iIkPkgSGcMhO)@)SyuO*jG@Jl^<9mkJb>NJ z9P`pU+$+a*iy&LN|B*c;$4Vq$dgO-lJyK&Y6%ke`S|dl9WQW^JWAI6ZOcLzb$&~AH zS8R*RwL8g?hv2)3@aTw4uyy;mh}`ewA$hin6QXR5z*$r5O_JK@v+jI;J@_1uF#2s& z`H^9s6yN+ds!Yz6Xx_pMy&D9J=Pef}>LLR82G2+{PFgU|xk1iu^RriZ3oTh-jhuO) zZ;+e`@fvc*1$j4F^BCqJS##pv@-|3V5iwivE{OJqM2Q1S23unCXW50ECYYT4{)j%l zQ^c06!)wsmYwUQr2+e>wSp}c4;{dn0%AD_UH&e$-55!FgcB5%}yeEu3`XlF$Ba-ea z-w^ZSa24ol)w4m{1)b+ZH52fR1yua-w?+rk&@|;wT{E$TO`Y*Af0`$p&RTb9ftuE6 z`gwV6*HUz@exh-cj_IdrFAingvm_0)*w#$fjqE4i%ic*?GQQ={s)kHIZMbGp*ld(b z5>Qu^T{)lUpB2la%=6E}t0RZS$8h_s5R7H`LUY$7K>*&#q=ZuJ3JRMPw4PyK^Tbqz;XU7jb8i9~S!xi>BUzAaBm>OV*Y}S*vz|y|G1Bvc#?F zuKlNrBId2V7_Icf3@7`py)aVq#jMb+XP4FojoTKri-nb8@WN+h(YhMdY86ao7PjRw z?+jMKkKC@8zG$6Y9*w5h<4!L3I4iwh6%u?^+W@FN! z>0^Mz?$evh11C=RmtP(vJ^SEC?!lAfKZS7r_(!7=BxQnS4Hx17#CGCYV-p2zsJYcu+*+u;( z>30(XuAt!NBwwfPV{ezf@x7!i8)YsRx)Ujx#V`ApYy{0GnWY0y)${E=e8@cXSaL=S zWA=_#9;`JlXm&QJrll|FV)SJ>gpiat+|SRG#*~B$Prc#!ilo~*q#6S#I!00TW*yiy zf+i){kBwR+O0aG^+%MhrzjJj!tuo_AO~xzKcu?q(-ucX)necBsZujUY#~U3NgRPxV zny{CQzBE4O#X^!k{XrML#dSroZTlYm?R!5d`}_Rl=YMmbco#1KwVwY~HK>5<`#%y; zwC(xd`}puYKbkr=Ne}x*zQrD)7(JZNS;yBTymrXVX!MiocvsvsB;zL!8XoBQL?awI zmKcT3^{rr0`ha<#Cl3-wBC>yn#C`IBMz=1ZQ$nH#oR~f@Gk*ynf0paa!X9@@XzWI` zc$*K05qHe)Ulhke#QZD|d-ZSTd+ZE5b9ST5<&CoY=lSPL@}JiZUA#APxS#!$J^_;a zc}A`YYlbh}^5@`l;9|#1iI+cLxFg5AqU?IY4qy2!f5Y=T3t#Tk7g_$U;nSn!=nFT0 z&!+@e(q<^P*{icl0ATj7lhC&arR;4c;*x6|5zdJyo1lut0cB-hAM77qyym`eKiMS0 zj!S?3iN>=T4sU-x_#9x*76joZG5?C&<$}ceSMI>(3FS_7oik)MKa?k6#C*^Z6;6RwQq znhTef?^z^>XfZ#Cfp7EqKluC^4=O$k35`O>iirK-=M6LbNyI-Vt-d5MzP1JYYm6ze z*b_TA2gf1g=fQBkV3V1-B+S?w9(G-I?71@APM;5nramRvqa`6>Z#EK}T}E@*7B8`4_BPrI zBX73gLH3@A$G+G-Ix0-Lb^w$$6B51C;+rw}#3CGDG%_$Dz_1Uzu^(EF zH({I@7s>@8xh7sjxqbhPyLK>_udg}sd5U9tU#41skYar=q!J2N5O2yDE!U52VdDD} zm!$7ly8c8A(pN|q%xDfEN?3w7361z5#8%{3gz~wld`MVyo$}bT`Bdz=iQHqQ0}UE> z#w&0Wcm<;DU#GE0bEup~#|8lQ)M!e9+|*bSQ_s#ab{(K*ITR+GTnCkkw0)QAeDK zmx1<#ls&tX)_$*R*5=_z4jro@ijY};*yuLx(7C?X+e6N^2HO*w4(ag=SddA^<6df;MffYKd0;mkKSk}V=e(~N=gQUJM!N1k(xr4BO3EgNlA8T1J!^iaqiI&D;txKS(&o6A zU5ujk%r^P7?yfUP6ZudRS38@yx(O54iX$1tf$RD1S@O$^!{;wLn|2)+%F!v?Ny9Tj z18kMEU?pahBcQ}IZJ&)Te>`S~C~k{$?FsNAx21epF(o!fK3i@~oonLWvK_jNQ>kjU zkC#2bz)hXW^jnFe&CkGpTgNd>Oo{7wWJ5u;oZZmTpmiP%+9pPWzUc5bvt5_D_U~rL z?vLwx_0HC&Z@}6RDDONlpXmBGY4rbaf5`5`Ge5DT$_2A@hk>!rS^v)@`YQ(k03i7p zU;7U8*JIbQqKbF^fB*mg56w0tlC|hJ6F1E-B&5Yl3f=b_H1;q}+Gp^JvtTgLY7yva zwFqpj_N#6HZw+>9up2ShyWis7n(EguRak4P=}oS?vDJe2?*tRDi*Z}SMV-%tp-r3# z`+XYjeZhjQ&2DY>`#}a z5BFKG_6>{fmA3`*V18k4=>d%Vh%EDic(ouKFw#W>UE%kBY$;k2&SezzmmmI-R)syg zg>YPUtdY;240Wx~{uw<6`CGvd|rP=h#KNSOp zi>#%5u-FY8kL+Aa0#pQ)r+Y;Pu_ajt7!V>$V-1g09gc~u*z(vyP*I?Y%`voONU%** zL()y8+PY;}$kG&D`u6I~#?Q`%^V-(m-p{V@=Y6nqe~rLBO8Igr+sE0v06+YYe*MD_ zr8ffJ_}pdedL*1*DjfT-0Itt=i3M-;w!ok8EN(*yA7&Ae^h6e!HOd z3AV2Ar1B_4xgl<|FN;SYl7Ag~G{UY+Z0?eTG|le+%=x_V@8wVS62#JHqfbNZRQ|oP z%jRA8g~LI#*b;k}2Rs50@{*+G$2${)H;r zT%X2a#_Nm(A}X(-x>B@NnPQ75WG8UTjh%h9sKG+r{YaaI@NTaXZ*?8Jo_O}=!z=#i z@Xf`0e)r^@hfr0@8_cWAHdd2%(V`JI=(e(G)0)A=bXq&C4Ib)9Q!C?I5dbd_9o2~~ zCe0kt$PZ`5k)K3pb_Q33iXt1j_!QGApVV}MBWub-$QS30`1$iDB`d!J#*Lj~T@zvE zL?Kxi-_|wp@Qkq0o&51+u@y^)FNcsf3Nvw{X>6v4IA@OMhhoy7?3E)Y5)B2KHpaGw zp>A2gwjhvH)5N-JLftfguF1A!jK_27Hp8z`T-Wj9&w?LfD?53bIGsgRE555MMfWO6 z7~%+v2S;bSJOT*vP}Pi8wKfyARGhdu9AImj_H{H33AP!L7>0FTXG0}-5YRH9EZM+4R7^+=s9FeN zXw^EL4e;&aC+n(lD23&3^`x!vCAOIUz(uG$&&9cHZdWH(Wczo($XIx@ih*`Jj&m_eDjbeVZ;Z17-3hS z4w(^;G8d9vbW45~1A8n|ig`&lkO73iF0F-z(Km||hps?Lx^J@B=#|ySs*;;=ayiR^ zUM?qZ6lTf-D!!Lu+%))=z$HnB<%g_Viw#*wHZ*EiiZvFJGEn+2BnzSy^F=9EmHx@Q z?53sX$DYLo1QdahIRS*0xIB1` zUc9?_`d-z}_Me}eeUSIwKGo3i!QD5>N(t6n0YQL_L2L68<$59@01-?W>3u~gQ8tSZ z2Q2oFgCO$*SEl&l96<@{rE?#x#d<}FJ)hmp7B9};@Cwij9=3;ym&>nL9qL(K{mLN^ zmX!Qw5yQtWNhS&_i2sE>wCwTv(XCOvZ$*hA_O8B6HxRAmcY3qaU|YO)KX^^+jMucy z<27wPyrvDnYnm!`!E2h@?4w*9d)73-cH&CeCaDMwIayzFk3zz-yg9zdnepUtX)^0h zv<6VD_GVX#El}J7#Vt_$T>-@{N*jvOI+05~t6Q@%SDcPmF2BW~y)me6RKunl1fbo5 z|H)LOi3o~v&s~E#;r9+nbwlq6N%N8$grvHmuLDVSqxt+(X$Lk@DEm*kB`g^hk+m^` zh6xNy(t)YNv2KisB4bO@RZF)`)wD_Ne(qpyebF=2R9Rge?M#ae2C>Wi-<4t=5Uaqd z!|6dZaCgkoprlB$3BlN~F(CvIU>E>N#u&>$BM3sB$QT<$*Rcj<2sKSMH0$qwlJ?RK zdtnk|3(tI)4BI8UI|(*{>-7wi!{t@YP#*UUVxOH}?7c%5mv25??0|E|m`&I+xzweUq$| zU=65-U_acOlwYs9Ubr_Y-xZqGLcG{rjm=gOek;(lS9}toJHm$F5i~QFT7Ff@z7Qi> zcWTN?h>;c>9w)1b6m_Fm17b*uzOvS4qJa=Yg|?{^&9+QMwJiVuRwP}+x<1yhtVt%e zh@}t$plOW9(pXU>pkr)V`7xL)JiZ!u0_P5@{tAr{Qxejz)eMc54{Qi?EL%jAO<=<@ zHgpJVVkyAH61E7iFdYd<$y3gW7&a zk^4tx=ak=L1k6Cy1Jr*=lp}RUInrR1qpuF6q{Y@iIaNKnQhci@XY0wfo~*Mct6t*% zLwd66?deq|H+i}P$!neNK+QWDP5u%|irQiE$cnAuR;!KLmEv1?D)SEcqWFgnr~xVfwd_T(eAi zPmrogn(;q)7W_5g@MMO=t2iiG^IcWZ>L&9VsXvZxa7b81teHh?ioFS;H9oQ<(ZF6b zc&O;bb(2l?VgU^NfOs^fDSpfUF@Ht01bY%mKn8mhweGU?TD+RxFIbDUwm~slklp~+ z2=GA3S?lYGS;MP&W+{y;GoJk0aa}CZsekjyj3+F#;n+_MD3=4i-D!rtK9yK_zt^V< zioszDz(ZYK860UQY8=nO@D9pm^i9KmI z_e|TOB!kEsg-KS_6E6-XjN7@am8+`xv5^r8LdS~)2U{U4omhhipu89>Z7a26l{gn9 zZ~_v}u;YsCyG57ut1JQlWV!zO&>$v_f`vC$MHT8gHlgAXi9_N=i@J9yJ$OwfD^TsT zCQHjVS4Tae#3C(S0<`tNH;sAMF>w&_!PP_&!1krq?MtndRn_*T*6;hJR@X62_sX&1 zHjuFmWONE-v|G$Jm{HeYRx$}RjW9_mrq8|8!}G(v-J={o>pTQ&HCgM9D66^G9_pN8 zjXhLDQ9A=;ZkHX!q&)@rw^{KYTbn__%)$H^Ns+ zaPK$5pI%(NyLkTo^6=>G`^$F+#~0cg86EDuIC=SI_u%5>9&UuMl3=y}tbGw!!#K8`nb~HO&65SBCzDXA+Io>~rt*gt99aKDt1&y;DzB>; zGP)zL+xL(SlV$iB9Y#Lz7!9NCHw6?F-`*6^aqQ?w8#w9;%JmIj2XKhhCuChKpE!~D zx8TVn84AM0iT;Y8r0Dmr(Z>yHLB1-Z?cuA+6oY*g;teGAjir}}HsB~URUhIgG__x3VT0y9sJcG)XIc3*Mw9Uk zjV5Eg(bW9(-RiNi^1ZMIitl(dA*BqpdXa5M)6!@HJk%6e-NE0$KyDuZ% z&{_Mc97CuFjpdZI$51X2tg*)|%X0rc=7MO@0v!OA2OZPqlQ#KSu({v0aXd%r|5R%3!v`pPnv8({y zkW>W{d4r8|hawCNFGC)IuHogR?7Fj;0^y)QSBY{Hvlo;H&0er&_Fj%fO`Pb4n2fv} zm6|@WZA(=EF-*y}45$)p%22b2G1d&CYLcXxKmn^FU2Ajy15U({mn5`wNPEqRxYt9R za7f~@Ibr+xAZr@>Gbf&n~MK83H^L0Kh=(zGc4!C8AiXcJHbh}tg+o7p=ME5 zZ6Bk48FUJQb@m#h-k6|7^qp)ZNvH*4;#Xhyb-`6rmSGrouy*Y2WDR3*TsWm3>Y@#!PgJ->@a+YKe_wIg+F`UB%^-$m zWKpgRq#l$*h7vS*qyQ)_Clk8w(UeOv{2B%$A9w+X(e}CkG^hCXKu`OETSB&`YS_|& zObk=U*p?+lF-=`DRDe|sC0!xd)bMybR%8P!#L!h0jFScTznl=S^CrVx)IG2nWLZz@ zg_flgl}KYl8cP<^Ee!w(nUV%nq$0)EA%e0d%d#e8OE$Fr z#%N3|%a$ZdfvN&5Xlk|wR2^fC z?D_k%yKj<}6092vL_pyI0CN9OU_rTlC{Q-EAx9PxvQ2~n3DK|wW!W+egmj=o9RgsO znkf+l5M4oIQ#K64925%d%KUpcTnu;!05UedN+0;vhm^hbAxZ1M8&cu5xf2yhgROC- zA|W4orXr#3cc`MESRt>?+cJWAhqp7c@gZ&fq{P3Op{P^(g>4)=Irw7`} z$kxg2XBsFX|Lq>%ISyQUFGCRm9;(f#Xds!kkxjj1mDRKNh!S()%!Wi66Gci zndsV}LneC5)@$cuASG~MNRlKQx@O3hO`xq<7FM8cVtcF^iX>qqLnxc-c*tp!0oD8g zkDUM>X=-s_>ML$M3XFUpR$#Qfu)>_;+uL~fwoY5ffSrz0`!BHy%C%h{G!$q& zw9tS{qy_2vepf|k$l<<(>|5Ek{nn2od<&i|6=bag3E#|R#BY4x9PqNHsLM|&uDKew zK09XOn?xGL`yUh4C#sY9;GjCj$f{AV^IMBONA z>Pgq5dh$7NeJ4sO4V2%T=~%e!z~{>Q8>$Xfz2`l&lxD4J7tChJjgyRYkg=*f1PE2L z^{;QOt4A5sL?9&t4T7SJdr>tRRWitPim`9SX+j{=u|-2wkg{-?xTV}?!cBPt4?Vk* zkq)0l~7D z9?WE|wJ|h+1eGB-rpuJgBE$h}$+417Jv0z;7&(?p#8*g_WK}W1-{NTYDIG{p#!5!P zQY9q+OMaXY+lgmSPS4ItB5s)Tz$3E|Kme99+;3pH*W>NmLW<=M>_feQr#f^640)c@}Ir4Q=eH_1u~zSRv>97Wig&WINkTaieTI>3Mi z!VRDh6%C2eCuEJ4N7(hL<3+@EoeA-*6meh2u17*_I<6DleoD90oV{a=Ez!TO+qUgq zZQI7|UTxd9ZF9A4+qSXVwz1l_dHcWj*(WDA_k6j@lggNtnyJ*x$e3@vKa4W>9xrF_ z6g?LzJM!9oV@`S|w02B-gTvlpCkI@MH#Tf|UaCK=Dm_8J6n7G1q@(^pl3~C0m1bhu z)V5|Gp`GKcyw=ROTZj?vWL4Hq>s?