From 86752c057f9662974db4ed891de362dc91c1070f Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sun, 30 Jan 2022 18:24:46 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/weblate/0.0.1/CHANGELOG.md | 10 + incubator/weblate/0.0.1/CONFIG.md | 8 + incubator/weblate/0.0.1/Chart.lock | 12 + incubator/weblate/0.0.1/Chart.yaml | 36 + incubator/weblate/0.0.1/README.md | 42 + incubator/weblate/0.0.1/app-readme.md | 3 + .../weblate/0.0.1/charts/common-8.14.2.tgz | Bin 0 -> 40699 bytes .../0.0.1/charts/postgresql-6.0.58.tgz | Bin 0 -> 76159 bytes .../weblate/0.0.1/charts/redis-1.0.63.tgz | Bin 0 -> 68677 bytes incubator/weblate/0.0.1/helm-values.md | 75 + incubator/weblate/0.0.1/ix_values.yaml | 248 ++ incubator/weblate/0.0.1/questions.yaml | 3523 +++++++++++++++++ incubator/weblate/0.0.1/security.md | 1202 ++++++ .../weblate/0.0.1/templates/_configmap.tpl | 472 +++ incubator/weblate/0.0.1/templates/common.yaml | 8 + incubator/weblate/0.0.1/values.yaml | 0 incubator/weblate/item.yaml | 4 + 17 files changed, 5643 insertions(+) create mode 100644 incubator/weblate/0.0.1/CHANGELOG.md create mode 100644 incubator/weblate/0.0.1/CONFIG.md create mode 100644 incubator/weblate/0.0.1/Chart.lock create mode 100644 incubator/weblate/0.0.1/Chart.yaml create mode 100644 incubator/weblate/0.0.1/README.md create mode 100644 incubator/weblate/0.0.1/app-readme.md create mode 100644 incubator/weblate/0.0.1/charts/common-8.14.2.tgz create mode 100644 incubator/weblate/0.0.1/charts/postgresql-6.0.58.tgz create mode 100644 incubator/weblate/0.0.1/charts/redis-1.0.63.tgz create mode 100644 incubator/weblate/0.0.1/helm-values.md create mode 100644 incubator/weblate/0.0.1/ix_values.yaml create mode 100644 incubator/weblate/0.0.1/questions.yaml create mode 100644 incubator/weblate/0.0.1/security.md create mode 100644 incubator/weblate/0.0.1/templates/_configmap.tpl create mode 100644 incubator/weblate/0.0.1/templates/common.yaml create mode 100644 incubator/weblate/0.0.1/values.yaml create mode 100644 incubator/weblate/item.yaml diff --git a/incubator/weblate/0.0.1/CHANGELOG.md b/incubator/weblate/0.0.1/CHANGELOG.md new file mode 100644 index 00000000000..5b7d0cec9ef --- /dev/null +++ b/incubator/weblate/0.0.1/CHANGELOG.md @@ -0,0 +1,10 @@ +# Changelog
+ + + +### weblate-0.0.1 (2022-01-30) + +#### Feat + +* Add weblate ([#1812](https://github.com/truecharts/apps/issues/1812)) + diff --git a/incubator/weblate/0.0.1/CONFIG.md b/incubator/weblate/0.0.1/CONFIG.md new file mode 100644 index 00000000000..fc9b2fa2d5f --- /dev/null +++ b/incubator/weblate/0.0.1/CONFIG.md @@ -0,0 +1,8 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our "Linking Apps Internally" quick-start guide: +https://truecharts.org/manual/Quick-Start%20Guides/14-linking-apps/ + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/incubator/weblate/0.0.1/Chart.lock b/incubator/weblate/0.0.1/Chart.lock new file mode 100644 index 00000000000..e16fd5b40ea --- /dev/null +++ b/incubator/weblate/0.0.1/Chart.lock @@ -0,0 +1,12 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.14.2 +- name: postgresql + repository: https://truecharts.org/ + version: 6.0.58 +- name: redis + repository: https://truecharts.org + version: 1.0.63 +digest: sha256:e41f7ea9203768b04adca367d6fba3dca20224666c88824b364d9d4a9d56c6bf +generated: "2022-01-30T18:20:44.967186869Z" diff --git a/incubator/weblate/0.0.1/Chart.yaml b/incubator/weblate/0.0.1/Chart.yaml new file mode 100644 index 00000000000..bdf4c7d5374 --- /dev/null +++ b/incubator/weblate/0.0.1/Chart.yaml @@ -0,0 +1,36 @@ +apiVersion: v2 +appVersion: "4.10.1" +dependencies: +- name: common + repository: https://truecharts.org + version: 8.14.2 +- condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.58 +- condition: redis.enabled + name: redis + repository: https://truecharts.org + version: 1.0.63 +description: Weblate is a copylefted libre software web-based continuous localization system +home: https://github.com/truecharts/apps/tree/master/charts/stable/weblate +icon: https://truecharts.org/_static/img/appicons/weblate-icon.png +keywords: +- translate +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: weblate +sources: +- https://github.com/WeblateOrg/weblate +- https://github.com/WeblateOrg/docker +- https://github.com/WeblateOrg/docker-compose +- https://docs.weblate.org/en/latest/ +version: 0.0.1 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/incubator/weblate/0.0.1/README.md b/incubator/weblate/0.0.1/README.md new file mode 100644 index 00000000000..fab8c483173 --- /dev/null +++ b/incubator/weblate/0.0.1/README.md @@ -0,0 +1,42 @@ +# Introduction + +Weblate is a copylefted libre software web-based continuous localization system + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://truecharts.org/ | postgresql | 6.0.58 | +| https://truecharts.org | common | 8.14.2 | +| https://truecharts.org | redis | 1.0.63 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/03-Installing-an-App/). + +## Uninstalling the Chart + +To remove this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/07-Deleting-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Open-Apps/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/incubator/weblate/0.0.1/app-readme.md b/incubator/weblate/0.0.1/app-readme.md new file mode 100644 index 00000000000..98f412406af --- /dev/null +++ b/incubator/weblate/0.0.1/app-readme.md @@ -0,0 +1,3 @@ +Weblate is a copylefted libre software web-based continuous localization system + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/incubator/weblate/0.0.1/charts/common-8.14.2.tgz b/incubator/weblate/0.0.1/charts/common-8.14.2.tgz new file mode 100644 index 0000000000000000000000000000000000000000..8e9f52707c284d237f7707f5b1a60556c6374148 GIT binary patch literal 40699 zcmV)iK%&1NiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UI68mpQ{cy>Z`-}r)3TgsH*?qRq`Pw_aeQJYefKvz zCxJ-F!k8l21SCh}&Ue2D?*~Cj@~a2ogrFZML z{LcMB9$4Uys3bVg#$Y*U!J^PVQ%Dh^tpt&{#0BN=epqBN`wOIaQo?ctrg;g@%LU>D zL|U_aj>cd{X+g%_?ggf^#iSGG^DZqHDCT9luqa5EmI!s{kWf^1<$FPjEgZ9k6bQJ4 z6qckTKrIL=<2<7%qa5m@dpH{QdWQ!GtxL4J%FBd|TWw$(Yqb@oZT_Ow2C|vU#RTcD ze*4!K{Z4<>>9u>`w&oCL6ygk(92lBIoQ?s`rulyxz@5CjXaSHx)?aG?09cf%LEoz& zic1XWsz76fUTdjvdDiI8(&A(j#OPDSYxhDqDxc>XSgW<5}um8ir;p6&$i027t zx52vtWgkyZ04Y$6r#J?2o=x$^qJ(U%x1NCiPS6xCQpyUSAp|BU&97Q{fwE2TVg3=fBs!C)|X);l;vz32T2>`jK~U^*H+fBt+E9JU(jqRi(M z;&j`QR`u!!T0`D&oK^Ytu$)mIbcUUQ8s7e4AN8Ikagy|tQQUhznNFV%pU3-$F&a*X zhXR{lWBE@@zQT?>~PwnnE}j>>rEhx9jalhHKZKOFV@`;&OsPxgli z9PIbvVQ&D3&khbYXuE!NkJ2l+B63{gJV6ANOH^(8)`0OCarK-(uMa3{JaE7)WX;G_wl#c||4F_02TL;G()_txls&O6mo*(Q#AHvB5 zqUXIs^n5t!PY2UvfCdQ~#lz{K*M|p_=ZC%F!QuX3xF5r3Xwn}glV@=_mg2C^@fuH8YcZ`{Xy^G z*<>)9^rn;Pu=jj2I*8Hp{ewaBEI#ZHr_=rYX*?P|e>U2v`Avtqb&=*1n3^#{6u=DR zOH`IPL41QISUj5IFCd@tU(-dJvdxIx!n~8E9Vo0E$|x=oF9Q-Z#Tn)k2Q&b?CMIXc zM{iz@!4#$hwOVYaR_1AnN(~ofaFQaqVAa=73&;=2nD51F zB>SZz?CQ2!z^?TM6FLTe|A&Atw~8d6BRTL-004a7CEoHsZCq}T!5CbBt?69~Cn((p ztf+9?KHaccyCWxy`2>}WkP}33i4suc2@%Ub#W5sf&~G51MR8HW1OY-zNYTZL7yThG z!Ap${*<*dciRg)-t@kJ{5u^z0NRG7&V3vUQd79$v;zN-@D(RBJI+MLQLqTBgvX>}D z6jebO@B-LNJ`@ZLz!zCwvZaFw`=;<`ORKa&uoqVM%@}(v&EXfY$lwyoM4GwXh>P1XDE8DZ}~Q_q8lp3Op{Xz!^$WO!E@JG|jIFXTS)O6)13giL(m; zL4v1KRGN)rf@8V|@Vv-N3NxyCHfN{c#}BVXXB6Zyi1_cQB^y>uSkn4@4zpy3>}ohl z$g*X?4O=Z)h%e;;3|L-}hT812RrM%IL=Bv276WLmAT9Ws0&MyxD+R67dIC;MJclJt zSAhhmwL4fKW>2u(0KjkYN&n z9-LE1XJA3tG|o^u2TNFDR)O%61*Eev__q6Pr55rauMx)Ls2of%GI)@a;FiltB0@4{`3=wBcl_0!-yql1QQPHuPrFc;EZ#;$`YWkyg+o!2+4>6De&hwd#~j# zc)~^R9DZ@%^?Dl0@#%*T6sP!Ke6CMX8KaCcM$HO7Gv(f*d0ws>i;7+!3$e_0emF)j zj`KxEYj+m1*pVpaZ7i@g8Bjq45+oqAe32$#f`HHj*e+E3rKdqcvuK&IL6{_p8+tGU z+M0rKK9gFvWK}*kGzSYJHICO)kmZy!Sf)@&MFkVCOYZ?F0AZpyAW9_Hv3CN1qIr=* ziu9>Q6uCnT!Ew4E6qWDuRH!c2@9%Mz;OwGy;L8b&^>Dx96h@e8E~$`kTsDATAx~S? zJF2o53j~`l^UGe~wF+u&?Fzfv7z@=A7oL2(EmCGws<4_+e81qsAL?YuJ~@`(o+Zi0I z5pg*<5t@S{FBYj_;e_pDsZc2xy~rzwIbo9W>(_5vPr$J*(vnkxvgHqDKG(ki z=yWaxTiUUVdb#@rh7$UShfeaSDmpf*WH2Ws;N=_e2aEssZO!h=L>|N>=9Jv(!j_z$Kw<$^0bher{Pn{4JOf z-H}~A0(k1Qjftqp*;`c8Qm7VFz&kCCC?7q$y0X0#a)bNw$I2oD#{h zz#OhXiAbI<5y(iI=a-8DU_ur`v11!u@Hf5G7}P~UI4(j`G1AxEPY4}Bn!J^k;9qjr z9Q7l)D-Z{4O7ao}%Xo%tML_6TU8!Snv|YPPkVkVuSCXEw=fD5GMALu#W2b>>#CaB@ zf|9PP*Os~*&Mw%;j4>07kC3)3*nJ}84$dyxbcWRH-Ifp!XX57@oLv%^V2)wNRFwrm zT%%z$NKm}s>n_hI`a(M~EZ_vEn6kZOzMuprdJFgChu3UoTvL@;bH`RSHXBKq7jleY zVq58qg3QfjvUMPv*Lw1)Fk+m!*l|b)W{Or=_-0k9D`$vNV>TI|h;GbhcnlHw_fS8wSusC}SH_wlFdOi%?k7MbR!;^Q61m zwjSgssV4%91d#6C3Cqle&cc zNa))Tx;knoDCUpS*)t0gp6=(xzZTMs_BkbI9;z(omTG+m_W>VdH5 zxbs#|EAqnMFI#&b#iq78>?6upBfURD`|&k^j{+#jJrzt6alXOOl%8993&*yS1kZ5_ zOLc&aJabm0nTx{QdU+A zM9bCBZ~>;QDCUd<+HOnSLS)c*eYza(vHy}mLuE3` zVyGKUiBj_nYhBA;3$;pX`0E-T%g163gSFt?kjIJ>T zaV^#ln#XzCvA&%x3J$|^2KdZ&8K3vWzh~@^^W#&gMtyjB`q{27HYDtm+?o{dDg%)1 zZ;XdqmVgUH4d3S;BaDm8{+igvT7Z*ClPHH5{Hh8uG4sdp~jH>WBm0 zYjH|HL%=##;$J%M?0z<&KeHK=;ZG=$n;UByw1mT%j#Lm9U~9*NGeQweKt8qFVWmG8 zya_%V9X7+#<${e+BA1?W*dSu+Y+=ebSq685wNDRDG^3Pi($zpIRkjr5v!tY-BTJ9W*OVVLGm;h0=kEG4J(SA-C1nb1?DQVq6lqr~Uo?A1$lZT4hz1 z*+g44MQ^9BN;viEs&e<*TwPT|;ILEeQP;>zmGAm3^;PXI7v`m^m3!A$_24!stopP( zS5ZDN(@s@jj*}$4f+e!Y^9TF|C2!dm#6MN=oa^atPk-0`+aZHnc9 za__QD7~K=KjUl!V5>K-9TtDGR|^Bja0NH4F6&lsX+awobcEo zj+A?5uH+^6GPd*|5p>1nZCkoCcG5hCsnJ<{qzXu91}O%>Xrt_t*?