=V^LRXe?Y_LOMf#i$&V|L+(&zO0=5KypH2&8E z0WLq_%EiJ6XJT>*`20L>ZXYL}@5bJpexB+R^x=x&N~AVPAJh(Y{45SWEcgPK+q{sS zzo}!2=oOwP+Xi9mzqw`!GcKIiB9Gf7kGtSIXn`heg(kg5$F*$~`vKt=#qZ=I-UeWi z$?cfQ-N3QtN@;Wd+xCC(eQe~SL$JtXb^O8UKZAyEi9(zC(f>w3aDMbCdeUZi^#4WH z$GO1VDyN>!f~f6+sBdEZ>N?ZIQf_w@zSzc3(dz#N{Gzp^h)rGP?W2e;seqPt;?{QJ zZ~t~;TtsneR8iai!B^)$t9{EK;@1Dd&rM9GMT5BYe_`v3DTdSo&e0-+>>=QFxbYG9 zgOB>AnD3~k)E0Tz=6~^F%bwCQM$}sOy8VROl1|k6Uv%cgY?Xv;{$Q;+>MFHy6ufy9 z{4sbCY)uHW5ghj){<>w#L9OwhwXFSWUHjFWDpcQZ9Ty#Bm>`agt`23T`LwNC;4Z(cj6fw04BHV?kzh#2^CDxfQ9fpotj zWu&1Dn}&zc$y8mt*|WlbihymxG;8GcHkNL>7yXX!S(8YyQ&3}@F>twKm;TFqJ7U77q+yWZK&`f4FNQCCklT(v z8BlSi1R?2+=y8rV=8S#Mk#d!banl>SW;@+Ie7zcbT{~=db@y!le%sqReCN2%*#Xon z{I}K8!^6F*B%n>u_4~(m z6d)i-^-@lrddQMVG=NM_C}shBlL&@s)Sat!c`L-G*;+*?X@5JIbPB5xmjjr?9!1 z^Qp?h-^LYsHi|+yIFuFu)+R=j9vrMV^32JS!%Ht?zV&ArC~|50Lb4t_Qmd{FJhGRj zu1(Yu5U)vbhYnf$A2)9+0=0DFu$9vp31KPvjPDXYaP~?gi50p3gDV6$c!!7f=d4Tj zkAngw_2{B|t$z?bAf087lSzdX3E+4~^eT`{f{Pqo#}XO@3ne@4Tl}ZaF)R{aUwl$g zyisDgZcM*H-u5UuE3ahY;$Bs2h|Lmt0;o@Hf@}A>BhYZgvYiuE}NV*oRZ@rp^ z6bQu#=TB-BWs-*smM?1@1z&Kk4$2&yL5{2WdU+xdMaO%u!+fDWwrZCz{DhDTp( z9eUSh_v`)Q!SEWtqs{yNpW*jD3;bm-pXbw)GQWpMUFj9y0{u0?Xid^?Pv*hFi@RJ$ z+amoEiN|&Eoh4>=RxgjAlS8@p>}>nP(^aN%F_={!8`!(SPSJ6~@uf zm8Ew}#En)!Y4?7TRO<{!2x2dZyD4q+S4D!4!S9Bz#iV3L5;}HXT~$=3v)}a)lW}N1 zCe>3Spa!8ZHcAv3Ht7+TT0lTm;vJzbK2-)9iPF}{Qbb^a3s|wm^#$UBBdZPUak{7f zKTR_y)UlSUytCR_C@ZbOY~>#CmaPDr5lC}*|4>o$AKT1|bW+{(^8oRWbA<<`S~6as z^TQHwa?>h~c&Qlwlp@NtItK>?i6SM9pTTroj2KV{QezWb5NaF33x(V|MCt!KS$W@kP;^T0Oqs$VBRW3rF3I7B9|6SL z@v|iK_b$aLMws$QNkm}OjKSD0wwviy=G%YWXdjQRIaud3)81H!b0QJ<6TY|b7E&NG z)m3ergtEiLS5mJs&jLw-bakxUHB@f}Uz-88RaP0^6u%8Fbn1I)cW`;eq*bCIw=0(<~i!+q^M9Q#IL@sas$`KIDB$wk8o7p)Qe9DdTG>Y(cJ z@t#D@oo$AuSZK*TciZ2Q>tZ9@^kgvpPsp9eqy6s`&B#Tq~$ zp&;ZU2oSSZtNhtgNyZJx*N6?UvBze&Kz+7iedR{Jx`&dVsQo`4@-hd zb9#IgyIzkTE$$Wa*5WWy8kj|d1@eaSFot|M-FZT&%OKtcwLC34`_ghYpirC?3ZDT5 z&pITEOsf{>Fm*Lk5-y6VVfq@~C`+lzi9i(sl-~7FBr}|(?6tV+(5W5ZvFV2Q@3d0w zcqD8lw;NzKvm^dKalo@z$8J=)nRcg-JDrx@tfyIPEYopYhXE8sz{LvU$n z=ccFI#m6HY(ZE2MqnAUtH8@nGf>MRNGW*``G&o+Xrc*nZEAeWBWdc+p4isNhkfC*k zD~vu^=j7nvVi39tS1Yq;pBCoC;Xg>zmGSq&)dB{G7>rnu_{?L&QnoE!W`45|BJgik z7Y%9R(jD7u24QFL6nVc0?Qk>}N~*qO8P>n~6>nz#GZOQyu`qhi1dP+x6DrDO^@mZ% z>#a4ExsFk2oZ|C~iOAY~-em}9LE7K+STH9k9;^{;PP{0(M*T28kuXMLX+t?A>fiMJ zk;B9^My*@(xwHt!Urm*OQMTGskYBfoGL9Wb4MG3HqKbTDryK9iRaQVRiw;*RYev|v zo4lP|k}2*rw3>L!bHBDD@iqHv$n1=D94x?j%58%3(WOqiDo6?&hU)rHq%C6FiKfwS z$(NJdPX}kzx~^~UPea;Jc?WGTKNjO#CZyNmlil~Vxz0xiu&V5r?*H)rFDDioGgBK? z&6w{YD$O8jPzxDIgZb<@{$JLzZjdr4@#o1poEt`8Nm&7HxqR(!^tl*nLEz6Jf(2-X zTB8ui*v38=>0#=6{2uiIIaA=79Dt$pv^Y|H zx`Z$?5V*O@O$$OQeL)E64K{;{prLq;sA$M)U0fhs_F}}GWPQLdERl1=5)%TO)wzEl&$^;4eG4@y982Y(u}$Z(q_0Q3x`9@u~}V zOe-xF6Y$Y<_hxb<@Ap=FzLK!m{Kb7cu$E61+scVIdT+G}H;|v```HM0IaWn#b2F{t6dxDf-G_Lp;uihsg?>jw6(m@4#2qw6d8tV)o4eGq~ zTZ(y*0F~f`_2D>lb3@MC&p%RC7AG^}{OVw)kpYB<+wc)c;TG6AzgL|l`0Fq_%~2;a zz+B46#x~3Z6yDu)^D`db~>&nh1cF*hKgwK zHBlkYh{v&{te`slSuhnz8voss63&*z?rIJ@l9WOs+O3>f~Og{AMJB%cZJH5BSQ3*oQ;&t7l1O4mS-LcoL5kK{M#;P zl4IvB5dl?rC9a4D1wF09@Bbp4Tct}|YZ&*=)#b>Pl?fI)}q$X_8vo{UUk2VTg-a4~hJoD0ER_nvFE{vl(?@d@Pzr zvBV7vRRko}vS^3P8rM6*BS!zfprqdP@XrLSL6yk?<3CZ=>;+a;t#8RrYpmiZvMCeK z1{EOx%2jfcw}ucD^)U>|sg^~-z=x&zf>1A1I#S87-}0UufiTI*(Q!!@hM8i%k*kk} zlRa(lX`;@N6`u2KDt?#6vF3}x=YlQO^_)YlWad17!$7TmUrY+gU!dT;_DBsirZQ~b zte;jM+v%o$e>qe8al5nl>6_@#+Y}_b?u@^ai#H|a(3 zs`SXi#scq^o2KnkeHbJ3izqojh2`70HO#dR*2*l4;WDb8oCYF&VJ-KM_#RkM|48*A zGxfTI1#u~|sCLDOo9(}9-tQ#Ul!ubgpvCrbjZQ`=utgs-k`V`+K+k2K^>KA24d&FY zYA9F6J*QEs6HkM2$L~~jwpLIxQAxpY=fJcw;vdYx=U!=B=HU!3(fX==W?)h70ZkG` zB^=Nn0^YWE8FY=G&&>HlgKV~nLZqCh&ez&m@xi@Ro~P$Rjis)0!IkS(&OxDGIdBCt z4IQfDzVF`R2k@e57i_d`-cr%YJ5{w|Z>B(f`;jCfQ2v|BIyP&|mPf}~4IX?BDTW7- zF>Hvmm}WV70{{RZ6e6{I+p~(D)cAsVT3nG0ptyq45V`~rENznC3XV zL9NBss+A_i(<}5%@NB&(R2(q8ycWP`?ko8N9;65>bU8nv>!eOn8LB8InN$=~wE(!? ziVUaBkBhO8Hrq0$d_>j}P$bE#y}P4ck<5084Uze>QV>Gr1cM#Jw_}p2r0?cYOP ztCL26LY*5L-97M*!~kPAq;c_Eb~iz8rT#n~DKq9=1R*~c?|LCkWZ5}1dtPHu#=#nc z%j;h7=EEvMr?Z0JFHZn9+&j4A>uvD98&7Hiw-7YOC>mY^qV{n%3 z&G)iA#h%PxSyVhb(z5Ikr4fSJyLGVW4kcl6GbyXu)o#=9)mDpLX{ z!@SID-8{M`Euv{ zr*&dP((Y_V1UoiQ4(d-51=JVm<=a2fXTnoVcIPG}ZG#`xsi>z7`?SnSV>d4<%GJarW76B}e zkxFC(jvI#fngt;jJYyu#6uz6rGVy4XIi?m6M!cAGC-d;tL_@!3&BCyq9}Cftzm**; z+g7{Jnm`qD|0#D@hxEnbrJiSEwi#LwuXL*icpWQlqiXgyXNyT`mp+$$qI1(_bd4%;w zD6tT1;VsrE3RY!BjsC<>W|#$~-@Dh5J8164w)YfW%jGJ;9xh>l(5SlSCIYmey!(qw zPJa3hqxQW|DvmBLPlJ|e_f`Csi7u|Dj#)R)qKxr@jqkwFskm%4?YlryZ$*@`_=7`( zf1>eJ94%^;NmZIZCHG=o{%Hp(D5tLXtO*Nk7;N=`u_LKb@@NVS6f2s(6*DnP{Rj{! z^RkTu2X%WR$DpJCEDMV4XldLB4l0gvBcUp3za!)Lan%0sad>(7%PT(Cv_MUQsxpC zq#oPtbSLxUX?Lk@OP$@{PaN0A9Jbc-Q$OEq|D*no4Mx8hdmTG_`jy#Q+R5;w+w1A( z`0;kws79zO+3=z3>wqXHSd)}jFQM99T9ks(SUG`!AT%bwHe6)Zd zVtaWogor*NWGs3X#Irsj{Fk5#PzQfzQCw_3S*?-+tCnWx?>Z)C>l~x*y=xs?Q=RO$ z5oOjktX&Q)L&V$AN&LKewt%o6u)5~3pXN6}5G(+zR+;0$brpuKk>w6eGfL{593cDh7U3_LY+l?Ymbh5s(;21|Ahikt&y8 zp_TByxlGw|$BzkZ6_eT`Gj!WwuIejO zRI*};?A;4WNV~6jMtlsWxqH8w2)|8rh9t#;joJ*(W!QELaYD}*`yL>~^cJNhv*Hh% zXvwlmL?L_20P%iY+6Z^(&KpMJ2KG~X^tta?$HrT3$3Zt)Xz|dZ34pP4z97%Ur_?R0Piu;(k%-Murv&3 zMLZ9+Bq;)4*5%%_rQWF_u~t*dH|6r&tt4u|JMnC(O;3rS6L8j93Xl&8wJYnvUo8P< zTXON)+C&uFlsVjR3C0brDAojS;;kZ@5k_dri_E_^lzDckN}pw?lX9!GwP-ow>DgZ+ zntz^0c2jzF#Ye8FxO({=&I@leC4$8h8p($jno@e66BD;@xb*Znt3)^RfWNUohks>e z`Evs;*Whx^oZ1aW#yCr^0Bp|R`sWyn+FMOovw^b>p!h<1BlK`fKw+Btke)7Gy#R)b z-Xpqfn#I`#Rw)h}>&}=UR?vB0Hy1>Y3KLKM-#AasBh2`6ZmiavC06C?i6i?RaO0OB zG*?A;bUXv{bRz%+Wx5I1X8HRlL8YJTdcmddkj9{?=>`~EyFh}yD44L6XpF>7m-NweNa#>de|8K_KG={+l69o zOkz}^8nOw^MSF2#`l`CgNX8zooj6i`*@5P>QXQ309G74lw*GTBE}_!R*vG9hTzOd7 zb6I~8z`B~2#_D4=pHg3S{Fn*aNSO9HGjoBe8BiivcpV2{SB!?lHc zj9?rl>u#>1=PvE%jP2({5)&P3=1O%uJyBC{pKtF|+2o9aSq>!iKX~(uz0>pK8QmVQ zDR?-FX>m97wuzJgeLYISS7W>s2RxC#u}X?Z+AG)sgJ0@)Tjcyj-nqy9IQE=hI9^8P zaMd-`JJ)af#U@M%4JSvO!)1yiBNcqA1}x@##UL)=)S8b~NRB zE3TGE&TSaQh{{1{cjsB3E7Jy0uua z5rd!tpNEBuClV??#RCOq133X%`}~)A{-#(dVP*?=u{$v-#I(|7(Y>D$rW5(>KM|x1)hOJh{Zgg5mqy4{%OfbW0#{D8(I- z45v$FmAw2-qX}Qu@nFUo+OnZYrIxZOY3HH>2$*K< zPENh7HoaUjtAOF?ppH)7sphsBJbMcY#I(~j`di(W9^JbGmE8i7-Lh_G=wBZ(#%CV$ zZ$RP=B93NdlQ!DR=qK={!L5PKH7=|BmI9DcerxUtr!eBZ;_hg7Z z>+@5b-stysD=gsmT5Z!)ziq*=)ARZ?xaKC1Ufaa6HN>|m*%1?{6TF*{{LvHg zD`{zw&i|Pjto6wodAAc*h;DXj_SxpbaHZuZu`~q|w5oiSRd}Sq`Qq2a^DKt2J>^*^ zS|HA5FA^H38&Y7VJN_6FB+<(;Qs4x%(zP0t<*Y6*+7_I9t?=x+3>3mRbd#pyYiJ~1 zl=6x)5ezNtMonZqFdt+_sM%Tzj-lRtHeK+p{GuBrn9SCCCsLLD)h{rP(Z%&ZPN;r? zFeGg_>25b7^R*4TFsd8fki70pq>I$iAhKlJvit}>o<+LM3e!=s{0QxdXJG+GkTN0w zn@lwi_@=M?PBD`6_g!z*qyn1J8=R^)4= z-gM$j>Uirkso!yMYJLr$m#Vj~qYsZuRO`XTaqP93U$^Ma_YR!st@*&09OQ}RX0Do1 z?NU|34NDTHFHRyrIP-^oXq#pGDWY;2v(otTvA;x|Q3_K1VvaapB|Q(?_;p?CDk~{SE+1i^~zSw@RbULj7VNOWrAV zjm3IPP#%KMl&g%)0s!_cXJ2cSQDtO_4%N^oHrp|b^dh4ZxWj1aYP`AuH^!$ZX|}={ zY0JZ*rQcykvi0$7D--jWkaqu&!>lw_0DH%`*2l{C`67%%pquH@jF5k`d%im*@ck-b z1)=Y|9*cJYP726xsQDYH$fy7w!Agl7(O>0Uhp?Spbi=xV*-Poo3Kpa-`wlZvBDnFw`WEQSS*9+jKFu+kcDzM?qB>JSYAY}j^a#t_{+XWrYE|QMH@ar z`9al_jS`GSYGX|d!iAf{)D#Ipe#Pj2Mo7p4GAI|Agzq@7oy1nSY?;_#AsM!