$$k(BoHcg3zkqV!YzSn#g0l7PvJ_B)OT8v7Hr`+1DnGE1jT*s)S&RLdA z{@Q;$M8v+jSuk25l#OtMBK$#myUC~`nAvQF^#KXzFec^%_6*KEUu2XC*$-#mg9Hf= z{#$9)7PeK*TC`BBSZ~(T`$EoZJ&2)pD&9cvx60mB@fRSz1v!tvsn`5G|$Ii z0?Q^!yET<TWrQdS}SLY0#9~_cS<5B#^1Yx(tI$cK>cdBIaa9EdE zPCp(?lK&Ihy>+Kky|BFg)~R^aNwN+XHGdCH~T*xWmz>uelIZ~T7_iR}WupKe*x%*!Xolp7n6P=+?qWWJy z@5!Rli=UPJw*9S?p2TixvY_rN5%1qJj6{PRIT4cro&f1$Sv_aKQyZ+Y_w(u~;r>8v z;Su46ks2u>@kV6oUYyRB+ya$q12In|t8kxxN z!3LAZ7ZQsxJJq=M(f+?boPFMNd{8t9R0iw^vR_qrY)#V{k6lR#5+E<|5@mphUWras z>n}2HxS?)mM>L_=w;m4e8?aXp*sR;E(v}wZ-+o-lp>eAch z3W}id5-oTf3qW5m;S?ID5YP9_q)Yc2{hcj5XLn+q^r%9|3^B=JWE{qB}-^2)tWK33st$aKNiz3g!XP#VTk;xc_ z&ysPmf_~ipvEG*`;iD*nO~wqCOkbf_2xS1Kwp)J78s%*US&uAlFTv$*v%exkAsM?W zkKVuu;ioY7xqeqv4j5$SD8UPEy^KVrjL1kc2zw=ck8g^L?Ka@Jd|3c#9_q_FwV#Gd!DT0(OlM9)jLXO8C z=TI@slcxs z4#D)$yvTV5d^t9aGtElhaGL47_#IBLoZUa)+G(k~a;BVBAx7dj7& z%$1N&0W>?(xlBoOyQyd3n2Omv^{iAoLCZChuW++Bt!(elHDYN|U}dTszK%W=k>rw~ zrKQ-a<3+w1DNs4bgz&w+h)sxR`Bf(Jc+BRxAP0izsVP|5I0kmpQg7dIFRcRz*tC3B zn1A-^K8n~jc)ogR_vg&cV4$j=uL^EGVcUp!hT==*eoxDl+?BhyDy-NRg*vBl0@o#j_aR=A-4hLkHTJ{u6QG7a69fJKk*o{SaTM`HfX zh*?HK85*v&H1mS(xk}pCKz5d8@ege3v-*2~2EUiwOeIWmVkSOHkOhjlmFE_=2*q23 z%|ZNP9dOQ3v~_r_Ujb$55(bLlpl5v&R`~gI{dCL3OPkHLD7=26W$PQxvJdrf zhU*wqVi=TmhU8;3x9zglcsi`(@bECm>*Q>S)7R=`@%P4?=n}2QU_nr+51)Yc$(gU( z7iGREy7N_A7iq0Ad0Y1$NGdajfuAi;3!Ei*iIW9P+00z3MB+RH3ZXEIQKuzFm>bVk zk~<<3mGLuco^#CJIkLC>rELU`94m0dzYEJP-#R^c0^XH?9~*!a6KbVcW}B}?QEA0` zt_bK%#bnA;jd|bsk+_+* z{}P<~uU={&$_Ihwsf;)wcQ9uhCZ8VzmydyN#7nQr^z)+>LxQy9i`3dsMoTQ-b`g!c z!k>+eR#7mv|N2xpLW)8vKo-n-WYs8D5fY(+p<+#W${5_EN1I=Xq> z0#Crt2rS5gr`Ru1oX_VdOStcWl_tVu_K-D&<8=;F1eY?*f#(ZgBp>5^K^WwCmSf9P zh{=$S$T9#^k^`JES->MaW{lwz;Y&n7xyaZS+RCLT({iSm(iAb!8j(Ff7V(TV{uXDL zO>ajX3MaWf7gqhSsx30nS22pyJWcZ}o^1LFNEy4>12FmLf>7Z|4++Q+HX`hP_^IE{%(Gey7v3A2H8&BWBSm z+V=_`^xk5V=}g|YD*dqJ2`m8wEl~+mwlvyo6ReV=iKA|v&nn^P`O@d1(bozliO&4n z*s}KU`gnRGo9}?vbc3dWykCY#y5MY@?@5b5zM$am`J!Z-d?FU}xXV{>=kgh8L)xC@ zbG|yd`J!x_EY<4T-L|?WR}M$_iM|uEy)3e@VaUqZ+X7%&*r7qTuFU$$FK!B5+9Vx1 z_Vk^ac?sz%Y?!*JXmhVfErdFy?9SkY*;;Bp{!v9g(&x#BX zoS+z5*J4;!Exsdg%vo|L#(E|0)R~GKc(k(-$5?LnmW~lZWqtlVBkcGi0`SCkNJQDv zm`JMkoPdf~p-E_;aKx*QpK@EoDSV>Wu-L7M(m&u-JM>r2G=qm2H?jgd2N}yEWB=YA3_Z<3QHn;K$xwh|o?}>aj9)&c z%`@#bTxkB%23ek2T);=b`VvWZ+HPk_Sc_3j0uQ;(0UZ4qq)?*H{JyCYFCj(X?CdATH`c087nnM#(|dTu>nb=329Tcbe0Q!D z9$w{pNYH55Mj0Ey#IM~Ex!@-`zi&XTGp00h_gKESlWkriwoAW6gwavVR5+C`#A;o% z=Hu{6Il4-_pj?pbO}IBAv#`+V(U*c>i-VQfw-EQTY95ThXPkU03H+>hv4hf?yx~GA zeO?fr%??fC3gbuZ3y98IiR>mI;ta>4cI{;BC3jIus-0e?%DhdXG3XEW2Yu^p2qWO+ z>`*xlCAKCPh1HH#;K`GF$x6WimuNa}y078}St*>nme1=t_;dxwG!tdt8CI>>bP zf-MNaSk~);sKGX2)Lvwk7lRArtvX`rI!zI^fjC)KI~4QE8S1tnueCw1Dw=aUolIYp zZxk}4lco8EF#C`hE_8Z0&@cs?!^_%<>^AC(TTxW}O9aYY0=R${%2@OEja$(C}q`8U? z(m~@=$zc_`-*s4l;C@|p+`1g1x81tP5GAu*gk!07QRWLq0{nHR??mAjlw4st<2uJ_ zp4{2mP&hQL4UOl0Y$G)AyIdR^=#3VKu6@5Yh9^&2GCM9YM{goIFps@qN||VqVKC(; z+>ENEE(t17##AYWDlj+V>jJCF-32vauexsVLQ@rWq_wYP5|=0;k)rw7z3GML z5Q3Sw##u0XPFGn@kqpWF@czx2yp+?D2y6;oe$R+^QKr^`+k2E?vVFHoR&BE$@uCmg zsX3$TWU_s?WW~)oCJR4Q*Z%S+e*|am>gzm zUeEt`us=HZOMlou+&>uf2m7PH^aj1baQ`o$cgKAVJ`1*C|4Z-IZTX%1gFM&Q-S1kQ zbL-Rxd?O)GD<|m!6(yE;($CD@(nT&ZRSDvd9!@eh5Zj@vJCe;s!>$g|X?@rI`n7d^ zt-X9AQJ^y`UA!JYV%sS> z3IJHRhbBslEcjL17VNR+0GuntYoJ(VEKq$3z`k$14uC0R0oa!S5G`?R4|AC4ny)Zd z!_k(emiO|2TPfG_r`hVtTO*5wej^$ZO%aQQDU zPp0Ln$d#-uge-KNvl(|A%<^`hU+?vX{I~F9wxnN_m3F+db~@63k0ixiO_HTLr1|>jDB218OzV{`$40OLxB$ znR~1gGCSi@B>|lX4&ei28k9#Ce!Cq9lEG18`HA7h8n56R*%c!(N=_d&Pih6>f#@Bd zU;!=yI|+^{n?*f+ev`Z25c-UfpA*@05`m|UdYPq`{Q+6$pW>ZF*Vl$#0{jJK+bf)Tfpig&v&*l`)IO@g2okTrVu6yjX~IivXS}b z7Pb{tf&2bif=GpR$pnlJucZ0^zD)(n;=_3*S>o* zs5clYDe@#RiH}Ocy*&Z>uhZ1tl>)Fv{_hVD4}AGQ>K#7H|A%;PBL6jk+^qtj!ET}f z=)#XGz@I<`C_~3LPEC1qqtSRuXbCC0Sh4-A+LTA{ks!b*1Vq=c&lX{pfSn9k@C=aM z%9lJ%adz>cNW^Dr(54WlV23Z1DTq#T3LseWU^iWz-vrJUk+pz!z9GAjX=1lB&Op}} zR4PtguCFb$HXz5+MjZHN2|fnsm!_WXVL}X`|i#F*Xn=!75h)` zu=l9{J;cL}+qV7xwTvxjwElxSB~B7gv+3VlT)Cm;U&T9Ec7OHCv-&IIt+Dyb&z8ks z!3o*>6P019YRMOBLry)Ajxk@V58N)lsX=4);L?VB0@_4K*z zZEE;8)q&fxoKD6@zwCjhG_|I{A3|DX@puY4`uZ#TqwJS+gfe~sc7RgEzFD@vSw!%U_7m(IH<`5D&pRPv73noF@A1{;_g zu&4HR{K-sB1qrdnUAING#w#nH11k|>o1*ax5Jj8dUTxFEo-@4}B!5FIQ!!FQxNCZ+ zCd2EUMCgUbuh#ZNot(=0j^n0=d5Kme(1l-RByAPA3*g_?MXaj-$xxlsJjL=b{LhCpHTbC7b3gC_j8bNP(Nt}gqIVel4)zU^#^YI|Aa$(dzJXzZ+2w#I0; zro5=ZaF?6mTFafq22-M~Clxct?Tj3@%wF4d_76|XVq4|VFYC)2WtG=7U&t8zJ(3b2 z`iI@!O(CNOz^@eCn*f$5x0@PJnC}78)@DMoW+_=4C8VRujV7?ZRvXaV(1ol;bDQ>_ zWnpW4w?2lqYt=V_jVI{no7^=c*abU6OJc*bTj^+C2CH?frO!ds z6?yfgU#;-8Jo0Xvxt_MEJifW~GIx)k8+LddQ80nq&U6lBKK@Yfim3zlyyg+4%kJ zkFxDiwmr(WO*zw}YXC zxc%=8#d(&%a%BgBGM1_g`DqRld3!qb(wf(r{H!oZ=P+0tHp@H4DJnCVzRoBrr#v~l zbqZX2%vh}!fex@%WDhujo-zwmAfGOt)|@}v;qg4Jd&eXpw2hOX&P9itLrop+aTs7b z21An%z7aDv$SNCpZ&_rU;pJz&+hW*M)y)S@)z}O*Kk?WWsHv)( zqo!)CLGAkmP7@OmIEO_uS(|XVPCXGDpeDk)IZSyOyCKijsA!(3@+gk;MMk}{(~uis zXrLU+r+2pzh&-oWOMCE;u?tp4K~xHvTB{8@VMGn>nR2&j&bqrP0?jQtMH}06z|=dI z`p5`h(i&8E{eyN+I2HP>U|mjNTt}Cc!aQ})hGix7ZCqYk`)fJ9MYA%MuVI0K=7p0& z6Y=9^?NXW?O;OOx0 zf+_MByV8}9SCjb$d8aGJAgf)=hmaxH_N@UNVx|1X(f-wzd^a!QI<{`hyWZQ&YAFh| zyQ%M=7+Hs%`CD!OaQOO9PhFaP_W85+Ku$Z#RA4<1E41#p5h)*G!qGNG1Y>1^%(j z7e&L!w^UM4d);j961Nb{Va$(Q1-vuI_P~)`1Jt!voY>O{%z>OZ7JZLW1PSV#sMi(M zqi%2&uBJ?2TnDw9%pcElxGMj}&iF1hfHm^JchDR8^8c_me3btW@ksfPz**o9dnv^0 zMYXb`1cb5X*#huy!