(@=nMP ztP_k~v&`D49Wj-sCAKFS80y1m2R-3O_^*h%*wc)c-Xq*Co1>EjhIqSu&md)*`9U&t zj4~s4$}((xJ1y3@xIO3UvL~)uQm%j7A4^8$D?3K9-c-Z2ry6ala0AZTLMy{oVVo<* z-w{-dWk${=5L-Dew74IcOEyOAy1tGSzrUsq%RiqklE0>XpFib>GYNI|((JBvO?0ICecZ;DVxR7hXI%F8&abCy zeA_%fAKtG8yxY7V2jvLqXMEl7FHX1I#x!A6sY96XT&P1Ts?}TCPqZM#?7=`q(c9&+ z@s$BdsIEFT2Zb$&?IprKRUJl(Md^wOlcR|It?}n3-nG!I42ZZdqyToBUNfb^u zMEk1{IQDXkkvX& z#6lR2cjVQEsTlPaF$|SN=w|`BlN}a^+^NB73KwZ#Zn75kl+cGoAc+GJTcmd7Aw9ld z#{s6&M?4yrB>98gdOWd%6seYkei?N|CEfM-GkL)MFXACeIi;SQS)7pye${LyYM2AP zh5Et)P`~MUFbdJXp{nhFBFa$;nCX)!^D7mS$l;}~QBSE|`&TIn9Wh=PkP*gjzgK6D zDTh6Rhq=hpV#a^^mT=y23B>%A9r1;o4ITdUbG(kSK>xEx{*=iY3p&gQ-9w}jTLz)5 zA;ww)yDTsvl)6!YGw9VBctr=SFVhRopF<6@&&~-D*j`F=$z%VhRaWGo zqGQ+Xoyg9Lx5|g9HfU`nQ-If#&Q>0}+MfZ2Z#DSK0o#1ZyN3)s2i$Tdcscvc^U{;w z3PSnfyR~z>nVKORG@p$!0H3annrmiVYEDbW#)HldqNDXE4;+6(5K*$NZ>0OJG7iLp z>1bGE0SJ-rK+nuV*Pn5!KMR42;kJwid$47-B`c&U8CPZiM?aOzyi;qkALeAY-|1#| zEfR8O8@}|YRlwWtZR>F9e4$hTd-?v^46{~1eZ3Kr(AV3+<5L#L|2EScsDeixR9;Pcu;G;1*18t>g5gjx zGsY&bRZo>;l$Zz1|lJKhlww>q~7@JOnrluPYtxa8YG`4^vW_)LCkBOP~E)#fKd@XM@`mo5>N8< z#^dndPjz~SvwsWK?l@}jqr|lHdI&XM=jDC~Jdm5BJ>G%}oeRrU=%95iyJbaBR+N$4 zU{Ca1{S(&upi4b$+f&JNJ^zO8t>fYpp<EF++o(X~{TKyDQNA(J)$AjnOnakPHK4a*S_@5&~85Z6X4602~X zdDoNWJN%`ffGe#G-1Vh%yPe+G+dZ)fZ%c2#r^|`PQh^?yue(pV>&NTu&zCy_`eI$N zeou>@EHKTWifXJul;4pJou)>0tcel6PWRSuY{m@G;1NnFWZ*IT=7Fe$4DFMfz6U(; z%st#bk53I9?^|(C<~+aFe1jxgtuw9VHD0$WHh!hEGxSbanr*l>&}kGRs7Z)OubfWv zHo)jxIaqFF76m2}xgwR$p0(ZiG0yr#E~Eo0Rr|PneV(fk(r^26 z_P(8--n%XHi4fNQ%)rCdz&J@7AE(2%P;I7vFd`^r4;_!?6_)9duWQlBi|C)e_yfvP z7wal+W^$FH+Fs63l?sFSeAV3cHdn3)DySLuvrKq&Z4^@CQ|ue-!j@o_RYXhK*NH{6 zhTI-pG-?U0_>*llH!T$Oe#2hH+{PkF!4{?A`cKYEdXwrF(Yt!5oWd=eu!P?_w)ywR z2M}J$n;xXQ+X19`avu_`(=`;N&m*+7=2+JYrLtF~{6Ad|^fil@XTS_jOEoXm5DbTD)qZkfg{J|c3$;aCm5p_*31X4ZschMm z{=#Kl)$Rjx-+j*k3Z&k65W``A>fP>xgZI1WaB6dUrhUej|ZFyerp> zv)Y+P^>fzRHJB!C9WCx?{C1N4S|M?A`TFNw=NAu*MAidlntqNV8?JNj4Z9-a^Z_GQ zfYbU{eTi_`mCg%^Xh;Q2G8J(|m_xw<=WzJ0z5&}B@R;ZMDXD~+cVVMBRI|)V(-y-1 zDR&&72E>rPofS6PERZW?ZmQg0~ zo?3X_#wMIoW!y0dtbe@!%1D35UiaXDqHYl~cG)mB2yS1swQTdBl~`IgXdNE9RoVt^ zQ8V=VxU}@dYowBYhdVttx^cn?h$D=c zLo%ja|E<>Ub3V!vZ78{B7UGx#%F66#6{0EMI~4*#{p|{N>+gEwhlgnNf^0+B=(9y6 zQp@CRhMH1%TX+93F{8IF;LkT9CPIxt{Dn%aH?^9r0w1gp&J6KWBZ{}T=EPatWKvdn zioJ$$sQZmo9kLUEH`0V%aT%@=y3Na|+o(K<{VPVJUFGE1BowuVg*1_qcwxD&yn=5T ze#3l;6|TsQIDE=IC*N@VbaDYVa0K(X7VX45Var=*ESdsx5go9QO24q_;t03O@#3_( zDB#{Y7q~8FK56)g8+2t6uTx}%djc2_dW=Vsj3@cVId1rr;Kg}{8ye2boDmkQ&u>0y zX-U->%^EOLCjVju0P`5_TAjVrlF~U5#*U$ZpH98h>T+QNw4AI`@2dNsQ=Efc$Dgpp zC?9^_0j&a<0Sb!BQwH^0j;upCT>s*j2s)e^>>-~jg^8c4j3e) zPb0I+US%yWi4FmykE_ghTblZtJ%*JS2*hrk)s`9Mbox4;y>yAt8%PMk8?4r7X;2y^ zX9gpVAM&tqcHA`vt1VXmx;ig!8`qJ}1-yWo&Nb42t2_xVxkAA#fyUZ_Q6Vst4d=ya zPsl!-!w~X!@teq^>dV68l6=Y#9Ul2%nDl`AYx*>3ujjJGC&kPu=Mj1W{rL-sm zBa5gfJlHmt+FL2OAmL^(!#>=L&yBThREUqsFORd}lCslGJ*cHx3Cls_`rSAO|B88B z7FaXJM9oN*MD<$;k1Q>UfdO5n-g(RARZVAwcEK9UiGtRri0NKDzBpJbr$D4#XeG@x zyKnMcXN-#D#_AjW|4ZF-jA?e5AaD^G9jYFI{Q6?;NA3*t8-A(f0x>yKfud^kAr*~D zfd0&M)o$(~OQ1VoP)1)`%IZw)^+1X@Oe&=kSS@CYQStea3(9Dty(J`KqL5!%#n7@5 z;qX?_EOPy(?3c)=)TaMeaX!kwi#Ft1afK`@}Wmx&nb6b)&;itxdq?r+U*+o*0$}U-AL)q{S&{nFLIX?i=Zj__fPuPzT{BIfqT+zJmmlivyc>@g6M#uG{!vsO+f3$#jW8fR19{40+7Zc><%pSF9g(BBX+Jmm@&4crd)G;kD>YaNA7) z*GR^$luJvaA$ANl$xTyJMwA7<%{i{1lJ>7uz3c7;_V}m5&jxfa*SDy(S!i5u>90(a zIf7-U88#L%C6yVcb)_6~INRHJ&Qd%Pc7Ux#c*Kf)++R`kp(-mXY+La0`RnRIv;7dl z^sacul@P%#Hf=2oAun>02Zb6q`Jq}0E`rW6wLEG~=x z$rTuC=Xr~K!z2gEqVFi#j4;A2K;iAU0px=6%Si|~N~|*TVe^fM%gWhWH=&>S9onag zlS1t|>o2z$+O+$Yyuf-_37t`Szd9|>R1@XARq~fQFO!#xK@JC+4g^(LcF9x9MOXRK zi#hG=tWx%7!!GE5;4yX6$UIqdY>q|&G~VIDc)~O1^ngkTJTO9Z%(7R*%h`j?=CGd? zAhv9k!QQA)U*3>W*@F(w%1kWfm4}W(119=sgGTEffw)_)&kgi9YzCjc=ANxe`6hzT zM~9zOid&esg(|WTShsH*I*U|RDXp_ouQT1E_aBL1{vm}hQoy&+f2UaFY2w_cT%f=RMk#p8sq3HSI~3jYcNd)=gXQ znH92KH_s|2CN4JK>>Yy@AokOscCj;&>B`@(c<{82rs$#GG|FIO!Wnhc_K554tWx4k z6nfmQ_wDQ?oMm>dx1X!kqs8N_`$Ca|KzEO8dTquJ^oE%TJi-Xi|Cy6QA;aGnt=m6Y!;@fD8;887IYlm-I(Y z^3<%&hxMs5GKu6@M8vTy0b2Gg$V1C`)HVoiuEc%KD>@DfW^bf%4Y!hePQ7XG%q zM^y0bZl!!^=1BPd+39NIRXM6TrAgm**S&>NBMo$!uzt6-o1Fq)XHa|SxiN{n*iESHzyjI!@TIfd`NLt0%BHk^b( z?3E5`0Z;po%oGn0bHcw1<~-U)%uv6}lw@M8eSj5f7LLYgcfYN0un=KscF097FZ&x$ zMZ%tbz!H1e(ON6CV!gz}Ioi%{p7$4p7>qeJk0P}s`qQpBa6!iT{Gf|c@5crzXW+89 z$|6H-8V`Ev5E^z)J|#b}0!qpE%CC~U8z`WPr`%C|Ai?wz_*Yn_U+I>L~6 z#2=HWP$He>xUvv(_ZwuAc-{P;R8&CN{=-rD8Qndt2NwX<+Yta3L=Q)KY74yAjllFMxF#&`&X=Vys0KdPA$p8 z9V=l6IWzCzNQvEAe(77rS!hS$SxULk1vqz8pgh1;pX(=QEax0IrnEAMYIK|vLIX$a z>k?VNcX}-r^@iCy5#yMPyh%t5ZX=9xWG9Idk^S;9lX3(VW_9Np{whF6cOTDR=E}T9 z;DDUPeDTwU#5yd#qBag()E6NjP}dP#td7w0 z^Oo4?**cjCCnnYWnh@DttP}*D5g6oo)~zPi#i?mn7rVtyX!=oBnMfJ0*1+@YEu8zl z?dtK`ktGIN=_NR4fSQB;J0s%*667p&7m)DAlQryn4*FY%jZm3a4>0H!R9s1APrl`- zy|k0y)@QdD&Q6{d@!OIdsI)!*$ZHAThTzjPofHJoEaHVOv@y~!1}rWKr(&fnf(~py zl1GdwIIyEIq>_ep1%WWpvb5HH{*^^Z1<{Uz52)qpqkWzbZfK2BySw@$t^-pOqMb5z!1xn6Mu7El|Kae7`7 zA-&?HJyGus`%2xCR~?#ixmvMK<+tI2c)2Q(31C6eOfEEEjbDGX@(p6Cy>&)gTTa*N5w#x(&po>xZne0 zpQ(sMpx(s#Ier+z%FbhB;C}-F^|9A|P`y(xH1L2^?5=!2G|~Sih~W^L0Cu%mNLd<( z_fVSV%~JY}!1%`z&z}|^D)+(RfW#4G7Y2g5Q6dHePCUL4M9x-Yu66;BxAG5BtOag? ze{1mlGWe5I6bu{z4D=&Z9w`u}1)kX0feuEV@D16J3zeqRAD;MbnVf%EnC{r3K{+H| z!ySPIz;mP$PTVfU!aFJt3+2fZl(K2ft+u`kBd}~!vu5(-<}n3nvV0I^pW9&YRQJ$g zeLZykl7LR2%>1r0Fc@>+rTM+USW3}^eUHDge5J?}t6+QP80glEuaTG^uQYEjU?*Z? z3Rca#%*`5@>yaXz$|R2)GhSp3>RYRCVDt`ApTtwZ5&I9JjKERI?cf@J9dCia0x97f zwyj5lMi~f#%u|Xz0ul;R)}*rn?Y6rQqRSa`{f(a9U&NKQp$+=a8?hw=!wwXpOEs0x z2Qx_&!etH-@F;WR&}Sc-!8~!m@Q5WXkwGJx29z7Pz)x?Rapa z1TeX{ZB_uUyH&&>+M+BUQW?92mASHgos}%*NP5?lcUpaKtTmUtcCri}bYdSvd*iJA z&`0ay&B`!f+Dhs9(z;bI!W4{)eC{z3RQlAxf%Ua#Ru`}H^O?5KGoPQw4Kg$HzrZm&#iRtpqsgRJ6E;-ny$Pk*g&ZoM=!busW zt<{zVk8=@JL6Oj?Z;L`hJB)6T#{=vT+RsgaN=@QX2!}ZJCFtt|gMdtPMU`UWCfzwM&@PH6O zYv{qm1idT6g!B{L)5j&zz>-I``_}U3RXA%(gxN3)EaNkX!O4&<$0m?SE&7WXm$-x3 zQISjR1t7vnBE-pn9ex$Xbm;(r=a?{2+xrwbdv9JDf=%xwpmFw!8`bQH_vZeVKq5=r zj+x;*SlRl_a=^-e>)aI{Fvs@y`@?7AbK|VhB~E$b&enSXyImZEj@r{^*G zn!p0b;38;>FER2-tfG^Urz-^EKlOjqG_jou~N9@0GO&9x2P=RmI?MVxNy>X~Vq)0)QW@XGp zIH8-}f~ypiU&Yq-HZ6ta?v{?rQ!yZ*m?EZg6D)6X>1u-$mZcU4lIH)IuRm;^WU6RL zx3zQ=M|YtQ7#k$FUK-qT0(cs@YU)TQ{veEEJUZgU))s>E)62^bZ!eymfZ46WvJ$0v zAe#FcG3{s`;!!I z>#tyR!LRury`d}RfBy63(F1T+7da9`f|L2zc{;0q127tmj&L#;67B(bUlGOIFS?X2 z++m*1>Lr-Ya=t~NKp$9Fft-_2X$2=Bz_au*H|6odlmLzs+(dB)yP2{`&mY>DBX(?@wR7dwv3rJKD)1k5|yn=zb_|Y929)o~1X*4ax&>dj66EQ}J9m zq+FLC&J$cDZHVwt=G)VU(l+roC`LEK$`rBjP{f2=D#{<%#T0PH_kUR)rOZ*>j}hS;^~R)7(4~}dx5v%O z#Gm4zq{@8-cSgb9uqwaYp`QbaPDy zR|!xu!FgH|r6HsbJN`@uG%A?5Wjsu9QBdWjdQjO~K1^{^?Xgo*yx}V}n4xP72-OXk zu)+lh5>hReDflE*lCPtj6m-hG;IN;LBqWP_ux9N(mcfrf6t?P)2nS^H?YO6=E-0#j zkB(|WS?|f@*Uv>-xeff>35IVNd5#~>kbnqHR~;NIv| zv!gp*@LfICDAqC~j26CBQP!`;A76DiYqDB|U#ZwOAH!p@E#SwS)zZr|I%8QA;EL8* zC|Qi`w&A5yNHa#SmU=3m|M8C;hyVQN!xciqPZJ+!1sPXxicsdFWI|siRG3I|geaom z_yJ#dqGX~JQ(QfMbi~((Oa7C^TeKObGC-Z@DO=V3dp?Pct!mD3HyBjq=Uxb)t44s;_nMb8aBHY*WW< z)n#%@XrENAWDmZ{(=w}`gzcZC%(56$RzNX(Q8AV%cg7M&S99lWa*?LR>xj%y;ZHZC zdPenw#>`2Usn7Cg9>sVfTRw7(g11S0OY8kQiZPd`^+^^p1D{uL&xwy>p|aHoXb-$e z8R0dUzc3=LF>)2DVk#tQNeqYfNRVYJ5BSY|r`;(N+0zoq4(bnXP#4gucCDha!PQCYd7gTB>C|6QhKO>m z|5dPDtE=gip2yJ~Cv?