>2{G^t%H7vOrYc~HJE=?R_ zT}PBn(SB!&B-aJ|HPE6T?6-y(E5UvmhkJ_kvrw-z*%a!h>e-=w-jM!wp?i zd1~c96dSF(Py^QK|A&?HpV4stG5^Qg5dr^ zN#}~_tZXE9>oCb~f7eRDnBX;1vDpM|JsTz7y5kKtAZT^scVt4os|-=Re{o)Jn(=Q$Q2up$P1NkWUhu$mk-?Coqk`(~2kSpT!jan>-c$UpU8itze1n zCoA^hCOd+4`v0Ks<$oOX2gAqsp9gt_{;yPjnyXvgykMC;YpHAB)DrFjoXNC6$XM}f zu7A70OO&m@`>hf+6Yv76kH=BAzV3J6s3;ge5Ze#a6LagkG~vS};VKABkJTrg?(tgQ z5+!Q{?uGU7?dZ}%dQHoG&PAjXhGM~V?3>yiZ1uE?T*Mn~+k;dASTU@2zXPu&?&46R zNb}X-&`KWqN~!#$sT1HbAt8tQ>Hr?Q?9>1r;;FL(N6 ziLE*y{MycRKINKOl%SiZ&~{Xo!7!I-r4Lgi4b=93>gb&o#!l@as=EJMV=LrD-H$AV~@U*Jh z>LLrayWMQ4gcO_3MqL8Q>tK4@wQ%YNvoYOlWi}*)?swoNqNtoRp3WoH#NE%%IqCny zW2((@sUV|etn4^e8dbZQO)R`^59BFpXcL+gG2iwFj-w4v?kzs;fv2;aP&;?9gw9@* z+B3c#v7_LXI|ZaO0(!d^bxLX#ebM6)F+3vOncbR$v`yE-+Vs9nYr#tHdyBPD_xEqD z2mQM~8|wd3zqr|fz&ih*!^4rU|Mz>3`u~GG`uxvP5paTH=&8#*=_f&D<3V7PM$DGE zyz*XuZ{ayNCPa?GPYqQrE?^lkKoCrBz6*%A3bP&o!Y^;5b{_gW}hj$4*^K-uyQCToO_D&!lVRc&EH z(!cnoNfd5d<|3!Cj4{_v8X9e~j!yac2{$|8>54bi71gJCY0Vix*%Fs| z#xJm0!V)u0B&s{83`GtE$3)eULwUIeo-X-7R{MS#=P*f$ z6tk_?z)>s8oaS+!j=}lyX$zJY#HN#a(5xgsyb`&#!d+^EsNLq80sHe-s7A7-S^zSw z?n_+SHok7;M1)k7Gs~1KHYsn}zD8P|X^H3Dh-ZHiez%sdZ6`2~B5hMWvKN?|ZQQ2i zzJ~;jhMSf?(>}w7B=x>d915r{+!%DrJg40bA+s({K9vLtJNRNEKFfF44KX%VY_zGC zM|0SA+b!Leh1Ru^{J&*Lz#94A?;m>izYlu*hx?E6{~;bN|KAlT`*?Z+;u0~k!7wG# z%tEyE7b(BDkp2~;Q2PN^@=b#gv;#!b8DQI9>~|NJ(75M!2cr_MAlS$nndQRp<%-k> zk{d&mL%&u8KW_PcXU|6bUkK{^bWc1pgkV6&&NX*@{&zBjSMvt$pl<~Utud*<6{ZHmPy)XT5IP6!} z|LF1l?+1Cb{-<+%i}~Kt=Bv|uTgj~J7jP&kc&*9ym_vLEi<`%3wN-?@xh(*9#^f7)XE7`Fe|JKDRq|Af?>d$#|WvDrG}PjAcXWBp8#jrwe^tg3WW zf^j-(UT+=j=UXOjAN8mEvAnNPKTp!%d%)j~cdzUD|1F(=Hn9Ki4=Ve=-rzC*<3XNA z{~tlTcjWjJTy$-I_$Cc}x3KFy>Wepg>em0V$hx2SU6S{n|FPd2^!)sfgVDj``hSS0 zPXCivkv^pA$FC!`w7zYwIlb0bQAT-zGI6u%jW0$uAV63_(T!c<5?w4{d8>O^Z6JXL zTN`N{%OX>{MgSA>=?9$3OxORe=I+PGdz$#aTn61wf=usi|KC3x`ug8s_;~-@f9Tk96g5?&JqqKgGO${^7{y|NZ{KgS_3Z|v5hcPEim3r z62f3)sy|iVk@Vq{RZ{GrU}!dF4)aq^N-u>NLF&nByQ zyoG$#AHwo_u>Ew5L8C)vutZ5m7gWP2kP%<&14TWXhcivuQd051V9JiFxrx66E1Tja z$`B!^Wj^5zIWIPKd1$X`<=z}BHq!s@H~&X()E`v*zaR7eKFo6u`9J)^?;boAl;r?JSW?unI6Sng)*_E#_&4N(^VKHQv|*1xt(-_ioOcKwg4 z{=bj@KM(WN+5di4bAKlmK*=(i`G$2261MIcoNj5~(rPS0IjqCjP`x`-ya@4`u{)3qvgL@T(`9V1y_%;0qM^nE0F%U#t!6_+r$#& zRoTWCbTE46S%buzTib)orsV9^>CyY6^LOtZi@|?Jk0zt4$>H*d~Ju%<6dFD=RGl<5PLUMJ{`**U^+}~5t|75!VyNLT& z&pQ8)!~Fx#|L?Fjc-;Rz$kTZLEA(!Eg{gAFe+!E{z57*NGU25UkSuq)NKVfy&(`|iYk6_p zeQ1CBim|)U{Uoq0H9z}ayj$yi{v~_A1Fg>*kns#cT*_KpD#${?h)2^{EcZZbkRjOa^~J$y=NxDY}BC z;0RF|Hxa@8gI__dTTe^z0E=7V1)xfs4wGOlI+xIM=v72tIF`pfzzOodIZal|`h!=& zF1lPyP?;f$NL(fn*mZF-*8L69(Wu#slwp;11zgY8J&9h=Wstu zDp57HG_9oT)Lf6I*45C}ssOYBzr@%i*0g}=%JQOPLr8!pPNM}It*7p22iS?tQw>ZK z!xSAOb$ucLmHSOR_GbUTr?^Hm6;~WHh8^KAG2(Y9hZ-~6_4jCr*@6vnT|5OHgHA1q zd z0Ixt$zq(H=_91PzU9C|_R~f2D(xg@GIS`RRPEr^9d?Nb#pmtr5}!F<6(5NzI|c{Yi(2hkku{0 z?X2j3+^63DS1jYZNdB_P{og$=|6l)Lbntlp!-G6q+y73L69^S~pN>UAJcn z*{U&1eQ9jc9|Y4IZQ#gDM>+6X4Hq-e*yc;@n}Q_gpEHLyRjN6Aobpn)T_Or`w&kg= z)kRrfZB}L|op;Ert6YED1$Quw#^4g6B9v(V_S=yrE%JtU9jx6wZoNT*af}Fgn-YX!T)j^c>etP zk2vx-h?Rkopaf%zzzz^LREuXsX4zh(`2?mBcxu}#ERqq$xrrM|sAyp6>7x0zc>`uye`#2>r6jlN})B5O1Ndl+tO zR`po9FBFwb^u9L<$cl<_t#b?RIOE$X%ADqLp1M=93!^!L-?4s)k)$SVTxX zLu{O8loljpVO+18+{jS6lb1qMRpb^Orwc++`T8{41v?^LmHN0V<*2wbUl*)SN31@H z^7^MESG_{l*LFGxW$bfMQ(i?Ud=XoyaO#q!_-ka9bgkXihw33lu(j8x(VCKPa+rJ% zQ<%l5Y{ttcTdSfP2lt(We5iPnDOz>*yoA#!j!le}86f9VaHIm2o7%K-JmXs7dzf9Q zhZtF!`>2|T0q?pW3a>}+5tD_`g{7{iZ-B)LHn?W=+j*B1Q9H%Rr ze%*KOc~78t^T^2>SRrG6`_s2>*ti7tP8yi>+_Mb$j!bv@%U;>H_;KsFV~6e7##nK` zn`@};n3tApduj(DI<09z=ziphaTtSi3vuxn@q_7_k7u=C&yP>7V{!F<49<^FTOr%E zDPcMvK-ND13PNz&Fcpkm6BwTzu2ecg;v`SFU7U$kVILB*l_QtQkGs3Nlj@b#1@+33 z`C)5AXh8@^feh8k)7`qyOaSgmE|sE~=H)oV+r+1uRpNe@+@#)ek*g zE0A@k4Qn)kTJ`r;mWUJfyHekg)GSj+H{&8G%azh#@tQ5UO%uNnO^0}n zVJ6Rd_MuPx8VVoH{;5xe*4lqQi7nb~tU&AH|Mn~X--n08{YU%HLplLReMJ_b_+pINYJ##2!4aYn_+HZCEgY zdQa?{%>O;GlcLOpwQDmEp8Q}(8D&m#!Th+TOd-gISDB&yH~NPBZ}fj6?T*0sb-lxC zi3nqC!pU*nn7JMH#>{n^W;G%;S-V<^5j5cqsKnug9Kvk|kf|c7zGHyXFfY-Hc!>WB zrnn@u-gnvpcqg{;e}|{a|5dCi>2lT&Z*lRTeAe*);o;$+690Yh82|GiPl$u-z<)9S zkuiB&$sEKtP)*YziN;dWuJ1TLq{;mJa6uB+Dx5~x{uA`25=6AaxtRY}@-Yhv_u6B; z{3+XPeZoa#`Y1a$9PV5FmYYgeh1+he@{rE>`>uH>8}>ly<9gl)XIIbO_*(Y0?N549 z`d*-l2-xfMBDM8xrfKsYz5qMMOOX|NTI+4e%ZFij-~0`lSK1xY8b>gNe8u4oeIHmhR9M!0mRswS96B0o3zl+UCr* z;=)ztX(|msCCrkew3xw@#T*>ijy4Jj&!p>EbG7Ha7-z>#$F)a!-<0>b7)IyYqD(8% z4&!e3o8|bMrSQ#DD2PS{cmZg4eX6hOwy2{2r+CthQAxX>*niJ%m-$;f>->NF1Kkx|M?(KNdHGAb&_{0ZxKgI9W>xf1ZE+Jzv>QAH-V8k#x0|)<_$j#}%b31=7b&^ZF`#v(^Ig}|XuHvk zID(=RrZ<)FtKFbqm2`ip?AaJu!X?D1h%jd&M&6=ruC!E`{crXS`QI!8QM=vdl6LFl z^G}_CulDsdsK$!f$0=KhCE*+3`sUD-Xt6_6(ut)62@eE6n~wj6R$?H21vEdSCC)BP zetAc*Fo>6E)daD`OGweCAg>=HJN4sp-_IKPe;4V0*5?22AB-yZKR@38`7n<<|0ywA zBEZ;bcM9c}mk|J-;uul{Fp){C79~pR4}Ux!Z8^MdAj<+?zdMX|&KHEfM5s8p>?Hq0Q^ixqHf--8n|J(MKQT-6(>GMhF zV5H?vgJAC960Jb)Ohfa)TQcEyHafF13U>knVY8a7J}*|RdGe6F*} zbG5FqXKQ-&RHDR*)I~T6^!