+GCuYRHkpksKnJF2qo{S%@a;5XCU6!JNR{|BtI_Rcly0HLI z(I6d#J#UV_;}+T@zAb2g@dZsM+{lot-xoybJ*XFRrf6MGX<* zOIKwNVd9CtAJhL`)=T>%-sB7w(+Z}m>hZBSHl*r!^{cjv(thFkdd1X4-pei?Znb)C zBv8E!g&G-SpKfA5RXxc@;xQ+a*D+1wfK(WTn?xmzI&t@L4q%j@2-S*VLh&;kquWdD zr%6Cg093`>4CfJBWEY-O37M8f{lXN_Llnhjj<2RUCX`_Mra5a3P_z}V*VC+<+3VML z!tFKo1G{g+?(J^dGrxBu|GhE%C0`RZW_PicbTd1Vk?xt*1?~f*Z^Gzur|p@|yHM|g z$rqVf6VD$!;Fj+hMhO8?0j5+>1~c?Inw2w3mHCyfK7po6cZC#|u@R*blo{~2p*1Sl ztRUSps(<2G>d_I`SW(MIr@i%HV~YxKGmU(1I}Rf{HB#wGdo%JS0TNmu^1jylftx%k z3Y?6p>bRb`N=?i$GlcnAda0l+8q-~WoT5OX$J{nPlbYjpPf)Lh3i=<>8;%3+uQ5iD;jW~r*qoq9%nJW0L;)WGxOk| z%P8lfu+zV#!{K;KvbJ(N?r)MnwW2j~%RggjnUrt|BQkTr1JVJN5Dn{83JTVAkkn!+ zrXb41k^e~MqGS@|%L4h=kHI+;wa-cviw76HG4&IMH_E<7vnal;tgI4>qqcq)Wgw(Q zBPKYI>=MN+L=71)&*#Qt`hQEVB4P&x;Gdm+$E~*mI!%(Pte3VHsC12z1nQt6snoni zw5}DeSv5<0jlJ)T^992p>9mF=d;qhW3W)MSf_7sftxicrjE;mAneFQL0wI){08xp4#>N zus$lJnArh3ZD2FgDoRh5)I#ALMTPfzt&rL3`z08EEeS4xd_nvB$3KsxT6>jMQD%s? z+7#VQT@`rx)z!+CY`D5wbwNv<*4}z6WohLXzoWidyW(}r(yEp_*H`P#U8S&|mPHyz z$+g^f+#gRCij=t@11~M6jcXX81TZR4tLKGcR~G53D7jwl`}*iVtpb}+QoD$OSri2E z4a%`Rf-L*tYx)MWS4%y^W>Xq+XkMn0YDJE47+uS6t{uXi6*A=G$_1MeT*pcX%-pk? z9Z5EdYSRNUPTET-%P`#$Q~dO|sJf}E_GN1z`Abn>6BbjCWb4SjrnQ-g4=ZniM=f$F zjcHi`<_0DFLuOU&I0=-Jh;=wz>{}tj6u@si@eql8nPHl`{}jDGli8{|V*h<^j;h70 zy;xP#j(LQgfMgOSpL>cHF;S4uocHMjI{t%ixAweItG3~yLz%1G5YhUe+Bgx}p^D|} za{2y7LRdS=9kYQFL-63i!dg5{Nztss@|wopG?SE*{vstT5{ePkKBcc#Xy!95XsgL4DOIjoT zOjSxLIU4xe697lhP}C(%+}r(}1;DpnN@lR7nyO{8W&YwTU2U9fSb z@?n^z4by@GclGLWkzGdMDP6F+D=G8XrQ(ru79D|1xT&G`=itgm*NGS@l*nR*wgGc@G`h@j>M5RCS|$ZuWZzvr1p(&q2s`QV61B^^Jg=cw zl^@p9yCQC(_D%|G59t9r4XNz5TMdrlOOUd7qW--`9p_8g%deea*X%cH0=sq`H8hXh zS_t=RgSPS=fOVmQZP+eNfgz}ifdCZO)H5#Jxmo>(rkeRg%%l!~ekyA=gA3-NzSuRWey{Z<|@p-=7JV{}Wo; z>qf`*#9C-?pNh9UNYZi3(#h-z<-{z;=kL!Ri?1)vAA@Y}KL&V~6}Qi#{IOW;9yhb? zF3rs2n8ia&DjzkPZvii(f~ zTJlTfOR;(qxhAhH+Ovc|e@!Xk6*A&@fDL#6gj478$wm~)XqyuT295*ffuwLRWC~k( zXfFxm4Q(mBzSX9b%OcIu1cS3WG^Y{NEdrose3>v~ zF%G~(iHt{#H96{}jN`{3Nn4nhI?5b+*ug5DJJYnbRCKk5*D2%R+bBh5b>ZK0gLnvh zj!PDl1MugFFb?%&6wMwtgDxC;>i2ZwwRR`c*-};LjN)LG-=<}*Fq9Gv?}YKtPm_OD zxu}`(;!_L3r;(Ia00B~Z3U`l6NX3@*o*-x@Y-NpSp4mB1CCOr?>#0MBQX!?swhw|V zKDqKVLlY5!&=QNMEZ*gHDklxA1Z1(my006fW-3&ArYG}Q%~=}YdI~jWe@{5GiQ(hp z8sPl@Cy;Jrj^{YW4TTD)kW_&?3Z;T@V?3&xb^S#Tj%krYNWSN^yg60#Gam0vt)byh$h5JJ1!U{3^;9rT&-$cNk=5IEYGSy*%c5KaQK#41r>ng#`z+!a&e1m&`Q$H`0lfI4cfT^FC$$>A1^Tm;L zEWngX)+t#UakZGmr8ZVeO7plR`PhpR5T^$_di(4x5Xmyx7A$23l^>YzyBDXdBbI2R*p-sxiWe<1TrGo=lx;hgq*AqImv_#Q zKjoh7!mL5dEblr;^~sFjS<#y-_uxX?AGiar105){eyXbav^ZOi$MjWI|M51Q@MqzI z-;tWqC?s`QGV#LaG% zD(h1ZUsXrfLs+XSTX{^ZyI@0xu( zM_jnqtRHTXNp9F!^TO)~TGT#plozocMz~Kv1&x5J9imwu&E&HgsXtqy!?x{CStmw| zdtfXN7JJ@!6kg-o6HpSI*9Xv`_RE{yDw8}dv+?X!sf!$~IrfsSdl6jLI0Sr>yse@n zh~`mHqL_}%b#;FN%ezDhl=ygb#Cw<>pjBx*iO9Uj{8m^JMcH~ppR$MYLC|sQBz6jIW75Bb++wp5GsxIT(2rudS7-=Kc&n~48vopbtAj50+$ zQ<$T#==C?0FZd}O?QlO$NRgw6r8wVc5#tFOqhzAsId{bwBSNA{!jdf|X@JKM5_W4F z4`F?DM1Nhj0$L@$BLIaghUiwJi6@WVIDOv`(yH1NlmrS&ib$!RJUXhrbr4ykSsJI4 z+slkj$+I0Pts>M}U^t;D4i}z!RMRjj=}s z_#K_A|4WKIN+$fx%@il^5`v0|ge-UB!h7Zx(+u1Ha!LKSg@j@S;s&Bv#JQ0@j2Xkp z#;3u{`k=04Az?Jt&rjnB5nMaJ39St$MIP~|V_f)S?$b(pE6b?Ze|cUxL-Rsa3eml! zjzmGA2m+KMWju%rUtu&TRN}F(3gVQHA00{UsK+(Rq`b^<1XYzwftpe-$rNy0xwZP~ z?6`V%b8|ClJ#XiqtP&(tN7n?5`K39eCoSOUsLrWyas(cL4;YlBWS55I*iUCOoCM7O zNJ>uAR=p=$w)E1Ob* zPq;rJ0eP9wEwq#zROA_sqoRm0MO_o}7?9GR(#l^)NkoTtR5^wOY3&NHCS@D8J>Itwlm~zP-rfTj1p^`~-ys&cT;W zAAdPwiQ?#p@O9VE$`fFysyY(~3^R6to%2n^vTX5Dl#0TIf~NX9YVs?J>$`<7rtrcb zfZ#dKQB0?XLN~!xDn{<^QfJW%m`{)Jds^vliGrZcWxlfJ+RO9(`5RIF2)rx?R1L(n zS}eXUO2YK9un44O0sfJeIo;$FKABI(Z1#?>9ipH@nWi%~JH~05D^1@0>IQM8x^-Q2 z$M`{g#jrBZl5WG0l!N>TfO#edB+9xnZ6~|0uIsKk;nelGzM?tJfqcDjeNUYzC`SOU zz6P6@>yJ?v6*hZMes~z*q=*prq7;d7E4vP@?6Q@{gUvbxJ*sg~MON6Ls-)}uY%47% zRs2GwE7oQfP?v3-6|bW>zPyPFe<~T~@n?2pL?DtTlaDXY=SJ93=>4(eGxQR+Oz*vbmrI>?x33H>*sB#5`mXIFP%O5NO; zx@1nJ{dIiQu{H>~+p#*x7bJ73%=A9)S;$@Ve}AinMD&m~qq+HdIgMamCdqP7G%_n{ zt|05M;?|+eixu{!WEPtM8;r#chd9|7&hEtSnM=#}-l6 ztL#k*vx@L5DuO8If%KBQXq<}79YqSVoLABsj0%y@GMn>;u{#%Q^NgaPvX(CjNYX@- z0*eGlZ;pja{dhDdw8rC}v_WE<0~q;JRMg{2l?S^1PjS*FxuEkyAQN|uG1qbKW{t9} zN_)+xMHP(A91+m8zLz-4Ng?r+WRGLG1zpdgoTrAAl_DNC65k4c1|cyJ_$Df(yFRI4 zr&J7Cm*UQzO6gk&#FfQilY*j& zrC3}bMr&8(cG@#0a3pT80}U2ZN>xg#oYZMqcsGSk0Mv91N>95e0CLy)Tk*^6e(x0cNec{t6!zp5qm+IqwQ>QRcDr9yfdjoNVx_epxU@aE8?_@5UdkN z2qlLCjK3Pu0-gJH(QxTX8g;XIk>G+%Qy!98&5JxODGRX2Nqxx^yK(6zDyB^5I8TGU z&5eqNRdb`J^Ded#HS&EdTN}fJ2S*|&H))REcuH~>e@B%vUL~a?JMy790%mM;(5P) zzZA<{h7x{zJs0+juadODA}sse#j8tk&9Jm0&>?vClrnFb$I^k@1r8#zd9!i~HmpUg z=>0ZoM)^AMHgA>y9M&*V_`aIP!;I@oh{hkAE6vZ-pt;a|RAlkcI#g9v zEyG}cRaIU5tLc{c7iehEHZ;?K#$QxThnn>lpx$lM`KP2i?7yfx*R|NVKgj3TU&mh^ zF;QFRD`A?yI9~MP5@&go@I*J$=6d@q<>}=(Hwc#`ko-fSORrw<^vqeE(^owbRSm^u7lj<()8Y@4b zuI^hu2BS74-yaSK{?C7o6h%2gStRxgCqSZZJl8y2Ab4~gCBX^knLB*qWd4w3jj#8cMTNpS@7@L7$EmGLokby3(V5)l3pxQ83`2>2+-&C2%0hy0$m`$ zMIQNbH+M4~r~K^v-Mb=+qhHuEbdGbMs!0=Eb%!EsBNyUCy3&Tl&t`8b?yb$r`U$V# zbdGa0!BQn_dUqW~v`IJ#M9L&{mDZ`hPDUw*HIz+l%~`$1XO8z}7yU-~LJW*KBK4I(E=P;Ih%mwyz;^723a3Vg#8!dEtOlmzmgKqRdHYAovv z3+orVepxJ79e8s*6BhbPjai9}?glSqjDKX&vUdL0Q3u;gfi?3VYEWO$|5eR^hxvaW zA2$Cl*i2r?xL8kyDmPr^x*;wB?wi0h!}LvKeusgSdJ;)>v}Rt8k_iT1P=Lqaizfc% zaiZZ`lBIbjRRf5cvfi#d`P_t9-Q3 zg^Plb9qh zTX?CyuCg3)eQzHlVulKT`brv_Rf99CU|)5NmBrCld@ayR35D!Yi zoqg7?|8=VAtrdVZ>%VT;i|0S8VQYu=|2{t3tp7Df>{kJ((GJl7>cR&V;7_0e6QPSq8NEGuDhUB!AXZoApte@&(P<0&2v8Z zEA)sqMox{4>ykbhfTiO&tm*B8GI~%(|BIB-wfbM>wY|d`;9C7pUpoJ@P5q$%-N%O+ zw`KePOA!pP()thjlsLgHt4;sS{k8)w|5bp3WcRNgEm-|4Ztb!8i`SCHzrxdH?+>b! zNXwRdt~R8_0?L*#U#JhvF8^>*%v6Mm+h~u$7mpsTvi`RzUu*kUwln_M!`H5FsNuf> z2kn~0a8fb)`7!vSh@~M|?80JM#77|*)pyp(FGagrM<^#xz(Y_eV*fK&{%3v+j*FN# zD!`vXyPubMXWg+(SDi~$vRYSRTuae{-m^4MUu$;S6a9`!mC<_$Rk z|2P&a!0|uj<_^V-S0H{~;oSzYAX!;eK}Gpv(9|_-k?fgD(nbl_Vc?A>upUYQMcVL% zfGSd%_r6HD4#DEAS}&r^TYAw@9A!`A)W7b1G4i7z2Me3H%mYvOoo}@>x+pFs6NrMG zn*#eW$@SpRKF(Tu3;v{S)e>#*2U3PxAG^0}%TGEso`B1q4Ec4AQ1A#m!gioPPxKWCI7n6+?mJIDrqaYUBz)IC{s{c2+5y+(%_wibG;v2;j8s7bh& zyM7&caz`xDD7_p?sEluOYPVn=dG#2?G!novyDYtIGs+@H#wzv0g+;O^UlJ8cZ=u%y zxEi!RT8DB|AN&q{w6cdb;-Hn7_RTv>ywuW5c)Y$SCgpMI)kCaaJ!Gpzt!4g`vYV`1 z)>?212=jEdw6f8MhqdjnwjI{C!IJ5)wjI{CKl0jkuS;9Y&iGr~9M{_a>S(t+^Z(Z^ zebN4>>d-vc|L)_%?0=WoPm=)Uw{j3D6{(dWKTc7A^ToJO#xuPpKPgPIbr{SKn;9Pb zxxjgX;+IK*^N?k8mrj9uj~SQ2j==~>Gg1YuKu?jjsUrby6!x4y%i-}X5BsRe8Ymkl zL7$5bGlw=XwZ~zH*l8$i61cCVjCOLBzWjKR&Uu!wi(uM^H=X3ovt$@ui)rdM=(Y-U zc&Akm!$@1q6t)3r73gr%Du^|tJuRa+Xd(h;5}^#TX#GPN#O*a{4EH7NA@$MXK|5odCH`HaI`@#@$CpcmS?ZpFWd-*Q zE?-;wdnLWZvm*CyBLX|B=S~XC*g9r)|CD9gB8q#dT0S&tAA~J6{=W6W_4?o3zvKKL zP*d%t{2%rq{{LP+OY#5bO+IyTeJ8sQZrf}CY!&Ku2F&LES_i<&W9ne1LuCw=$v z!eT_VR$97Vs~+N?!NWR0fRV%AbD_u{JQA*a3``^lWQ|@j21)fwK7^DwWzibIFfNrJ z9PPhc)1sRfcO6@|QCYAwl`OJF z@&@8AMB=`Ji!{c+qrgE%cspe9*Bt@|`)b%Y-fu}-FXLoadD7SHOLYX-?