+&R5Zt{ckGd@@-$gUE+V$} z8kpOoa`=0G!usC~G6m2wo!zJZPj57+_8*lQ%x) z!Va3CtW&%6g9*?s4Jg|^P5I+?j_pcTyB*cOTB#NwFK*FOe1YY|2#cc3ixM;C#n}D0 zyPcoCcB@|5Y28exM0ji@Sq{!FI*cKSOwz7>o1pm;mB;zK;Q9CdtKaEAj{?@XwIkYb zQ#nWsCWu0($>3H~F#H*cFZEy$D%x9ZHykF}XWKjL-K8IfeU;bUD#;iRy z3B=RbY^HO}fOL+ELh*Ng%2Rj|&r2(JXSGUQYKhaObn&kL&1VFt2 zJ32x*@L6pe#3#p>W4AVL#OzAAc;I|bx1u0AZXtoD`FVM{$YLS7wF7^R5_IZE*yQs0Lm%n8YMprqY00$>e3{Uh6K5O{2^7 z7E!E0QEju82;@q%NSyIQsXH?A=439{j3~vmvo*|7>bah+!0M>Qapd1dGc8e(a{v1O zh(Poy+Md6tUioZYs;ozGoG&uUSOVi9%{?JbofB{MT4r0fU`Hecb7oJ`YQ;!UaUtBT zgPOTXB`c(>6C~+)iVXqP8cduB*}Onyx&kp|M4^a8$;>>XWuB&}lxY_ETNF1=_2KTLy*s8 zfe`F=Ls%^Z5G-Me6X3VG^9|XJ>M#m%aP8(+%R4OhmX#c=mXatz zIXf8%(OgiINY}f@S_^{8K$V?*j;Y!4iJE=_^f~KwVrtJ9gz}MKyQ8ZTQ{-c1H|K!T zK7kz&na~P_jnh&{^JsB6-R}S|2#P#8GR_2VFrgx?mHS={y$P4JzrDmU)hSg>DS5?< zj@PR+V*xa7jseg@aTb$oRWcEo3MZIlIUifzv2e@57DAZl`E<)WLoM6ftr=HgM0bW% zysC_*c)ig;TDoOw;Ma|%1$g6OOyQ(Dij`)4@C{>VRR)nd!f}T&g_GbYnwmi(4Sse< zH&|rbk%pU)ZhcFe4ZW!!Cgd+vC$NUTU5wUDkWcOYm%3@WAKDMX-*z50T?xU) z8ktI96*$exu@+g33{Nqa0GM&+7gmVNMC1sIg^bGTm|h32Hm7J_bI}QJqiO+kazCV) zP;Oq@QJ0`upuT`5&EjM)MSam3|9sUQ!vrny`r%tM zNEVPa<0DG`&PT|QOh9~Em(^%sfoM-7FYTKuY%Y&VMb)5=s>7N{@VmoKHm7N8S?a-d zlh3H32(;PAqy(&uBt--C%~%wj7d+RR-(*b}TzSH4H{lS(nU86$r0^Qk%5N2Sophp> z2r6om|LMV|egn}Yz^v88f-r9|*Ul{fKDv&$s?72l(Ih80q@Fn~Y%sOX#7YM|Go30k zl`X7rc5x$NWdr|x3o6ya4cIV4sKSQTsA)h=ELawHW>JR*`72Kr4zk|rw{6y*!g;fG zS8eOA*li8uyJNMofe@RmY5N8&)@o#X_No?&$6B4&_dd0E#!jp7?u3;}umLt&ZE!ml zY9MdUK40;1{pQ4V;g&F86SVxX?%PGNsD4ve7YoX! zt!$%=qLNLs)dSfa&VoItndu@=&b-MEj7qp;FK!COqu!&UU~l+Ed8|_xdMW}ywj*Ry zFf{sV>Oj8-20bvSCd0ouiacog$I}n%R+=gnq5z5Ca0vRn!&=bMYEQZu2ac9!4;j=JpShH2y08tgW$i|~x(F~<~gpo!nFRNq5$V(a! z85@Ww8@zKc5E4_rQ?1eTe!br4Dv_jIR+UIKz!uylHB#S@XGt?!X3c=hwN4M_}SI|Eis0yAhPyBnBJM#9$p!3~oymgE~rZlpgO^9RaGcX>6hn zspRl7o)w>GrLTzR`X8Ex;DY9JNO26)bj4daK05t$^6LE4_peW0emZ;g{^RT8S5A2?*SHL1;d&{mgk^?bl?L!8wj=zpJKSmU+?CcFlLyc+F?idbmJ?M&|^+!6d2a z@rxS(@N=wg1R-G^sOk8INVp*Cu+T$Z*L{Z`UTj=%i}t*}x2wXa zSx)FFq%$|ecZVQ)ipn|W_cxL=4yy)`TQpi%x5AAT291pvG;7P>Xq~$ACT>taP9dJ3 zEAO_4oWP9{t;mTrxQVe^gIFN3`bHRDKSq20TRma_Pwn^6{lqo`h2a356`XJD4!Xww zdw<`*|9{Xw96jcLd61{^{(m|{V3ID7h|!qlC4V!|7nv;-z(4Z|pfkvggykY@P0%zi zRh$$LE>DHIxZ&0~%aO_@I4dz9H;p+b$yIyklyKvgsiY*#TZXlJ&s;pL z&tY2N483OWJ0&V|f@xl^z}K(innD!nTcw>Tk+&`^vLo_=pmGd){DnD?7>jKbe_MCZ zV3)BqI(7Ld(;(H~0JOo;n>Q^0N<{ee-THoGZV6M!>#w#=XTw{Q8QH=t5lyy1)Sck0 zOJq z=2YAV5~v~ryD;I!BfxL_jc55)2HNkz!RXoeVDt=hmqpf9E&L~lXY)K^-!J~-%KZj@ z{S}Bli851&)n$guB9mEy_juItDqpaP&saZCemGkW!O`&>^8fNqilG!K(bx+7vja3pb=22mM3ygt-pU4`=XYcu|98rHpIG$7Pa(UY-l zguM4DmINr4{IbXdT)9Xz=3{qu>ujAapRAoIr%nHgU8mL1sJEQ!xcFzXn7AM13j?51 zB7ps)a$EPT)&FD+I4W-*2h^4qgECD$4 zBb%+jw0b>`fjd^vgcfHphV}Qy@a1dt62AifVzMK-HBJ|4dYY#=UO74q|JEt=MxdBO9k~=bfcx?NyAP+I?iS=-KnpPm-yB{dn7qr<)%!fBOvNNCLebpe zAeAa?>voc7tO}?omS>|+?_V9g{PgbR&HsFQ|L)zn+mEOpgMYFOccW}+ z-6Cr%lrr1AKUlO#6_}@iVcD{6{?`v>KHm%jR?_S~ukD=s@*=grq1AgdHP!g)*Y8bT z>jEm%BL{}C4ETMNkGkQht}a78Sk*qflNDoiE2D?F{eB(dcG+zacj~T3+sW>4C)r>1%l3nH$jK=lpllCX^&8J`v3!-WOXk|=ON7DiSAZuG`O`({O zr`6&X@^gM`vgl^pL*Ks@MBY3exl6q85uj8C1#7Z^-OdNg5YmZh9@4|2Wj!TW)-rIH%e z6G8dWwKxOG$}M)>2KtrZ#10=eb%N~IrWFw6`0W~g@3yj*&%1;Z9G04NVhsJw`n%zl z(rKJ~-l$2aWGy$FS?OEXk%^VU`ZMQ@)!gR>ifs!tz$68S424!Jb*gj|(q%qDVXU=l zV)wfi5cxmEanE_VKqp6M;OzM5%`2eN)FgnrSZC8*bdr^&du{}p+1+YCVK?0@~xl8*AIKMHw;XApOI!kT^wLt)`|I7M$aBK`1JJz$KwSV>noEl&HM@$8U6+Q3P@g3e%sovXKpa3TNbFNGaFaLPlNRFj`?e(hI{&)Bz%hj>tsW)Ks}vErzB^B zJ9j^WjppDc%*{jwKW{&sAuyXQ*9}cnzI95zH9DkeXJh^UD8-NnMb7$p`+ZZECrDqk z_4RAZ{(XDsaLPBteC?{gZx5B`MV{sttFxj+FgeaMLQ9CH3tjEUyJ$B>rAd}!{oE4v zpU@Ka@A+(C|10S&bAYdj|L7kMEBF5%3?A?QdXR^o0G#spV{PzL_uM!JzYWZN{D{QL zE2J|Sq;7hLaQK^d_mK8|cCQR_MSdaUuw?{wgE;3U9Z6m(EMSN{;4%@7d?#wRw>{+( zSI3|)tai6#TWt|QqfVf$lpNP8%vkrs>MZZYQynDk50L9vX`NbM8>a+2uzRQCQD;6{ zM=tJ7EAJMi2nK%Jc9r8 zIR?U)8s`~E^9vkr#`WbHvyQhbN<4?M(%s;nE4X-=kQ zuv@eRkX29a`Q5@&Zd5l!DI~<8D~cK1cEm}x{3=e5HtJENuEp^1*xd~-;-`Fc&sT-G z*N}4^eJzg^4!p>T6o>3@Cwx&%tj+#Jp^9|%nzLI|pQFgy67)c&qC98f#N@ck%O*vl z75@rA@r@KH4*3cV92x8R(i@jMj|7~Fx8=N#5|5j53+N)~7pGKo^x^znR4E)7IlFbk z@k6b6S0dIxPetAJqBEzksSzD zUfY}Pp%?4nhDb?4<-P$heTh=I(#KfVG_qyf2^0d&!>YhDm2**|^I3_=EKidvY`?^Y zfGM7%d_ikbcE4{3v~W-Je3;JXFvJb_5#c}YM*gqW|7^Fk8)|`T^uNJ=@4(Oh&>KDa z|2)XUx2PY5dAGp=P z7d!KizSdc!@DUB!H-iRRQW+Z+l$uM4ExW5IZy+>)?o^<;=yN^CNx!+1Asa;0j&_AD zz>Bi>BCJj1fykcfpk!g~#8ul-*PS(oAQlW2Z6pe)U)w?v9VqhxUT|ZzDCoak1GSF1 z`hxv>{pGvPWw!Olmdn_Q7^%-kC8=Q+kUl&1?AMAR+LFFr0nj@t^SZ{=ZF5P(wtdNN!w~}B%G#$k+spVwWtCnRM)I_x zS-7Zv!Gz-Mf-`!T&2_&6N9h$@5m1z9ib?=8;1Z)%du~KUb<42krtPPZ6za+aKU*UJ9#X6GCfigp^Vf_oOP*k47yKM!T5( zsa?c%i|!$XvX6Od3q)vM(A7&^y6a25b<(f7nw|}6juO16SPIQyo(30*l2Jf=Zf=3# zf1x*cj{Q@;U?aM4s2%=Ol^uKC4OldX)sf80>Ut5QspIOR-MS(oA}(@L+&|4H|3op> zEKSG7YAUu0@UuK5()-!0nD5gVsVg#e8aDuHTb5y!)|;oGvL$Qmv_1e7zXg37_HRKB zT8YKbh+5+BlXZ1n&9h23QntL!6J5`GHLhkPSqG4fvfc*pA7hIg1HL$;deyjbVS2fN z)lbn{p>%W;L9I8rl0H01sy{dOPL(>>*=zw|=rjz}`kws%?0x%p+cwtV{;a5i9}9(KOw^eGgtF_<$rbj+^O;en>14 zyto&*xG!8>$bE#8fYFI@W@BlMT+5Axrc9=$Q}g)(c|#b0U;`r@f*J}>#qM>3WpP;K z?!kk2AMk0k|ILE|C%>#=ieWgvi2o^a>e_n(d+h)5*sI$A-qf3Zw*MdF(@_6aANr*L zatl5rYmh)n?@1bpC=`lmmU3@_>6JkN3{pZV$dXVn5ehM*+O8C7BUb;RbO=SUnu8Uu znfuC1E=;&O%Pq0Z;4hngasEIE^S%Pn2YR2>NJ`h>O?P52=)na4zzHGo8Q6HeI~<2+ zKpsNutr3GEWRS~Ad5fH}wOKI%^(}J^Cy}JmQvC-h3aO+joF^&TV3Nr^DMIeD1oSsv zAM_;x75ZobgMvr_sINuJe}wZ(NU7Q(*FUC&u=3B69Bp_S7!(`l3es2LDUd#v(ahoR z=O_#`YxKbpcn{{2QHTQLGKZr7LxAzdyC7CO6?&u{jwLvy{tg6I!%<80Qh9@72>B8c z2NK?7YcO`3ho-SnBefc^7#S1?c_2hZ!Z_ z*I>QnbJ>7|eDDYeDBw*fs7D_W327pKpTJ);)cdXRniB;npU=x&AU!oigoK!jsQqBB zl#s|l8B*g=U{01spf9+RgJ{K&9s1y${}}!7mD|wI0gJX{XBNU9yu*O3lL#?X?&}W} z`R&l>i?WRR#}ZctUQO=YzvWKU0sfyp8GaFC)@d7P-}#T>q?Z5Td!NsLJj$oR|I_|m zLPDzV4%M{*K+YOlu!0)|AP7+ew%LgLA?z|m6vgaMBV|9`Pb>M~F#xzP z{^yUX_5X+7lA0h^LSokklevIIsp+fh?{}cj; zLQ{Y40^88}p3t2I-5RuN=PkfC;oUhfn2%Xw6C3@zBZGVC)V+2H4;HXZm(lojJo1Mn zuW`5eu-kWRe7AGZ@KD_C;ln?Gmc60Goig!Z0*Qw}w8auDgWk+44>w>3#M2BH$DpiZ zRILeEVuH$-S_@Du!)n#(>DJSs!L^6!%@$(gJn<2`v<2EePPfhBwogukwx-Jxhx@2Y z{m&SYd)&_f{$Gkh+}-&*;QYVmPO9<0k@q?O`%ylhmj5SM?L%BY0ie*7{5bh*o2+T-sC zXr`W)KTQ1TtfZoiVcw&d^9g%6i(f5;hcWhd0z1IG7Vj%C9gS)^nC*;U1MSxE4>f&1 zqz{|H%Q@-6JF=O%Ejs&bWc}GbjrL#0a70gjQS~nI2bO=@Xa7wm!&?2n(dYV4kMj}d z|2KGjCeMK22ytot)tV1WutI0@Fqo)h*SkV2OJe{5B?|^(5~63iI%;umNU!0}4TF*R zTh!qI@-j+yXxj(S(U(`o>Dr)5Qzj=1m=l}k9UsXu5S&^0=2I2}0v_NT!!sl6v zsPc^x)P_2WO%gC6p&tJe{&&o9`}s&nSdoVTStle$ zG0W#dT#fyjGwmzwXquO18&AaPIfmY`{G9Ru^JJiqJKQ-EB^R;}oZ>;=wuXf9ilFHT z)Di72nu}5Ai&`%{;ewaze&=Fab}0{M)(-AU-`!c4hF6W^k>SsKE~uSY&QCk96Sg%5 z?Wo!`H@RVwICt3`r7>cNI+&c~FP+KLmc;)qI(8eNw6zsT&DYX^y75Wi1`Y zIv!Dyn_Ql$QEP}?)FA63=YQkkwmcyEf~b~y?BP~pNvr)atFcgfkGC4zE7(Evs(ZLK zSG%kEpau8g%dKItbzEu(FSJUR^+ncli5;@Qb}Xp}TTPE+YRH}*z|t^u;lmjk#**G= zXFRt5x6A(*xtSm6`~Qyv>id$2L`iJ{ zDE1Nm^}$nh{jd0XMF=x?vLRbJj5utCWNXl0Mq~~np*D92fN~GH1}t*5bp;G3@6|}; zE?!`8S!u<8c@G%57A5lYmPHYmGod^xJqbWNJqJE`#i)Uda_Ia=s&wd%fz(aZO{IGV zrD&a#DV{vXvMilZm0L|pv3n%nMWI=xNi;F<+4-$>bG-&tyj$QMB2b4=#== zLohtr!3Rmvyt1rv9co=!-m(4J@TgdKx{>^T$RaFZ^?)OYxOD&-pFBtGL8HF1Jr=eAFcfN=znFUe{B8lj{WNW50mlabNB@x-mLfcx?neL=WRH2)o++rV|C4Y1`syWP8 zHq8I%nLX^YYyDG3QgNp30|mf7``;hc?EmTXbN%l}`LwtHP5pf>IRuF7>6>)1W+8E* zN}+&_%2~~BfLVyHa0b9mJzME3zbNHD)B}N}ye-VE1ZY0Y%}J86Br`9Y$+Mzr?el=c zQ}iq75BlXMl28_eRh*f=j^*ec8V32AHFwyVe%~)uB~;-2X;HpShdz?tBGPrVibH z%+ad%t*EcvWY^THc_8)-#jaO>Yp8pv?|NwlQyHowdqXPt5!6cKKg@_)s(d$Hh?Ezn zFh)SubQI2iGOaHSZ+NgVDKga^uXa7&!X*K`HAAPp}ALY|Z|8obH z%CeXll9j5}?Tm#>?)2VLxI|}7))&(zQFZ-$;Ff|4gk(c##HD!B~c_o*l@XP;pd#B+TXzCj`05#A#B$gZ-izV>0*nx8UcO} zQnW!U~k7Td2W2{U;YCyF;X zCGi@?%<26nju!;17)$8c$w^28>dY~V;Tk&uS)b&0<puqF9Y7o zz-Va(-#-nZ^!f8>A0_{t6^hnaBzio2AN%9K)%eeF@_GOFaXwGLC1ebxv52lp4gmKn z6oYw&qmWCb1O|6v2c!1{h?9cq=5Gq<3Plm%zMahZ!SV7Kq$q+6Z;&V|Z~PA9u=fPS zNZsM}G)d6{zeAxcZ1q2n93XBABe8gsqXZI^f(XaR={e7@f4OEPMZG8BT(B(o;rtqe zIHf&jiP?$xSEAo@=Ko4h#J~E7)$)Y@qrcKkd{O|K!{9DUgzlrgFCBWH^uBcF@UHiz z!`A$7lHz6W%m3GV0)Bw0I1hL6`~~efNlN~S0@ibIh~SBAo|1p|oDB^~h)(_;1gKj7 z=P#eV`R>K5@4s`_;e+?Fd;L!)?x^bj4gJsiKacZy0?t=3UZRLB|2j{m)n4%N& zP0w+h5~L&Wbm$I;1J@f2M@K#07srmT*xr}wXfX)ojfo_N#K z$wBB~N;5=Hc>ANHo{eVDMzhzMX17AKXVUCzn!m;GIK=@;Qxq_;#+1Q3aXptv4}ei5 zwzslmnZghO9OK*%M=7<^5d$*u4x1o7AQNx6V?Zn`Y1nxsd9?v?n+L>LNjEotKL*z~&oADHA-K5w7OpX8 zj1nKTTvM)VCEK%+?R6&GbtWaUy*k;AsJPCg85P$#%&c!hrEH0S+``&cBOebZAbHTx`SqmG3$0VX5ET0>z0h!gK3uZsvku# z{;BxsNR2@|@jIE?#jk5KZr#qtty|ICZppZHXBF|g!0$jrmcr|jdzYNVNlOwZyGXRC zRkyQRbt`JsEvZ$vThL%KYDx2G7tI!}>UP$uZbgZ>C9UfE9cgYCD4C4xffCoILENqy zWabQ~6`GX>;p$^BoHZ#`zOqx5ca<}C?yHnwZ90Geh zYd4Jc0DsV#=3#|q-=z7pApoQ60)%r}evu1LS*lOcdl)JOz5Wh*o2>!G0oDg$`XTsB2j`271r%CC0QaS(72e5r4Ywff^7Dh z*V$h4D)yQ;X(Y%#d3@GJr|lNq=ycbjvl&qbTE0z0R*WdmG@@LqAzmSJ+AeH8np(rw z93vZ%ovfyODOTBY)QQk`=HY0%!#wm%Q>pa3f!Mf)*qUq*fKgQJjf1?ZqsVr;IX}OW z*tQG-j6?|FOH~QI89q!AD5p4WdS8MdLNLw}Sr;9Pg)6H+$h!hT!W~oy=9u-q1oLd2 zD0+Kef)ue7FPA7)KY>&prm;@Jq@9mHnoLZOrvhx$l5t0~UBKGem7|fr16WH3el(o! z0@f0E;>ulLo47*tsjq>EQ7e60gBtD?@unfA*0PSRd z@)s+nr)hb*2UwonC7Ojmo5k7L;H)V0!rb%*zBT&u5K`7cpv^ezY@1a~v#~+ou)6O7 zqkFg&K2N|kZHh!8CK!hxML~)<>0|){l(GR;HF-#^2SpA=yG`fO(7Ne7v+RV;x^9Hc zoJ!bhWDZ5uwMZZfR@$1-4q$}iJ7jhLY(cB;F{?7ZzKO3jVo~Nz|Fm7AoquXgw3}J> ztY%%etY%f!GHfJJO^6cc)zi&j$+=LTXGEdS3yrpl`gWGKzbg=HH9ERdUx`S0CiT|f zOm%wOWjpw%)@+BFWvgn|b*JjII=yZqfqI|nVx2@t)4R_KT*J_8kUwT+n#7KvDj0SuJ+WVY)?(f_EeQMaICDRBqek1 z(?xJAMu6cpBAMKfzen&6rGRcJLu*U^?!;mYO}ZLGld>^1DH%id?V*bH8Mo9vW2^R= zSgfZ>SL>&crONZ_cQIqQ$C=Iq2`Jx#h=Pm{8Qo|LR7@4#q<@3)Iq_`WsQ zWnz)Slde*DQkKG#k`yioEK6aTCam{v<@U{nMA;ez5yb1fl!I7>$tL(hi5$PBHuA07 zXkwAXldh6@Tz0}IB}r_IgCTCUzoNIdBDl4=En|yIJ?`pKkIOFgxa3lM^#m0W^#xf1 zM8PFz3)eE;&Tr{T`ofj8@p(%Z-Ip$Ujw!3DxaP5J-ai_5&Cwl~mGIb^m}A+PBQ3Y( zpCyT;yX8>;-+mNeY*D4-uBvogR;A;TDz&GjRwmYM$tCU%E*Z|+NyFi+7Q2<15weh% z2%gBc^3=FG(}&}wZHSw-{J5)@AD6ZKxTNKc-PGKQr$mTP8Sz=8^&F+ZxUfAXgyr|$ z+GuE22xB0;$ zS?