}{W4QvGe-L6l4mqqtc$c^YGp2oz<}H+foSD|-H@N(w5^n~h!KN-i8u*pVy8ciFN%Fe29= zZCfke$ioPl137*ydVyn%2p+wu9xtgLeVtp;+LY<&SFKl*`Qv#GuU-H7MtLUXQC%>xcP&FP|m*Pjw&dmiC_7th*`zw7TbN zX#8h&xt3%BsvfniKUK-T_$u*QvfWg8w#oNc!S-Z(Y+^)P)eesltr{~lMzr0!JIW7P z4{*D>p=P26yi*767OzKwOY6wL>Rg(%m~|afu8Q`%tXOhgu-^(^TnzSG!;DM8el-nu z6zeCEzEtI^P`?UJ4)t5;(%&xBuWrF1(r=s3(Dfhjeb-iMz&ickUOfNNpspSAf8EPR z(*NcC^~U>vwkyH1?XF#7#4)bfH?&Lyo%@GsbzWLJmo^fQ`Y1_uziXw#n6OaElFg>m z)-x#a)}A*Y>*s&twy^CUV9oqDbPX>0|Iy-y`F{_eE%N_e3Xa%!2H=*1j41NOyjIo4 z)T-a)+{jnm+0-)nbqSVs0zs(}zata!zA^}|LcB*=^gB%g*vehEOD4d#$uk_|JIn+q zPo)8=083Wghh_I$moadZp}dILMVtb6XTHC>RPP9`M*8bLCgKwd^qUQ*`|A9C zOVh3|&0a^Mzuswg$h_B#+Ppb(zN%D|#rVD2XK3yh@-Dp#R^~ifJ`szFaIRU{&(D2X zUF?ABDj;=$vcxd*y?+&=x&!6@0^&;1*J*%T!80rY?};e6i%o`e!l4|0bVx`ak!TA4{r` z+{=gS|CQ=rq}8o%3&ApJa#UUWR!!kCh!T+&2sc*zp6lNx(Htl1?|xf~n(6QY>W{~% zY<=Uez-g9IdBC?HO-q_<+Jy-p1p!k*P<&Rss?$CGDsG7q5FPizF48-yOY_w$%+ncL zB3of763&)=v$h9IEnOz=m{qFCowS5-$*?;93cM7w^Fxg+PH(@%x8l%OSY7cfD{fn@ z7bm1cn!bRuxnZ}lhA;T!H~5#GM!Q-djj4d+OL{ey{8xMUM2U?W!2Q}T>wL;RqbN|X z9zxksSp>seGCr}l`1lxnF-=J!=MEOw>0{D+#`lo#C>Zc4 zL&cN;^^wG#f?Ii8>i#&UbR5@>dDL@|HgqnmP4ByEE=b9JcbE%(-+ya8=)d)|o&GP> zjsK6mxBqV2#ui2AXa5zrYIJlVru1K^yw36p;;;x8ZvhASqo%$M`LV=@ID4pTcdry91;3 z(T>6%V6=XP@D`>c3z^1eS(}@XvR_PT;)UCaxkxK4=rJp*f9AC{W6TFF3{7UTZe6hR z6J~Zovkhx%pI4v7sWN8(Mr)MD5ldjRru1VP!j|ix(spyeiW6B!pz`)Pc(!JUEROxw zGT^m3NV{oB1apy)lvN1wrB3;*wqoi^4XkTP8k5+M!y|Bga?nB8Pn__P=Q!TsAq1tV0x-E05s|o+FdnI5C|L^rCX8!j8sL z|Bvxx{Qpe?qjwkQz)vAvHpmOHFtgx{`}2_BHMoDlDAaz0o!s;?LgoNbb_Up1H~Yig zODNU(bz~H-D{wNhg=gt7OuizdfuJ!&f%>g1_(|pa!k#AdpY!bpr2m70{@0&8-T!!$ zC!_zuoV}aE8BAg1qi7E1h~&b}o}mN+6p>gtK;dTd8mBvUi~D16h}yCqXM~nS4mG4j z4kL3oX#hc2+zfbC99T5wr8y@E$^La5z$4HfjVTi#a4C3O8{EQ8Ca-eyW?~azpR9U+ zwx=Tfmyz%48~-ZM|M9RO{|~!Q{{N5iWb{7^q8M)_y74rZ(8p=^UH zK0d!?kS<^^3V4Ky{V9s}@q+!`_Sru;gfIapnxP1h&Gt?|u#x67KDFt8Hpc3gLAKEU z?qpQ7|BRpRe>}?L^8Zrf>OQ9PR~};5?fO*++-rCI%7*Y+yuNH~?lb#*<+v&J_^Kt0 zSKR+HC^M7)MCj88lmCW8^ZwUhFnr4Y{U}c+|79`0`2^Rr`DS6hm0;HH4QvYv?ljq+ zFo>_cr1?Fqwro(d+19ey%67A^Z@guA1U~W;9j3TT32;G3auYJIzng@eCLVSVy5i$J zO?>?$|H5Ql^*+c9g^&+&pDdI8>^p1NetXQsZW!MpDG&J}f>D<7XO)IWS~ef^s)nC> z2^4$1aKpmg-W=z59e#_aH`y$8jH?aABgog`vpj>$Va&MT5XQb2E@Diwx8}7MKpV5Q zL!X3GhsBL{|~JH_xnZte=vTc|Bvz%>HmH8f0Y#!_5X|# zTl9bVZHxY|7ptQG>oxAF|JP9J6+ZW8RO+)O@lZ;=ijU8))Nk>+$vRWn=Z3SZ4&}@* z_95|es;Ef?t%75V9E>a`AQjw2+%R>=k>aNmdcm70+#In?b@%qnso;xKI=_D&`^Ufg zQ=9*1bNpcTpWb9(#{U`gpW^>L&f~KGs41Tw)BclZf2yHA+U-B8M*HygADfu-ne9J0 zZff87%hYoBUBA3Yr7`Czs|o`ZV6=heuWMiSGc6PMzx9`mWBs|V`Wc-5vtRgYti9Hz z|8<>zD%k%AeN+GIPr6U{KOW^N_5b0E_kkRLtedXQ4&Q`aAA-;Dpz>y5fk`~NW>m;5JEkv^vA$I_81QeT}krysIZl&v^{5zlPeI5BDt z0@wwVtg$H6Q*-2L)U_@RUOJn@<@>uEy&A2|NQ zU@|uSe}>(`lmGXlJcaw8_dWi#P|5uCSA4V`{)$gq&VIF0RgQkO3ik{4P{Z+CzPb9J ztDDzvPT#(IS>x20V(-s+U`*G~L!A{1EPVcBV#gr^ZT}X9;nf`?{z7l<`?JfJKOet( zrMA|3bKX*lT)ugG{qm-#mFP|So!+?9?R58h{gyq^HAkjnQM~8Qc;`HaJia-*SP%7{ z@n%1KVB(gDV%xXj#WCgCl-Lns>%lm${!D%sS?=+A%u~{2C9Eg$TgK*w{Q`hpC1BWp zeZ6j3%XPq>ImQP;{@8;2v4QuDF7YtFi_?H(21e`e z(|E~!6}TKHl7xconK=!ctfcWu=ZpRjir0hcr;{5rI(XrwFz93jB^r5W_}7w^su(=9 zIm*l=1?LMY+Q^z!oE>P{5UpVZF}_ISDQif3QPtm}y``1U=}pl@{(Io~AKh`UU-18X zivRmK&u57LVd{?U&y^kYnM!V|dUii^d3L|MIKMf5d;Q}PkEm|2l`15+8oB)lrsE-u z{4c}JsmA`#%+z%)fLr(fxOo5f$^YkZ9+&;^XF1sqVgVE+qnvIi#~^m=Uf!pB+V?V( zUBNxl=!s_Q+xrX_K4r|6?{q!r{5RYG^(;W!>_6jy$^VCg!IS_0qdXb^&o|e7EkM@Y zliPr@&o(Pi_Hm0H$S7CE5@b}VV+$IM4-9J%e{*kpP_CC;y}UTSJidN&saXvEtMz0u zDw>S`ls2QE&R)H``uXhoC4mem)AePx%}zs=Ir9#u&|tp@D1Gm>)W9!;%;or^s8wQ2ct0t_F*#X%6^;abX^pA zOFmr*?g5kNa%2=*ps(|?BniQ;1h=OdFNIu ze_5!_$<8We8xzemVqpVGl+Ns5+U zy15d${*GRNxpD>~QvenYT(Sf;yt;AB^2}S2_!Ww79~i6%cYT#7fp;wt6Y<6{3lpG! zFPR8S7mD*?DO8~ab1@ZKlZg>2DouDSQ;;QYh@KHsBoxZfE3P-M#lA3r?(H>L%e(d! zsD6;E0~om<%~fMxG}||eb&j-6Qc|2DS>V{{kU(C zg|a5{3cYLHuBI@JAc5FVgBIA+`;;HHRP0XHmHRfFtHrvCY)s?QHG}4~EUh!LtT`FW zYV)uxn}X#%u)BmQ_J)-TDjC-Wb|qqzU(Wu2rI({ot3gpRMH@}HMUn6 zuc^CPT*RzoFs~yBA=mGOB$BO2MOOjC%8{ZV_QRAs+44a3qW zZRK*DC-R`0;hY8dwJv;ht!H$>_)cqIv+R5yKID|}B84;bzQuvl&o;1yo&hlR{970W zN7~Enod7arzFARaP!iFFx`1WaFIEL0S}mtA<<;|CwS{qLl8w=$^X={9d|_>E%0!uK z3)VZ-czP;7mF>UD+HVy6r%L|!t{MNaI~qLY|9F(Aw*B`)Isp+L_v<9|(DJibgOjzA z4$xw%Rm0yXVS~zTwGKfL-{zy=1H1GK^%h zvqh_;{8HMaiG+MKnMEZ|HEG0X)m|)zMzuYzs9Bes>1SZq;$(9wp5ioXJB7qUQO#3* zWr(7_)Q%P~Tz2qcU%Gy^6XsytIs&&4CbmQi_t$^Q#MXwnF1D(xwKX!&_aVlw;{awE zC7BM9jXL|T>Yta;3w}-!fo~!ow%FAvMW)mI>i~;H1{G}ylQ?DW<%%MQ(Lc2Y4i681 zKrK@vEg(vO;)JOMb^$kbD>S2(Z`*koPra}Oo~Z^BWyx@7%Y0GhzqPI^#ccP4AMA*@ zGXIxi`GcSTb|;gb$^W0ue;@0q&Hv?@%IDztVvUt@eN`X5563t4+FIOxN7a7+D3-6a zU*zKIS0^M>g28K_ske$5o&_;fh^8_-;*?K2P878s<`|LxvA0+1TPRkfLjq9Ia9=yF zLCQ_0D0!msy^KK?M2rtvY{^{>znvtFN$kg=J{5bQ_2c#R#Z_jZEjQ3gwDW{j82bxI z@w6Z$!48uq?}=O&X5+77FZj+2y~u}Y)(1KfVL0uqB1Bt(9WvYZ!Z5yT^LqhplvEBU zVe8d)fvJ(bcsEYD{459CItf>p!1U~*wFh>25HP0)Vd~p-Od@Nl&-KfFG{i3P${V!{gn^Jvm9${XBVw4B`piW(Jyl|DHSCi z^mkh4ZNxb6LmEvaUKWkc!081ZnfgPm31x>ANTgMLCROk5acU`=i6-{whh7kB_inL zr+co?lmYGuDiuPX#OaZZw((DnU7~*$)Wm(i!$nop8FI_9S!=J##ah>)%N9w%DU`pA z0`6$=&|-N3HF!0}P+na1GLo6yxfjA_k-BHgThf}E)TWHy@TP4vCnqKcUG?nCy@%{4 z)DLtxR@eS>!!@>AR-kS7KL>^UpZ#%v{AB-mjEC8OE+JW^kw~`0R8F>Zxy?u9aM0~O zm2EkuhOd|}#D=+GJL>2Kx2opf?fbB!?ZbB2Ml`(cv$#BZ!+g8BJ@FlxAG%;Sgpm$w zPu-?0_{FX?%ACiX%rHxt>>x$2G(-Kp^)>!`>wmQ}{|8DL-5#5T^d7X;e{sZ{FaEWY}Q8DwapkoRY<|asK`7^54+@PeDk5LS6 zI2SlORR!24>?=}?iqwbkq zK>~`!cq9jPM4Fsvbf^KGlI10|ceWSIouGU-h$hjEG+J*(H?^ZF-4^3GM6x$xJwI|b zl-L`wHFIIJx9Re0_Ek{PmP^alg4$&rQ|GNnJ&EouQ)mo31KfcuKU-$0GFB;@PH7!9 z=T=!12Gz9yc~&3=j?I*0A-*({Xag+#uM2?N?eUwoH8&mI@?(6H?&=(k+P7627Oqzu?eBlRKKgpi zee+}&c%vLV2eh|6)LT(4+9v;pXu9vilpsPQeU!&0 z|HG7M!P}*`OLmi{va?G@P4sYBFeN|6VW34iR{VHeg?0ZJTk6)tosBL_Z|$LwUumZ-Mr2WMXDn0p?C;Un`0r5*wA$@9cK@Vw!}~2b>AEk;*9N(5O;jRLF|ZNr@;PCaKjPt5s>(bq$rx_`2{q_LLuJ5 zO&P>&ol|sdZPcY>+qP{xC$?={C${aJBqz3Q+qUhT*iLo6zeo4zi@vCvU8BaX{f^r2 zuDRy3=0dCH2dNDDyv3Ry&&`?rS~>*84hY)C0(Nj?Vc&Xl?|TJiNN4?(!B&wJojU{{ zLMCJ^@TL=PkfD$;geTRh;kLpBA!60>^l5KdqE~Mi$g?NWDN2zjD4iOVs?51HlD`|f zFws^rL!>@&fk~i`9YTli>=PGQwksn z*vUOIaH8J1M|XIbo7Mm4cjXx%-i%+D$=#cAc0pySGL+C={UMHjOc$G`#Q{vQ@+Z!A zG9o9Ep?-M2>##jZB`&jyyV`egw8vO)8M}S%&{kuDeYC<|RTjf4gNlp;dE1+O=t_#~ zGbva4p75*1zfg05UZc&nE#2>64K%A@LcUhYdKcfo zc75>35!0O)j7r7esKL^X6Lwm?@1uo9uYLEUgjV?JBWkDG`!hc2#gQ%fA*&(k@LLuu zxXQRc1p{PP)&SbJ)jVK^l>mcYoi#vm>1S^I{Vkri5!P;CuDS}9ttrW&#?)0Fa175( zwL@&1TV}BG_F~bg&FQb|qNdHntI6yNAeL)-oFGO;AFOUNsY5a`Rgdv2zp3q+7=2wE zRcpLN?SG7)mc8?FT|1r z5A9@iwPe&!@J9z$Q^SGH%_UI@0=*`?tS5EcB#cytTD;(aA7!}?QY0XiKAns6XrN0~ z<^a4U4(Js7ApAOw{1zN2obW&Baps>_$Z?vRraa8816Oe#PV>cl@y;HlNX?|B`FozF z_>*2lmiU;ReNQ$Ld)kab*Q7a&u3ZRaaW1xl2XR#{NkcswRC7;dDaPVW?(n_^+6d0p zRQC2k2OKI9h?na3 zDDWkkWa=G9Sn&D4X1h~*Dnmyf(DWS=W>@N?ozSBXFCS(jvr9dk*9CY1yES&UrOqnb z?d7r=#POeYC+gA~T?Wo~SD`~Ixxm)5P0vg&svQO21$;%OYE-VnbwgIWO)`YuWYtA* z_f2{+>4fe>eD>Unu!*K9kwIrB%*@Oth*}&&+Xc%bK&YH~)4~DAr6o{1W>q{`Wf5aR zd`>7uq(<}wl*&k8UCMLXMk&nJT56$9YX$9e&&;gD6=i`s5|M_uHvD-LP8IRD;U#qT9xsLXuI zy0Y4iYm2}nsYFNDIt!+ESeo&|I>rIjk?x>+9-L}E*TIc0i<}V(3*a4K8@M7@ zDd3w}$THr6q!sTgs4o_h1STy!AraKfb2@UZHr3+QkAMhMGM%Ga2~H~9AL=*@&b|;V zjge}PQApLPpoE;TXjrhF5Q~}~hP&teTWL&;#M2xvkqtpKy+M(76GKw{-78rWj#^qk zSxNqN8j=b6aGHfTid|N?G<25mF@WE`k3e?>ISirg@&dgI9s@PLZ=J?8z%HTo7clOn z+jz4!2w&Z^2pUl1^mgr?{^T+#u9_Q*B~LAV4+Q|ViRTiq{*{K2{zdR>Q*-A=IOS#` z3+6W!dRY^)YSP%v_Ex-z<0&2HX7$RR;#~83( z$qxJzke{?)GV+~vM?|>xy-D~R()@dO$MNw9@J5B0Y=7O{edXhz7tvn<6$z43G7c5t zDV`tT1mpg?=DAPW0(c=r=)0?Z*(B|$$ zG!>8wrv$7e1J{F;I?XXBi&<_LRTQ@Udfz3zj!xYZS*AjFSD5wuNe*c3RzyvHN-vFJ za&JwDq*x1_%PWH}O#p2n^J9q^9YzLwf7+g6Ih^)Al!S!InOwEzl#MoK`BP(@o=sv$ z`f~-Hp1aJlV(w}yqp7$5#6~p_WsZsO1^)(%@QF2NZ(GUnLzOS>XUBu0E2SnbEjdl9 z-p_n-$LT_>V>WUHkc7j(j82O6 z{<_MwPc)ZG5E{NLL+iSc&?jeDXVLlr6uW$Clen0r^>YzN_zaevu=?0H;(F*Ml>==1 z5gFe?O{ff5FrLfFD#rt~?7dGum8Vtnl|9oZ)Zle1Hy9!{du@)2-ZRu&%))H>Ut@lS z7Edda3>&E(ppnm2CQ>!XYF4o~N{u4@_8YKHd+Oh?2veafWx|;Z*)`s6%tM_KQ$)&~ zQi$hxLf1rvY*a&O9I$0t)y4p7?8ND$nYzbVA){EM$g!eVP1m+F4h7X0$Yx>rGf}0; z<}g&Hx@W*qm_%A76lN6;W2$LP52`92BxYpyGoMxXWCk^~x~TQFdS)ltx2EML%8nnc z-BrksOPLm@E>TNj6JD}vLDKi0hBHc7yLmO&*P1XU3uB)jiW=RJ-n41WkRK&Ov_@XQ zfQ7F?rj#ng1q%pc2`&+S8EwxSa-wbhAmf7kz7|*)u=mcPpg!!-usR+!XC<@AM8Z_O zSQR707EW>jg~ysb)c=Qh9iwUu^0|N-&E$!I654kV<#=9ry0N?tsJu1dA&BF0vK+LV z;mlpQ7t5{36LY=z{Accg{ianzx*d4LH+*>BYBtx$$>=0?RGS4iW7E7&>Y2 zT70;*wIxg%_LIV02F`yXWb&(G#L6U^fjSi8=GgaW@?nclIc5ylLdy%;D7u3=1*fAf zvntu-^O#qUR?NV3H|F)lev9PuwRIHln;2q%p2~t7ZRm_SlcU=GJQ!({^?yhr2(%`e zcUr3NAl`0(v6X~YlDh@cv6lhIL2YjCo;L0uSMy?`-R;xXuBFVfJ=57~}W6Y}MD<|RXT8soM>yr%OD*zaEqyu1c~7J$+A2**cW+&0R2|Mq9vBXM0F}_ zs&(5X#t{|!u5;}nZ42}NJGsw0f{*Zxv@XR>ZN0vDzY zR#w%q+iWweNlgh)FQ?nT5$fnHFhd!LcBiDb(GZSia^F>Nc#ggpguWS#rr*P0robf7 zIz#T^#Y%!rXF#4ziKxY*gCy#=QSqilJMJ+zh?r3+l9eYzc7w43#>EKLGfoIuq3i#`RBQ9}Lc5^jCof{n+9UQ}yh4Q=H5^HQ{Se4mgR zEz>YU9jE#ZqXP24yqNBmq}voe!^CQT{D&;uQ_j2k^e^qik*#G-rl3%8Jn*WE?Xuy06975J8T+>+<4%Qa`b7q>MKqEZS z3v3yDs8Q<%BuQ)@+0ZCEFoi-AXp-WzpJ;Moj+81TM3C9F`eBenOZ|{*Ho?5||QO8BiK^#&R)4dc) zM|S{D)mSwca!0l_2%3N0vt$zh`nVw5NTdJ6yv3a4%G*5!c$WHu5(G3pee2?O;elFvHYD*o>vY$kI(+Z-2>pB4HUaMs9~sVeAm?m3mmkefZ z9%!z>-4^b6!yq+^LP?<6FGLf#YkkaopLf+A06n}#VWCYxbiNOnLO8dCfUVXqCh8uPN_U)HfnLR6-DE+cC(SMgv{u$z~QngfJ*-e2!@=l+aJYVPeJcZ zK^HpQD%M-*_}-wF6DRX77vk$%<+E49Q{a}@YE`x7K@qIs?T^L`NC3%$d80G)H2tWO zBP9w>+5y@?9lt-^W>34WvAUtb{h6d!>=l_DV{_qs0{8Bi}LdU{9VoC>^~yu>SinqD6sLwk!^h4HmX^Ij+N z{#SF5dE4ffcJBTD=NW1Z;tXN`Lm6J} z=ZEhEXmn-Lnn8Nvk>Al~d>U`BJOH<%DS6+$iRY#O4Y!u*A&A1KM2ZOAE`DBg-UO}Y zCr{MHx%}eC2uJRaRt-i*himww9Uy%|gRdrhFj{q(!;^o3zlGe_++hczg&Xnqa7)E;J4^C(}kt zIUQyUzGkP7GdV|eo4x2eI}66DdUSq!)37;xUtd06zMgEaFR#1T>hEOr__({>-%nUt z;1?1(NE6pUr2LE>a{u{i@^OrDy}aJ8ZocXPN1^$}v)EY|z1$Z6-W`UiVtIBWRxrel z|D%jfxbfJAi5>_%-E4gJ;wl~|JMyB=Ak#YJ3p3r6Uq4`qnSkiAs+DjgWTZ`90OA-l z(b;GttaXnlbT&W=&>Q3m67&o-7?-}UL`aWSn!4woN#xhZgSNQaoTw@hN2~O%=@2FQ zV*(q*6NQGjYd;pWRe*Y1GF3)nS$(7}>n^K*CE3*pylDW~9!rEd&)EQMdn?`A7Hhs% zQL04+VH5mcvT^b6swVe04CG{cA-Bq2jwIq%*eyPdmVk!V6w{pwea0lebiD;}rJ^GC zO+U)h25m&kaZ(qOA(G?uPrsl{87`Ii${s=G6ABwj!bFJR8(Ei_gT%;ZU018sYPIE9 zQkr)b?wWb0r>~Z{O0x?$-OA4HLkg|m_WhtQB#d-g^@@f~=5ayqBudw0mLr~bQZX9e z3mnlMSxpD2f9!;q92J)Yew9_MfX5d{pq>@3hq1TK3QrxNt)++1Bf35Zf58_v>s|~W zn%*f1)&Lm;(?plSH)y=Q&#Nowk9Jrt4Z~DjG+k*Hd(rA>l*Z}O3cCyy6mHjY>_k07 zRXd%ukW=O(-3zpaK#fktMNF7!^rXwGz-8r%D#4F)GxdAhs+$+1rxB>HoU`SKc-OM_ zu6#MT10fO&&cf6#qVoy%fM`&T*6M>`A5sBL2?}Nm`y@1(-ob@A-{9x9a~~5Pm+M6j zGn>WrfFr+{xK)irRa_f#=S@{|_#bm2H00v*+xS^Nn&ISLZ1`g`Q$+s6wFa;IcXrQ@ z@c{@QbMO5HW*){)0snClc!5A+2|`Fi-}JJ9gpA2pqTi{Z3o$-WbAaLs&;$!@phTJ( z(DnNz_?h(!!OybHB3jLhPY=vJ_-84o4R^yZUaBbQ3_Bi~o3Ck@!N-$01lR-2!tXkN z#{_(r7Q>7Y>b`_J6?3KPX2|bD!Iq$uH=x^SrCI~z0xlb0#AoW77Y!~m(F2vOR2ADk z7!yG1z=9075C^2ialG9Xl2x80eipiqg!6m({qO98;er791Q?14}$pcMP6L4_wLC|645q;tU} z`e3`lIN~2l{|?4%#~~Aww!M18Nk#5X8$;0fbP<&~kSLv3DlYRV6SH1SMaJ|1hU)4a`Zz~Fyp*pwtTy#u8nXC>ihEfhw6ccp{L;*C z*onjOT}AosJTz!xKKvE_NRdNH+3A#9%|1r7NfWx|SF~aJ(%4;RU_a315`D{X9kJgQ z0BLT=L|xs}3C!kYev`R)kDv zPTaqXoA7e2ziBOyxzV=uu+a3v9-e;@eUQuzM23TlG6sy2vT62E+pS%u8P`$}ul+gY z1IO~7x^IoO!N3yh!P%jBSc1)SWv_bW9JQwMvuneN3b<~>iJJSaTUNZ3?!lqkuIk2t zVZx~ivn4G5y|nhWQ981zAMD)AUmN%i%GtGo=-PULZ(Fyl2DE9u!g$+@vSRj%&C?ck z{fz-8J9?+v)vw*xEgz!M#L=G}p4+c%5zvrxifZ+x>;Ds@RbjUpHHvov9qy3{TkpyH z2R-2s$unIhX=3(+)?Nv(k8bg_RDt*3&4=iVxh$!Lx5l@xe;Jwl0aK1cP0|k%CWU8| z^;o%Kdqrd>OL-VGwac3MJwePYe#6DwjE3~@1`Rs4^KD#CI zk2%2Z1u&Z2BL$EMF8%z$_Z;76DbQ~_RjJ~Hux1ktV*kN%=3n;sCKVK?*_-P7d6C+K*U$dCg*1}nkdt$?&3zykg`)U6O!i7cfJS(-=+FTnjh}8qo+@Iv&rBtj$-h3 zu2hWNY^qIHNa*doBKH|%^x~C#+cgsN&(!J-%*9Y_2AsFZ-)0~7b*SPf9+SpVqma9q z{jGgjne3i{N)_!?)|T07_4rpZ-(1FDkaYh+=tn#K0^itC9QSi)0|gUkOVrwX&qkTc zohE%ES`hzL>E^gy{a!0{7#*h4mK+ry9a?c|Q^;Q%cK-!~HS{WlctPJP)v6 zhBp>A!jku(WD@k7Rey_%*%FyE-5hoZbfzGlPs z0j|e_%ZU{gXl-KO7l<9CivSmvEWUC7_&X-_C;Zl$R862PPl0TNeYdG_cEI8(=%fSEe#fB_3acGOkJ{0d1>$<=w%oyr zhGUuaT>+nJm@tGwIFvhC>rtM<4_6pv3XYhuZAoh*#$pe?YMN}1oi6)h9CBJ&%g!~K2dj3Asw_$hkU)qJ zY(I|@I3b-^fFm381K@>nu=Im4{+{V$*6rJ193usP8|T?Z3Q0}=1_OvCmd5{z$+c3I zg>sX^LSx?%qW0I-pNZ!U!89%MmTfQ}^#r=dnjVStJj)rVZuyg+!rAD4c56S8)IMBE zUvz*z-gHAW8&(qCN80){rkPxeT(s2Yof*pZYC7d}858Zy^K(=`G|7W*xgnlM1Oj$YS*0Cn ze7pPj=3SN8SAxjKXiPV_w&UM~X=>@GFY;aM zeGOMB1@Pt&U~P1|&^IG}h?-%U7P!c=a7||zn z5#wC+*O+nBm)5^+X4OIrtnIC+?Q@0~ck>ijl2XCR$JOhV1G0~W{kj#%hh-HCW%L+K zs_*au8qJUwMLZwi&{P{1ge@QgJ~<6?x!*L1bgGB&*t;+QA3i#IdiQiSxcxf%qr&P6 zp027fk}dE=!_FlTb%YWV&P{CtG1~=B=Ob*+pkujR&A%qjJYO?p$I&ka_lnj}7v{&6 zSGCx@fh^snk(zzUKJkP}nHCu3=%&;Sok1e0G5So>-)%#sH{lUq*r zZjfUu0}ymw>|g{?hG%w$KvV?V?oBe+o=2tGF4BxtqZ1+3t{)e!v@f?7j~(O{t*RDS z`7)AY7@@*G){Ei~Hhc8PC-J)LBVvwU1a0aO24D`y%#da#wLkeQaSFYiZ+Fw^h&$>~ zil&HsMXt*VMgffqbQ}sOUQ`8|4Nb0ZC(}PO;_sH1XB`+62pg0l+u7ozc>jkZ?Q{M3 zl8KoScv`A_Vv3*ciGqUZcMkSP>^6)fnbV&a4tg$lx(wzC&(+S$rn+I%^|uZL6LYyG z1l%FzG2M;905GA914N-v=Sux0>dav6y*YT}$HicnVQt3Mhu5@pEHw#6(_hAvr^9d4?fu_{=Tl7B;3~G8v zj;EzSo!7oO7VQh43tw}Q6LkZ125hdS7~^XTUWkk!Y8xW@fGyrJ1@t6MF*@|ZFvSjP z5@p1)@E7P4vU6#BqX(kDQ;k<+{Q9b0l`yCU%&uOvSRPw4oyDyuR<`#K^*S)idJ1vQTlv=V zSZ8|;WqM(Oa05b>Y8IHHm}^!i0kKYPF`%y^A!uHY`mF2pkt!n4f9GArCp8te!K%?} zV9k9Ud%;z91BUeXcSZe%bNAO8AP692nyNWa3vILa2nq5*LE5Te4;C#h!8jAUq`G!B z98ZJUr;7tprccGh6Wq{I`iafSta;OAgvnSGVV28asv4z5=Zq_pg36kSaGQiRzD=4$ z-D`@oVKQ5cOyUChJ%atZWJM(Nc2)=_?=M_)?WMafa-(&rzpRUFd?OWnzZ7tSD{z5Y z*8%S)ivWkU%%8pv@03%-dH{OC@Y2e?GZY7H9>}gS)KqWk8pwml@rh8Qu08VSqUPwO z6>Pf|-QQiJED^@FfM*>;{MLI5@lQctkSlOOffLmC^JMEekle+Br^hAFYf(TY4p8eH zz^OI?V7G+Nzy4#vyfs|<R(lK+B5Xv_pV%SGg~Lt}}scfLF@t{i)DpmpFs>{vZx%6;#`*)#2Cfp{v$;_I)S(u4Y<0nl+hD- zdRPUtggL*O$hn){s~UR5N7KGC?wPdLZJ6$aNbE??QM-S0Y1C&c3DwXCC&@co1@5=g z#oKI~K?H!;BMR`!g%}NJ6rUvZgG38WP=3IaiNf#)j(;_C#29xwMM+Y_0Y=>O5Env& zyw!xDoP7wp(sZ_`rVU>iz=t7%E%bopq@R2Lp3YP!AaqI_9<%dx_gOCh0CZ%2N&c2f zjKkQV3&qIlXAA8=rxBa~jI!t#ng6sU7+$|fyUFi0HZonC#?gls7f7LekcoedPP<7) zyJzG57uhYFxjpYpH%BR7MulH0u}7z@|6oLbUeFpjHul+w5ZN-wAg7J$j%lB{Bg|%y zKsvX0*2EkS%LsqX9*@>{nk}&dQcY4@qMj?xjs#$rP4he%6`a*go!a52V8~?cSl7uL zcAvEP+n<_~iTjOkH0-)k;zitrvwTJc^e1}YK7&<<(KYWL2S-%~&kPs*N39hejmJ78F zl>a8C)j11M4vn=!MC0AaVms9=&D6H%D+#)=;$&%<&OGYJh6&_tyWY{VK10{sQh9vS z$3!DZHJz7FgY5CuvP1%idf@D?uhha#!riRpU9B$8ZM2%xD}rK@)bf-#_8@ z7;&SI23HqqTPICKk_zb@h>%6nN{;8> zvR`W3AZ)~SX?gMJtQQEj+jQR^ylMyCgJD!{*}v}Hrpv6}SFh}vkD-XptUAG{Z0MJ6 zSqi=?8AWFIkU=D}qUyTc2ZJ}0aY$w*&;eBD|KwS0cXR*@XodjzFR}o@j^mc^0)X(a zyaZ6$6i7!Tsayf)bZSQ=DP;s2@ig#l6{tt>S~={eKfn_fXMMsYDk8+!9r6RYb;#e8PHY zxPMS4oT`57TE&iKeo?`lb_r9s3QMST{w#N}@muc5PaOuh^A(t3|3_%r58V+P#$aDU zFiGX#AYv(0JkE>(W$lV#u3T*e_Ngy!