`s*&c`L2TAA8n^Gp}A6N7QuPACjdcL;@Mr9bYf^v7kTKQ1Z#hQSag<-$;0xB(*o zBMd1;Qtyip0s<>SnJBklj*T3Lc1mG*YK_~DElPjfRq2na8fW}+yLikqOz zAI|0U^KaXim*s&m2ZC)AMAdM#lz#RD;5~)+v3U>y?A(2BUyZEWu%Jn}qH_NRMIx-1$E6YmWHzFgqTw9jv1`BIlCKejjuh1SwDj|u1 ztoOjZjA;+IPHRWpsRFbQ*I0FJ=9v!HXcm2}K}*DFee}07ICF zy$LRWgzwJ31iDU+7z=OOZoPTa9XU*1%Z&n0ZWJ^{=;dt5qJ@~mVpD=ah89^AQN*mX z(QNSZ2c2ibtIWpGoQ>*U^f^hkpj?sKsqKR@0)iEeLLj@g64Pw3`yF$q#GBQH=QR_f zY%{LV@*3`XQAzz)BZ^zAa@NF>j0szbZ4?TYc!OfOmE^VDM)B<1D84O=%I}y(#owG& zhQ~FBXIh!-|C3P$l9X(4h=3~QDTxnOYZ8J5#Bw_gW{e~#U1NDovmA+WJCDX2TRj@z zlECG6P2lpKiUB(_hoK&?=APXKrd*~dwvZkTOA%a0I7T3xgDj0GfJUWKV zR?2Dlj%hI3kMGpZKuGhA6WcQ4@7W{%wxU~|Yi?CaZuyRBvf0n=RP<)c__=3K#j;h{ z>Re!}QeVq=OjAvq#&1T$W)^j}iYi8te;67zd!V~HP)1{T7#dbh-W83i9zP5Xo5Jj< zFNf7haSuVmR;Q?QnW9RSqG5SbMpiVMC#7@Ypi14KVR=&QXf#hs_i{be(Qpqz!?RU< z=v?rjQtzQW8n#??YZ;%eqv1MUxui;YIBa;hHowm8?AN&!zs@!MI(H@$d@ZOnuNSwo zQ{z^g8rN`Y_Mp-{J#J@{+bx^iu3>WT#-!Qgb-S6oDlXxbEf=@2dpRzrR$Q75SGTL- z>Xr>xw=i5e8WSrT&4#Pn)o`uUzj6!1bvGK#=49vMS8jDuCWoQXYzK9&%~UDP8Om0e;6({InrH>l+hR-hDNid>0DZBg8}^-+uXxj~U~ewqS{;ZuyOU@Cez<(2@&&29 zsOBDlki=gwv0?CZi`Wq$83SaYZb-0_)FcU}osF7l*{GRTjhY%o{QU?qBrewxM;o&^ zqbSU&6Y=|e#i1C^BLqq<79{24VWY6gSekYV5YUC-JNMy+^H%@LUGE}=0 z8l*UBj*m|*_Rh4cy)!M_JJX82(=cgrqhgc9)yy3mzDEgMGDieY3aPb%KB zpwTG;#$Ozj(HQR%!%6&wKp4x3nOZJ;uOzmk`Q=7k7F&s*E zLp{MoNI6jiUIwsN+1$9!f)Dg}FVC;Q8mFn6+HtGHGqdq&b+=TB)-X#V9B|grl1Sgy zD30P)EIQlp+02seR!MpIN;ZjGWzyH25OFR`zET-FlBL}AEZq+x-oHW%C=c6xskXLN zdCUlIx%Ov7E6lvukX&Yz8wM1IDBwiM`Dm3MG852mO% z&J`)QgrG>Pyo79(*J+XZb%7%!5}gqY#bNPWJBz_+Cke)WV{MEyi=WXqBo=oeGGfS} zYPu`a2P;M9a%E!LIT+&|4u;Lv>tyOpDwp9*D;{4_t=MGKD@0kE1xyyb5X>&_zTvXc zNRTats$k_1YpvJrJlD*2oNHpcQD@TmMxBYcU&2`Y6XQyq%CO`rilmIwo*y5+JEa52 z1}mb{CFC%1!rK+}nAxfvD=eES@0wyEUv*2Q`(=N|wbtxZG%`e4k-CIs#_z0M<&l}K z@Q6atN_F=MpH+#rOnA9MK$fVJOt-@Hxk)p0u2SyyHMqv&Tn>nch#+yRsdx&WC5iNH)b|AurV9iVuW#RcZUmGa3yb`;?kA&dVkC20q-3U;wX&~L-Y*Xe*Kl_coWARxVNI| zb3@(qdhfwiaXs{VAhP@3gC9`J-3Rc#_kLh}-k1L4e+h^e`T03PhZv?_Ph7i-DS+T5 ziq_zj8Wwq+w79qW=HIPg~gE!ybfY&dcy}1E5--B;nfQvWRH_u+Zdhr}Q zzqopFe)H<@qQ`4_fVS5gfJ=FWb+AIgo$wrf`ZdGB-GDC<29_BP5iN8_p)eehE>G4l z&R}%%f5jWu{Efd1-S5OZC$2a6K0)z-PyfjgSm2a0r#ArC2njNO`Vrq@8|0(j0Gt;n zJ;yX4X;`!lg^gTbKpEQ-Jt zUalDBHYiFrC=vMImn`hT5ftfFFr}vWFqYX-r!97yP zZDm^+MN0ltAa10GX()S@JvrbamSR7@8jM50YvI6|w}t6kYRRww$3ilw>ztKP6e3fs zZBBs*`p>t8Ug9qZWEja)ktvK(QC2~OR>=|vQY+|@c@O@ExOBhSCS1Df(c^!~u)8Vi z>q34|(gD5qhT~e?dEQgQl^ySn^gx&@e_ zHFdxX7_6EdWV#|*lwY()MWpBsZ5^p*ib@gzjKN%Poj5>Y&0S6dPcF*mh%58=LNe-T zl$e3y#&FIVFyikINK75xR9y2X;LAWtmZA`3afnjM4FaK}Qzsyy6vAn>e=}HG!a~~- zIUam8L`iK9Y@nb?q(nd^2oR<6N^l2UumceMmZUO>iQ@%1&UGjQKXFzINuV?*S6C#V zj^U^aRYbCMAf&L;N6IHum=Dx|ojfrRK58BnN5<_!@E*(w;UjUofDuKUjb5mbUKYo7 z`U}3mvAUHnw05y+Vp4IgehW~%!6}KwdfmVj^FFD%yszj^Fsv2)D@-}$Nd9;G)6cvE zu80eO>fT@!N>KMWiufc+PnQuDvCEl7g~kjrwfUiii@cd$S*^yKGB7G`7K-#Gg!#Y-LOwlo!4pi*ZgB zLL3oUS1d_UfVfqSEbG3E+O^yct)uqh9j4+Om)bB@6VHFCj=+uf831~hh#fL4e2uxN zqDwg=>jjU%Ee?N4DZJewnH(H1Q$*M09MIC z8LW~U7ZF)XBa^PMxDY_txe>X;?b$?k)QU}V?DnyV0lgcW)B_pzTxw0TzIf6NhSZZYr^3|qFeALiw7CP+(gGe}QClmPEI8YoYOdm*yeSBQG zLDnEX3MU1{9HK%tsBm^OFejrZjb+rkD#gxIZqYLgBdXFFV&1Ewmv?oo?9-=Wt%xft z2Ji@cA4mEEEM1iiU+NkHNNC5)cXV1>dg!tru|HZqKK!adMsJV;15h)IY}p6I>?Fb)SW zW_X}~Q9?ROaEvYlD_XcqHrdHs1rR66qUe%DIHl~A#;mBytccmDtHE$Ww;wru4edObOndw$=S%Ajs4jO&gT%#+$oxk z=H6ns2#07GqDe4X3|$Y7=d-Ch8c+S<$PeHtntPLQej0@HX|Nj`(L2W|ZLm?k-=H+* zYE1ZByoGiRwa-Gsw4t;5vZ@DQqsD<`@Tlp>M$%u(W&!h3M*@jl*Uq8Kh&fDlp4 zeZPc+wEpr2Q%vHQm~#2|3a>@1TLJP#j9J3J7Kc=1Yp{~dK_uH(U=oq?@Kz-BISEV| zmJ;5OdNGdlKo~@VEAv%gyt=Cgnx#u*gIez_xV z+cC7<+TfNM5oF0Sg&_j@YutB#p7%|UxkZda?ILh{^h#fX^;F61BN3x2VJTw(*J={3 zQ6r%5WU()OaF=Mp}9BD$Nug0 zH+g=kp>@Shvt8lJ$A+FY%kv82Vk*g~3^Dg6r6oe;P^+2jpZz2s_RspFVrc)kFPN`? z*7y3q|9sr12&Tab(R^O?z8iS{=99&Zc^6pf*f! zygX51fdNe9!5lu-1J&^4i42@`@06{O{`pAJ*c2ps4RPFzw*zi!M$@%8UZrKl8F+RC zZvOiWyuCRG-yDIdCJ?_YrPqJj9Jc=K&a*6JGoj-%&7 z{9aS<`r%Cy+3W-qZ$u7?dcV2NJBHF2Mi((d=>i6*?)AN;NF~`|buJb%CK5zM*q@th zYTaWE#LKv zSj=XJbO>WWbQ4X1yqz`Q$5f~b$b2b_s@<0PGoLFPTir>9VwPh0>j`4P32#Zk0IXq> zaI`KidFvEW^(ucZWbB8pT^NP~)%}1G5imk57zhjo_n583p93iIJ~_%M)k3RboPR71 zHJB}nq6=G+$?DO$v}FX`TEygS-eoOFspjfg6p?!!q7{*B^o~m+%!=2P>JYH-u9$;@ z*&I;7yTS;iH_bNri`9@o=?(3zi*MKZmb#MpBpwONNycFER#1)rXHo>|79=>h(@yh3 z9DdassoaS^26&y2l);!;R;EsE*z4i*S5;%Q*U2v$cJ=Ys5XWC=IF5;`!yhT1?_2y1 zg|BfKMu^Kj+Ta4_3X^CH7RI^c0&D)RdbPQWR{nTCnpIefI-g5n9Ee1wb74$UVNK@#wv6G6qzwa_ zIINc>C=MlLnU*g)EqbAOx<~$|d}wHbOdoD9o5~u$f?1wYlyEx+9hDH_*pW;m{1B?F zzqRfc#o-{MDo#}zX(7*ka(@c{rD1o9#is*S7;Ng|dP0pAwz}194;_&rXz;nFOz&)fRow{U` z#agFI&ez#XqIG@@U&#qf zp{C0rPNdB0IINpxfwsZ)+W0q?1T~WP8Dga%wN&NVf}3D_hP~F2Oo!h#D1+DBFcEJ{ z3s1JwQd{n9;#gjlNssyZ;r}5PIF57VfD2&@ridf6mcbAh15X1uHVhwuGl`>Z@mRbC z(>oLbsB`wW4d}C|&Ju+lzIk<>Yu|hbz9DR-vMAr^>(ZrZ$pwt6HKI=^Y2j1qdS~3i zY_m`Ew+u9tH6~^UC)rmT@5!z&wYI0#->gs-g0N0hrXxe?8po1BNgASbeE%KCyv4CNkQXnxS%dj>Gu@A1IoWfB7bw^U)dZa1Z);{<(Na$? z=flcokiO5+Vkqjz#@!V4%|O-2$v#j)yZlwr5ny3{Z3>#*KQ zZOc-yFVkC=V|N_-Bi}{gH1NWazd)gP8qPz{n@;D`2@2+uMc_{-p6Ablkr(=-5DtAe z7`a0@IvtPqA*4MZ<(}q4xyJ`7H*b9%>V^Janw7tU#Q36#2Nu>#b40}1@FzH9yM zSq$^QhvUh77w?s;Of(X-lZwqdJJ;8k(0=VDSD=q{_z>`v%$8)$V1 z(f)yQn=B1N|Zpw>lpeR;!8_=FcyGI4}EohOBBpXhG5d)!Y)9 zr6->0Bo0wqQ9u{n{>Y7nSe|JfFtF5$n)Bu!kYLwDy)F z7>ex22Cmf09WP9xYPr9F!x$7cTSG4t|Et0Yv)SxBoTr{cIWc6BUs0opNztzvqAaJ# zSQBg?ZKbQon%ra6muyfjzm>zjScup!XN1A+F$lLYT;o6<=cSm$>KY}TpH_Myzn$s! zxRjxkzl_p`;F6j`6A~qBByVg&5k(T1ILB1JZq0l%i^YZm3c*vO>m#v}B+xjEBJLj6 zZ;RrplmipT=R}PHy>ZzpT9*CeT~`bqOq**Y^6)imPIe)t@gfk3q5tjsaRH zZ2KIi$I7ogF7lI(i^6YQkI0>sW<1w0(E&f3etMxElZ7~Lt5e?A`4P39Q2#vA({uB&h(({Nj z;Ya`+sx_HjvX`8VA5?