~Z1jk-@j#)YOUGA$c)yK$<&5U(8rs^biW{$9jiXXd>p$ zu8?PuK<|2fLfL#TKQBDin>Orme)^2hS+`b*{fd{$YM_mCh3?~c^Jk(P102q)eE*!| z-z0zr&~qRIk`+SGa&O#jt|`)-1x%aBdSxAe6TzVYAw-?azA=GP%#TW_N$J_5$c|F? z&WuWVh%TjW-OxToTcIex%5^!g`_nMF5PjA^K)!{U_w=%|t3w|h8YtY(!|nIf@YQ-# z3uoB})k2$p%z%I9tD|bk%2#K&EHviS5kH!<-htj^)0c54@~FoKs#-NxVg}Mj!qzx^ z#ZG5uZawjVDm^|_d@&nYZMX%hzjUYTK=asvz5>V^1t7jN^po(b zKlu|tr9l6!fUY?;Xk1G)t4iF!dP?JIaZ3Muayv!=e?%KWJJ>GNr@tu%{9Mt{pl3Tk z6!F_b``$(X>yRvrEdP@vUN?Y!q)Xqdm2}qKgD#HW`-*Wauwmr8_hA7_?BN|Ffc~R* z6(4T;YZsqy_`jZxk#E4?S;5<6(Nrl@l$S znxuuqPzm@espLLh4}d@n*s^)C7r_5IYe9H7a1lQu!RI?NJDPTCaVm%xIO(HG6cD0Q z?*0R+Rh(-L0UrSSKj#F8L~=CQ3F9Eo9*Qn-WrXAYXboTK6c8cfy=oIQwE75O~dORjeKktUpylOy4M`PkbSu#dvr8xLt|()qPo2Y3`OEPdD=_3Qz`Bp_yr zO?UmHz}=?P2PLaP1xKYO%?C)$HoWu!Uy~E=lJ?l~=?XA{DzhK;^;2Z?M^MJ{0;?vL zp(*ToDKI>xMG{UNbm9DwZr$O)h_=tY&pZKUFtMcS$!^eOOyI;(h8CqRUal@;2WZzm z;PPuY;5YI$LIKKMi+@QQX1`}Udl&zHvu;}e(ikxweBTA%P-_dn@aC2t95kR0eLYS$ z5qf0Ydah)Oaawq1!ZP4@Yg>soE zm`Pu_OJVZnid$mKCAMwVV@S_rsJj6oT74w7gryP7yqVx=@bV8_;{}d+>p2r* ztdiSJGs#I&t3IBVe~%Jkp_pKXf5K#&@+a#TE``*a-|C2Lib!p$h$=a$iK355(R<|izCk68CSn0K4Don+1ngJ$iZ}OV zU6X2VE;n@>#>py6ynJO1nc$aR-o@^k4H{txx(JyE&UuH-O!tOQC<%OQ-KFuM>rFz{?)5E+BT3rm0)$M&H zvxPJ@u9?U|*L6D{or6htJjcx?hwR1du3d+=LHQDE&MYxZ$ z4U5M1LaYHmlpu+@I8s)z1OQ`AEqIJ4rVSK_ujP+BB^kz5 z+Vl6UUh%vV5T?Uw#72-;uCqG+NuKoU^q&jSeMY!oCeiLOo#OBs7i1%FS;cZuz<(Ii zB=pNFnWOxzL4uPmmh3DNg(v9(G88dD2lC=dGFd$LMlb8&c*a zC|9Hd>C8f2rW_|7pB36?N!iKLlTu)$#+Avw3t?o02kYV@&*9(@t8uaOqPL!o>NAX9 z5MU9Ezm)YE=zTw0Gfv2v^O;yd=p^~i&>Nha7%HHZ#3`achvy$x{!;D`kk|v7@zm&6 zt=U+?akdG8Rx{Rj{#`ocM!G~4$)dvx&R-8N$na(;o*!P&9P$B|-Q15f_$?OgWYyut z8kgraowE7J;J-^npy05c8WM*v!nKmE+Kh?BkFkO7Zt@vV#~-p;O81C`J78ak&|u{+ zb!Vy}-(R>_gD29A4J0S?>!N};#F1J(OP}YWXaF(4+(=oRUTzrVuP)_+h< zE6gz310?9fd*RWoKt_8;F(;~0CRpdoTh{!X?F1c~OLffAI5>3HWp!oxgNr3QM|nF8 z>3AtuAdt~G9Og=*!D8^}7|S*7y~}rs9!8x z;zs*P!eX_C`V5gpL&Yo)m8e=T+3*AK;N z6uO5sRo=2wsCq#$r3lz4#zBM05ZRKpY88^!(ekc4*+=>4a2tc?5O7d80);Ihaq{hWPW<>!Sk4JEC~0M5Kv}75Z?I5;3b-LyU@&>d zksbPJfE{XkK!J5h2|J*JgN+e!R4xOB>mhN5?cJg_G9PX5gXZtaVMm0QA!EzEdh4WA zD|Q-{p9pty>ffS>+M^eBawby{TXL+jQY~=Md}iTnta~&k0G6U~wyh^1mmS5KJvNI^ zxDFjX_2=*JCA51929yY#KU3jQ`amk0yMO1rWkd*aMNi7f=R~EsmQ>QX~tvMnDgu-lT0Bov^@1vAu-&FZnzzF0M9Oofu>wd`vig{;j=z0zDlpDKI%XvCw zvX@DYtn|nw(*Jw>KApY={MlMzFOT32Ut#O0^#aBI=VO~S{jHrDj+^{VS@&UgSyphW}?6AmhDYiHrUs!HB5doKE#9X>Q2(b%}m@Je~#B|u%}CE99Fm)kR_y^iT(e)18OoQ zYBmL5O;G66&CZ6CHV@MYB=q0*xQq25g#QpY3`E+^5k##ZC=p4ipf)n9bE9a+=0;F4 zH`6|{sffdM`RG03@v(Bp(K#S=Od1y@dxNw5dl$QX+uib1@70ou`seI=poIMBgwtf9 zO5Hlx|EyA%!_ABt`hYW7-eivh1cH-_yOrSD2$i z>A*=(60q~IT^7mc`gt{r_c_zAygaq!P6%8PM%~~e{o7Xcf+LxWKwTwg1|tRnnKFAa zs{EGdi5L0PBv)m|!3|0XRk^#Br04T3&dxZ;b|fX?iri@$_OSQ1Ti z5n}MHUe(mUz`oaZu*FaCzCWviNBn2ku`j${;sULNPHwPC1W#O13ZrEILSmAT>}7tj zKV;QX!tV^7ep{bze(Cd-*Sk9A>Qw%R{0kPQ9eusWJ$zW zC$>-5B@K$yybprPc>v=LYDY=lPBxjg{;~(0Av=C+*x(?G;nUH?zM~>YRSAgTrNTtO z@}-u+#ou(=SieR!tUjLpzN_1tBc0Qb}Q>?vg=q9i|_q&sw8?2&@@ zJQBa!c%zQ+y{-H_9_VkWtXOdQ;QZ4A^ICpKZGVEG2_A?ulo^~!^Ds*eWr#J-S^lou znN7oeqjM#x4IL4uzjC_!krsX7)K(^m$z*Y4%3L)6@Ocoo-T4skDUHJA5C;%=!`5xe z3Im zga>}yALSpG{i{2dS`Osy*1G^Y=3ZWBfhKmuT@T-&Q0B%zfx_nM@Xy(#U!H-OlHHwe5kII#=L4Y9_V% zU;IpVy}mcJriT(z6!edmv!8cTT_5^7!ySaQFlnN~W|!Dq$*j|N>%Ep(-=3njPjlzo~m`}MX+LaiRj-dMD9=BCtYL z9|Re?CG9Il;1IeqQrr@QNApxxF3rE7_AjwSS*K>6wUSYjJb*lF{6PO1f?aJKScP2g zqN^lIV2{RYMMc@r$xU}-HeOuL_qPNODuL?=4MVlS!l&jpm(**UjXpS5TP;WoUe)iV zls`Da6yi9vuARj=sGHU8(jDZLMFxyh1oRFY_U#s63Z_FblwEYau{76@`Igrr_1Tl0 z2-ZeJO;}dC`rLBUMILyp_tXQJ{l{n}M3KyYOOXHsL2Pl*l6)~Y2W*b9{WD{@kmXFq zsxfTh`cGrkg5{LukCgIK!{|u`PQPGCiH0Rjj#4#2G;~>aOn-s_dt@qj1XoS1iLDz4 zS^thj6CdUgD4h|eAc6BPI^b0dM5r<^r1yYhUzX@15d|HL!3JWIAexN539u5I3WsCh z*mDv5V-EceT(rN4VxH$38k!ptU5$clcTxJKsf=XA8Hjl!|N6LSkV(k+d#Eg8Z~v2v z$68tN1>9-X_ut5BIb;~)q9d$8T(FRQFB9*a(|ttx|7}dB<|^?(9;~GVdEQQ42%N09 znp>;4GUVcbR~;?U@6?&sUn5*)jd&iF4?gQVzGkyLyB@NZj}ay)3$F6mTdF%6sQ34^CmQZs!3lAfmXWY8Z9nMCS;C8inReq|p%iIP@}B^1oEo zg=DBL6E>+W3*1L%SL`n6xav{i#XOIBc1b*n0FOJ9#%u+eCZ<3WJsdY=!HwhQu+9;B zcFm2t&s6vlo~CD~+EjMK_MThgv@v`&hgaRLVo}A_u~u~9ho4wU)|yrZK<;!uLWws5pJm;``#d8OUD@0hsf^euTe- zL%Y=U`DXO^&Uls)`~@9Gbf*mRJ{ySX0nM9fXoO#WE${!zq5w50=Ai7*`$R!5Alsb* z3C{1QXxKRSuzn!5sfbrE3Vndgr4vdVHpGqV7U)06BnS1QXv_<1XTm%&d{HQI^DK_8 z&}M|C;6A}&Knaw0jU))#d`cnUeM>dvTn>L6K;#B&GfOQ5oAz=pe_FUG=}MoKUtE+8 zhNDziQ}a0DpH$@<4_L*g0^-dPb{Hb0ak#g= zuVEI1zA4d9u4$b_uE2AYpO7cP!J)Do@kLy2_Kd*6K%2RxpBFROnkYKFm^b_K<%+(v zRg@-%ZXq%CV=8eJ5md>K9>?-|l*iP_g~Z%g%NFmm!bX0gO`G%5S@Cd9R@}10o&j>+zO4yb!>1^0Ke54;XX%5bYy}e& z-%4Km(f;x0qGzmd!ZBD#U|n70Rd(PpsXJ%Ut8#vJz0D7ne7%-x_3wNs2MUPY!-SNY z$0^fVnHvm{lV%4TS|+k|z3U_Qro+w%y=_&W7eqvxbBpkBgeThruRqz_XMhueg3 z7+Ec-YG#~)ObjI?!wjODM2Utwv}ZWQB8sMLj`~HRbo%-nB)C(^9cM=}+{nUtj7gU)t&VuHLkYe!mrL^cJIB~T4EQj-VVwJErz^?8Js3gsFi;~e`r82s4xXl&u?eF~?8XQl!rYjrSWXO>Sj+d^n z@;7O7+d%6_V{Bbt`hcY|MKY5(bpR6rKiGdj?ewQa&F&q}jJDkSEPdzuGe=mge=&0) zgq37x+eE>I1VZ|S?4xv{SnjVYc&TRHsCD(f0_guUC8@fJsc0W5IgMJsV=H4W`zaG4g=GIC{({@W4g7MwL z7M{6U`h(p(e~IClw6!kUx4Op-BIy>q1sT#r_y2|mor73?N5Rx@_D4xIDh0q|F>H!F z^$4O;75_K^b(|SkkN#VkvN>k}6TXx%r%_#Lt&N+tteZ=!3v8o=qKKMg$H53kp-86W zJ`UUMTtWkANPX#TUS7cwcSrce(>;W!i;}J?%&?$ulYmG}aDALxbx#?5M+~Qi+~Sb} zq`4&OpVlZk`gMU$G*N00&J~%0F-Z!Y<=lt1J5R#!GJl2>Z? zNZW$IOxuO}*|i7!N05sW(DfJ+hjXSp_=4|6V9HM$Iw6UX&lqZ{B`Dq7}B1<6o$N26cwj1U)m@V zx%dKS6KmT(W4Gxy07h$+#u1}ZYsyxqp*WgSn`3*<3H}wIfNUNZ;;Gn?0~FbUVZcG% zp)jQDjO(`~7IwO9nuI}28KxArBuVAS7qYrilbb_XKA}*iCX^)CK7ctQuKoQc;gp2) z0V?wI{o;Wi5CLf}H%~V#`hbX}Bj7UbaAovvpH!1dhEg`NQ z6wOnJafQ9;ML-l*jLRlnbu}aIds~{Jg1p*F7F(}=BX@Cni=z1{N_8afw^ZgzVTzJ~ z5jW;gAogUOzz7E7YL80L2$QVNW*~|QzvjeOg_k6}vXpSdeqP3_h$P-Z?oy^WDU^U8 z=f9?<)X_wc;6)r4He~~*mx0PT9!cXBUD)ik$b6f{LP2D~w(mt8ROE)1e%GSuSr4}n zbOm}da-Owh(sC8@15xsgvVZ{op&YDx;m#;Ymdb2f`wPdb274ieExvZ_4Yc8u-bIoeS*IMF{1?CH6&Td4~W;n5P0J=pMmPkRpy?jLhy<#Qus_P`GyyOkVBwO(BF3vMv z@$nWtWRokV-ausghi-=h%fE3zeaKefEi$>bXicf&P6gl96<-H)FA~0V7Q#hk*f~2e@ ziFxaMXL)4NVT&_2M;m*P?luu6q|jYE(Wy@un9o{0nn3qPMRFi|`aneN^Y@iXcNX%I zYdkQb5JhKwV`bZcb*QQw@q+`Cik+lXJs`*nvG9n9Xscqpw5cm0?C!F?!m?hpy*=u}dBxKRK9;Dy&8jgR_=Fc=IEx?UH;;b1oLX5)k2 z3_IPpHMMk+ zsAeGdLNS0fTP&)2YhN*DGc{I?0=z=Qw#JHUXxQm>x^fB44#!?^=1mX!;~?-3W(TnA z_q(I+)bnPrKbrLY-eB4vb^D%w(DjGCK0KVlpx>MHW`_sk!{UN2_DZfJsfm;>B~fS> z?`>I7x$B){37kkNG!Ip;SX`JuOL=IAE<458FG~tpmUGtWCYO1YBZFJG$&T*@Gx~;u z_(t@pqxV&aPo3PE+je|$tbC>VW1v_!Wzc;q*uW#61zui@6=0sO5i!m!gwJQ-=jM77K$4sfyZ8etSiKO#&i?JKloCVByAz)a&D{uR4X!%Kq&FAhRp-hdf1 z|CG1P`>>OEDM6f4xuwEB8OREi{UzH!0Tmo8W(^VAC<$f|uGr{FYe8$YMAHwvUOLM7iznXzkEaECo+ zTGM*TtqoUV60V>X(3|KKhLFHw^&E5uoU$cKK>#$5n6A1&xUlCeVtqD>mSgZv*npQYkgYAKsqPZLNDj(C%;-RGm2d@(+z4D-n8GIU7@cEBYm-*^5-NLK}x7pAwRB z3Ry1econe|pto1wWzMh)e`ja>Zr08}D;!;oCCmmFVLl84#Z+(QG7sjc7Bks8`h|aN z9kp0^)7JAATYRmfRwpQ9uY_Uj)-DD!H}#Hv3i3DTO?kwS5Ku!2#G=KBwS$v)9+D=NeiGE zv*(;=haZ5+18f^pd|>n>p&Wha!8wJK(w? zo?WrKV3JlGf#W@J{kJ3V_WA^Tw+AkcudaSRJp$i+_y9VWB33{1$Nco^8*q{rU=NJe z->30X`~slUk#oV`7udV}c%6inamcUCVMx@smw8WM8hPPaL|{7ed|1>k-(n~{qL8@6 z>k-0SbJzg`^Q7SW9!Ve_>BUL+_MMl)BfwmtrkjLE2fsbQ*&>krNWEj5ddpN%`T^yH zM~b5PAqpj$(~VS6I^ZJn7Lz26cahR7+TJ{jr(W2Zt-_EJg-r1&VUsW-D241w0&NFH zx!53}AuNb*akHq!sx;_DAeKes2zV;l?D$o5ok6BsnS~g4%%A#QNb@3r8jMJa_}hI* z{C!#ygEm-tNkY4Ic0o(05R0nxJEO7p-@9HAv_x|lx82suWlfPz77R;eyu8zYnzLUmaW;2KHDJ4QA zuO?lGC@fTF-4HPCrVCVNu+VC%WwMH<@juAl}xFpiBIeklbpD5;M3mO!hD!f>lOAurg}ny~ax^o@km zQM=lqpSEbf*-?{SGrePnKvZ~`()nY)|ADQM6^SWBwk`eR6^TRoO+gH&&eH#c<)VsH z@|=4GG21-Ld{0*?Pr-}T+LjJ*-uFFv4};ez2tr7yJGQ9CnOG1@Io*pg`V5w|uBd8n zqLzIlTQerCS+S$Jd!fJZP}H7!82Q|}kcq(YjQ37d5J%}G_23NMs$VD%W0WxQd?=|Z zouH*hkk7o#PMFAynarHcc8+%y8oNK4Brpm%WPVeGHJZ1AGhdvnCjY4LyOoSLpeqEj zfBE{`#W11L8r;)5LVFjlm^W68g^atD?ZPNvj+8}AGphYd_aE#Jopi7**@o}EWfH

F+X!3s6Ux9@lKC6lcK!TU*OR8ikaa`+zr6b;bNSOo7K*SmZ7z{`+llXuC zYI+U~P9CBZIb}XrCNb#lxqEuLf88HHTlgrNOz78DHPrk7?LYp9}#jpCq)XN-U$!alq8EF;sZ2JFiEz@kcjMhjnxw2 zAz2aW9+Ir07UUw}unDR}3&KyMd!{i3th-am2ZkKy90oq|HeS(J>g%ke7iT49=dy8F zxVMwpJ8Lv;`B=+DQogqpg*vOG$_(MPUf)NX33=bxR#^8$2GHfZwt2)hw|OBZFNSSzPwyUjx$02 zxIeHF9`${`}GPFmQKOBummNnQSk32w1 zkKe}L$=r$SyC+Aewtp_dFK9zcvK9P}i(Qkay+_~37q>AiGbwcstSzbRoq;vLeWz~` zJo0Sp^nHTuF?O+Sk4EljNIZAwd;QVSw)?K<*tqXt)azTGWA%_T9+Z2hAduEQU*hDm zYRWAq?0oU6ZK6c9L*(f_zuPgjB~B#flPCmz5(vejKxY3#V4-p)l9^%QVWRPoR6Yxs zWn$98v{@3`5%&r7JX0=+_$z*BlWgaVVys(YiYx2;7&A3I6d8szf3c%GibdeY!X@E0 zIN{>fILUYLJk-e?wggLGJ1-0}GgEQ8=h*Bq+r@irPJB1sC4O5bzU%eTVCeQddonv&|~4M)Cfc|B|5_s3R$IOy5L#eI8-{T>?O;n;P019##%W4CYZCY7B2xjVFNlV30V zFb#1>HyssOp>Y--Ds|Gzz~`c@W&dqjN4mpRjCXP21Y=$kgg+)hNz!!i%3b*Ct*iDg%*-22cKLzv;~1?q*W81;(np z3Trd|^sKfmnw_E8(KGK5HU0Hc6{{wBz(TI~Cg|&Rq(zY7Wr%`B)$#L<59aDcXVR|@5OaY#u>Hsm2N92J zgOiZF=}F{yxrSk_HG_3ksGPU9_Y&OJm!cI!Gk%1VSS}Vogue*8MgDBj$z4{@y8mW% z{1p42(mDCWU;J^_Qnw;$Z2YVJFX3H4b?WXa%?}JM!mzdvj%<>Uv$}>`LJ$Ve_KM*x zm*v3MD^-f?Fc^(?cF3#XLW4gFLuxXaybe@Y5#k*a`)d7=l}X6&D?(FMqskSlj;o%j zvdUB^c<};xbVfz{jSshNY#_8}Edy^NvxePP^jKujmD>ixYyj8@JOW(W zZgDoH6{Kd6QjTX?BVpOcYPt5Lb5(gMhvFsgs`D(9cuV~EmubsbuDzB)7Rz*V6(lWT z2y11&r>zVZlhdMptC-FG;0hd9#GcQyub0gJ%&g!XGiZ@hwH(P9Y z+4cf0%jZsQ7tPvHv^fudI6c$yEjt~ct1_rErAep>fM#Yaq zh{BE4{Wyo)ZZoAYrb_xlgg>1NSi`87fIt&nl@rL+d64rT%vFV^LQrfGpiN|ll4xkfoc{m&v81gPNKR_ zz+`=lPS82j7`FbN_~A-PYlh2HkCLiYQQk@x7DW(YuO(42p(LGZ35{y}e&9A3G*dnM z5%+`h=JA(^r(uE2&XugV=C$+Szk%XUI0rKM)Ib$7Jj#TqVE4S|g(mQGm>!xqk3LH@ zUirzQ2FT+~nH5crq#3Me@=a<7q6O+UCsD0q%ty(oQB%nCd-Q?M&!l@DEd?4{^$8+R zuOn;)!Z0m@PmwVnB4?_5H8~@kcA(E>CEs6g4`_ktP22OMc|Tb;uYLwQ0Z}HfLR%0^?;BeY9(5< zEMH0%^&$QT_c^RqWU-7nlACC^D&AE+C_CyIbt8!SY&&s{5`lE~P0U>(?(?6#Qqbqz z@yV)ITYZN8o~)v8WX20&pKI4YI0F2LVcW|XUu=a5sle=zP?q`k4+H?wh`rq%o1^sB z{;(SwiJN+ev)P}fPhT@d+dLl($1VBo5}?PqlazUGet^7m?*h6&sW&%UCZwy=--93S zC`rV3J!2J=%VOR0?!!_zLrNz{#Z*-wNl{n_*$ArUSABv?zkKmt`PMcg+T<}J@K*9+ z=DcBnu7*Se^k{mY5c+!wP*$#b)2u|Jmvctx2_2m?rj3qvS}hxV?Fz&WbGOr2RlC|1 zx$NO>m%X~3Z568u2WY3$)6lgBJr582zGY7)9v-1de>6Z7-?#e{Jg|w6-HC(x?s$O5 zeFtH8>{x@b-?N?J#2GpSZI?=U*(E^?GrK9y>5|`G$+Cv0oG7xW*_7?cfI=V;M}@nl zaNp-4Ep@|UhikAD(a*3u^O+AWpK4>*eh-5+i3p`_b|MVme*hl7TDG|i^4<)-bY$^5 z$==H6P`+xc=IM0g?S92k7M7QQAMv?WF%Ujq0iA>DB6@5ibFfOPQ(#`jZY!WW53tBp zqKZy2AkplaTn|9TFSoZ-@uu`Rk`OmA2H5j1`{zcXB%EoHb@H7muC#D*TFh?(&;5Y# zgyyWTX=d>%LkH%Xt0O(?xLYH^#*FvPIe>@EM8Y&qeIAFHN?H;uK`hq=s#WzUI+vKY zms8e$RJoQw^FcAdwvXaeSZ~!$eW`EM0IqAHYl2a*%ivU$jypOP+0yXL816Javzpd7 z!qbk>jO~$!Xui#kHb#qNE35J-qf{)ebxm|59&Z_;g358nryyDyos!v3W0U48P(kHM z$E9R?$R6zX=+NVzFK;1Ks>tE75a~$^3JH?CJ7?zoo zHO^kg$q<3|Ke5i{dfM#O7))+8KV!E1H#1nRN4BP|QkF@neo zR}v)xx$&BaD>W>aW8``2_A?Zn+E z04)PosSO}IW-5F!d6ishW(5wH#>O&Uu0p=vi1G@ALTr+-2Xc-b8P&6O~m-MzcG`ET>Qm+P6Sz+kweBr)Dx886ujX9kJZ?KMgaiLMiFa!ji2ec%-` zO@eh0l6&$K^-u`IT-efDrVaqghEEwuv}G>k`&hju?}4x5IQ>}}y=77qun)eE!H&p( z+s77IfhZtxVRpjqQuu#cOwOv@!;rfq!i_HI<05zEm~7LG%L~71%p$2^`7>GsVNiiH z!xYtEY54LvOs(u{pNF@oIOI3ewbNq%4r`fgsuZ;w0IIl2k@vZzr36c%mT7#n@-1Tu zF(+3m6p9}Ne2@C2EX#30dvc_Y94=PdXFOZePV?eM2UiLrKTZ~W%PY+cPV~@eF;CNF z)3gBUhYntjBh^4MiZPkifKBBbVq`h)k|o!Qw=u%6P>3RrB(Nd8m*r#^h@kt2f>bIj zSw;^c;#nom8tYaEqID}9CgQm1jWqT|JOa8~;Ern1j)V|(Xh(b`)FOFcAzpTrBU zKWCW6@C3{Vvy9*jf(&IEDq%#>$Cq55go9kRS8JAq!u9uT351~&06af#H4y_0KP@9l4E~&Cb zD&?3=aZGzN&3R1dtE9eBFP0&B$re{vEUss*+*;c*6unlq=4xVG$n#yJMWW&`n1BD^ zyew+g*OL}N_O-5&OmX@$C#=tP@KixC)28Ifwt_`X_O#oQhi9HPKYey&QeFza5LhDb z3yk)bfjE(X%0-J{VZ=*yU}%MQsR_8}9BkClfozJw1-{gjR}xw+YfH^(h-cM~v5~AI z4mm0)dzVT^EFo$$NM z7`NAU_f#RNo&8plX+bDO_oU8a`H=-`+YKVsf=fS{P;n@>(~7LPQolnyC?YHQQ1Bw4 z2pR1%s^WG!jhAs4-*0Y~>`;8E0F%n%$!vUeZyb`6PqrO28E-d9zDA=1B)VjU>-~7Z9X)EU3fWQRvxF=MC`pu_!uPQHRN_|xcA7DI_%;j zV^n?fQQ)!1)rWd>E6)l(75+9ItJAZ3wl%RGg>N-N#PP?LJ?@VOV}ghM(Zn74V}CUC z$HaGh+jT~c+w1k*u{9VGYht^|avd`8hrP*UvQ;vE3vzN1hQ@VpKToM~&C|bNqYc~b zZL%VlP+w!3#H=GvUVQ&NuaCfz?B+5_ccsO&v%p8-VOf?nbR76=Syu6{<&3Nsw$rmm zPH*7Y&I`*P4DG=S!#V=*t)CT5QS!oiFt1|ezL8J6-9DKIn4F&&M%zeZ?}Ytwa+=wm z*$HSJkS`}E|ArI?^Mv?6m~!LI*0fHX+;=~*4IuEkX%ehA9gk8IjyXS=Df$1j3*QqG z{$SE{6B0TnBsGohk0&Rmr-1$2hUJ2NJv}`&ZafsRHDwj1^yK8^

Expand...https://github.com/advisories/GHSA-7322-jrq4-x5hf
https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73
https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c
https://github.com/lcobucci/jwt/security/advisories/GHSA-7322-jrq4-x5hf
https://nvd.nist.gov/vuln/detail/CVE-2021-41106
| -#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) **alpine** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| -| libretls | CVE-2022-0778 | HIGH | 3.3.3p1-r2 | 3.3.3p1-r3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| -| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| -| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| No Vulnerabilities found | +|:---------------------------------| + + -#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) **alpine** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| -| libretls | CVE-2022-0778 | HIGH | 3.3.3p1-r2 | 3.3.3p1-r3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| -| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9246.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://security.netapp.com/advisory/ntap-20220321-0002/
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
| -| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| No Vulnerabilities found | +|:---------------------------------| + + -#### Container: tccr.io/truecharts/mariadb:v10.7.3@sha256:3c81159b4d5315a5e35fd5b288a13ea409ccd256f43d94b8975df89b85aed003 (debian 10.11) +#### Container: tccr.io/truecharts/mariadb:v10.7.3@sha256:a449af8351ad73fb2807057028ddc2f25c350a59b89686c6ac0e6170f6787005 (debian 10.11) **debian** diff --git a/stable/snipe-it/2.0.4/templates/_secrets.tpl b/stable/snipe-it/2.0.5/templates/_secrets.tpl similarity index 100% rename from stable/snipe-it/2.0.4/templates/_secrets.tpl rename to stable/snipe-it/2.0.5/templates/_secrets.tpl diff --git a/stable/snipe-it/2.0.4/templates/common.yaml b/stable/snipe-it/2.0.5/templates/common.yaml similarity index 100% rename from stable/snipe-it/2.0.4/templates/common.yaml rename to stable/snipe-it/2.0.5/templates/common.yaml diff --git a/stable/snipe-it/2.0.5/values.yaml b/stable/snipe-it/2.0.5/values.yaml new file mode 100644 index 00000000000..e69de29bb2d