$5y%^Y5d!$lypQuvPYQxh+P3(t;Xmb#Q2UUFXAkwghClGwQ6r|!3$EX{tT&|w_pUa<&@jrx{N8F3Z|!(AEEFAg zuB;P*LaSAhcR~@nG%hh{Sd-6myk8hA=8Xq(qdr)X`&gD<7q>Y!b|sbZ!OVYMTyy_8 zYoNd{XH_SRMvCAAOY=eU%qW&L9uIWTb`K%Ft9LFPiO%GCW6l z4zG#uYE>flbUGF34TVz7a~cH9H8FCTRBwCwks%@@9Qj-S4sH8qeSL1Qf80;xS>5$^ zAnKZ)tha;w>F+;R)U@hW!rg5FR#5p97*Q39>?XBrxYL|g19^}wUFr8Dn{RXlQxTYJ zj#TDJ%-WsPop8^bznWKtEEV#nAEY}(Um;HGx{>S1QbpbT|TA_79WVsGCZcTkR&7hvBPiPtis-Ns6%A2k2sehl?+EwU&`ioa1 z`YBI*npsN=e1h|yX7RttidV>fs#E{Lr;{G=NKrzwJ&nRy?@sKUR*Zv8q+mo!K#1U z7k7}D?};DYQk1Ii<~0POU2)o~oB^bf0~$L$_m?>VDT9%%l#ehde>az*POVe#)pu$N zpu0AA)%o4>K_@w|0Rr33f9`?}XNsYh4`r$rZNodxSSAMwAY?r-#K~qVi*w3?yngIxfCA zy15PESNeIPPxwFA`N_N^BWGQ|)6^@iY>!kcJB#NF zjO4wPe6DE`t*aN2DGisS(_N@YFGC@?m2-0@4y@j)dmkk96^TNsVd(>UN)L8;E#teiX$`cN>;@$<`far3t8`QCY6=S~Dq2J+v_>)rb%J%6}34NpfC->Hi z|LnJZkYxR{{>XLRb^o|8!*2bv{^@tP|NC)Y<=h%Ay>h#;`x^IuFU3l9pE_Zef)iPV zi(1ZONmNxaP?Xv{%X+bdTmj_og1n}M-Xg9Ib6${y5s;81i=@0!?emkPN=XVGD0_6k zH>w_qjGZ!Z%*`l4#WfR(gLIoP89Y>)^;mATi(N=@-csaBY%s;@AU}+^a}sW4=Xw^6 zlmt~mc7Y?MLwD4jz5T5(YARf&c!MLfL@#InBf)_xuyx!w>p}6EtrwO$?kD>FFn>*N zy%hvA^at_PwRs{R#|x6Kr8KW` zmIT_BtyYXByVy!V@5*7a_`nX3F$vM7r9wd|heNlMnNoVKy&^FD21YOrP%32I8{JM% z0XN?tpyp3rnv25|^`SWtM>}b=RbIH!0~5Wdu?c3*XmpZ*0r%ivWqAN(s$%fqvMjSJq9_v<3i>dXgt%d z%T8yz!Otnb-?{j7zUu9uRb5bPHXpZc?pKJ?~6lpi7iukq1EH&@AojiXOGsi(~Gsh$cFNAVw&Z z4vqqefB?wHYFq3C?y?f{vwp_I0Zi}-w-h1*!$I!(o+Kn3Y`l{vd0CL7pKAoIxp%!p zwhY~}O(^2BkSQlz%(A+9r}(Ap&wN46-hk>YuZwb@V#ZMHJOb?lZwK|(nt~T`$aNnA zD{_B0dBx(?esa4(%Z)!7!oPdqwaR)wy?PI z#BBMY*PaN7;);_3s@kMxBq0%5Zm$#WfS>0#uGG=f*R$B(=yFGk9y>8)a@;id0Tu8E z#U(I$U!AeW{Os0Z=;r3{Wg(<0jDPgdfI=(^b!W1SxIPLh?t2#4$h0(ZKKUju znbc4~)pEeOQgHmttO$N<)Xc_lh&MRQV8q?JJ6$bPl!2lQ=J%H7*ZAz*{rC~5=sR)Q z&yMYnGN^9*A4Nya8z7ZFTI_)2Z|?20p`V6)8pm~p?$C2*-Y74UGKFZgICZ^K|8#tc z!ihhf%_ob~#dNYbMT^nGn~$cW`EWR#pSt5Ia%bKgy7LhlFDAp;Y_=COxf$|jzUsg6 zqwfFL0nCTL{D1HL|E@clx|RF?hf{y}`TqaM_zVVv-U^54tOvjVFcS3mFTE#4WSIL` z8;tIIy}w2{z5}ZiExzh&RaHm_mJ|QS?=x zvTcOu3L(}9Ctr&T_FtlCJrE0we|_@g3Ahem%vWI+G1}|(dhfv-0$yWU5|3Q^W^t$s zt#b);HrV%hFM2GrmhO=&M6tVWK5E3~kDj;BpU-tYat`c9pmGu1WS zQ>SK5o$kJ_A&!B?1pDs-(Sp$%ORKV&N-J>5d-HOduxqfGsc~BCsPS?sX=rdMXxiBr zJD7R@RB;rPHn+0}yXboJSRYR2<_o-|^-1lrytoLuK&V-BejH7h^JJ7WPqmbT1mh~`ks^-C*Q`gr&srgiYC>7v_r4~X6Xp(wU zJBt|L=W7JncM!vprb;A%h(%jJ1Aj@pY$rxylF=vsy6F)S7Z?9T>Sdfrddq?#eE=bO z)Yx`82PUGp6LOan9`f~Ff(6ayvy-2}^vym{7vFt!?Te9S`sSTSbQn?lbT(>F7LWp3 zyN5#buf4zC{u_(6v^##?)I3IhwjGWhGSE_=Rk%*i5@%xv{GoFwUz)IplrVGBG=7Yb z+(ZyHNX*g>2lvwMhz|nH@2D*ptNnA6DKoqf=OSLRG7Sl=RmQtQi~{+l*DQEf*I+b| zU!fiJvcBK97?=6mk4l3Fa4t3gFxQF)9zzw+TH0|Gi;TXjpsH?K6uaRfF_4?&u(8h7 z-r}lS1cv0DqadvVa!j|~`wIv9la4!%HejLF0j+(b&2IUxo}%N?Ac6bbv7PMA&Gzmw z&N`sg3+M9^5p1vgB4g0W)p^@A_W1iueqI4-a)fdah&NMZ0qO7@f0R(xxobq0d~}_4?J&uo-acD=6OkQlOreN;OH1Jf!-;M*w3Hv@7tMov-x!m zk5(tUH*7>Q-}8L&!OYug9jMt>&#^5Y{tX2#{QNPW2G{~ZxoN{euvO4Py$msut*5wB zT}Uk-G^2=PND3p*PQmT(MAdkFi{mN#NgIQ0Eiljy-x?p9!O@K8GuP+4D~)VJ>kq8S4BjzRhrkYB{3W!Fhnwq1j(LFCv7n zu$iUs8{B7|hlYmf^`Y#9$9zu^V|u`2_mdQZCd#stKlXUWRUUz~tg+XfKA2~>&iuo( z=bjhoKkbqQ;DMR6AYC`BHzQ`}-+_<*3ue35Dg?2+2w!Ab{@ziENG50o+B#J16~&V~ ztX<+S&hOnQ0u3}f;#DP`ZVga{z0g1bgdd#liCu-8397^HhL3K@BEr)lJ$AlvfWFL z>cfR=Fx2?ZhI5B`hxHjTc@CBce1i3&ZLC)@b~GF<$A~9y-Q(UK2C>id`t1so_0whQ z(xY#>VMuhX0T5f~m>?YR;qqJPx&b`tmRZ18;$Oybgk^`(amzNgiMDf=v^Q*DD2egJLRzP4L0Hmo^HzWXx%s{rT$Meh~;P9 z-~FD5=c>V-*_}0)N&UK+?I+taBnyTTDx}j(GWych*c0q)@2gu>)>gn}`mIt0-vNm64hddO`nMJCgb~koYv69lq?H z+0;U46)&sCdCJc?%m^)TEy^;7z$O&X^KLOYx$W5-2(|#fp?iD54aQCXO|MOGCAE>r{Vb-VbUlxOTwGMITyF>eJ=-uDL|6gn{;M7obj26*aE-(| z-P8}c`3YnOa>x#)XxJ3hS`6LP#Lym!;HgdO9TkoP%R3SQqsev8u8xtpNK{B;^Uz>L zF;hOB%+`#Wyz`A`2BgTFt$5eXEC6kz<$w`ibo9kV2;$O_>u$Psigjxvg2$}lv}p>A zIaI>Pf~N;Kh&7V{+LVg@yhAB?1hG4e9B;TDxXQ(}&-?NZlH{(;4$!i zkhIIxf;!j(I{{~cTT9*(Wy;*2-O(DUGK_$N7JRI$$OFwE*tPm`J~iDyEDjYuVII{4 zLkgf64($8K(a4bG+_QH(!HJMqXgWQ`mfUV9IZQAi0Oic#pP@ukzIc9l{nyj7-w=Y- ztvGO@weDKe)v|O1MSuMuT9)tROe|uvM!?UEw~(PG{pQ{6R~}{B;J#BMC;d&s`(rB9 z?7R^4cowlh^_0&p^okiEe1?l&n!J8h$pF{&Mf-k1N}_(U%z1L8a^d6bHwQ&deA#L& z-;s^*#_n8vtCGJSoD&1wzVw@|=Ox1mbi=Ehk6Gs?E!^BBu!YQ&>d`=JA6}&0Cn;*1 z8B=)0RPkjIf#k_bzj7k1!MIt0l@HP1_R&kdsplg-*lXaT5pi+i3|Q(D%Yody7MFZ^ zv&Ol~6a@b(bP8F6T7FrXR^l~MtK_U#+ubZRDFAD^+wx|cB|ClZq5GdnEFDNm^?LYK z`0@!PFnY}IBs-A!q6j9+t^cnJzy@>TI>E(g`Axt^ZvhS=JoKt}Xc7KL12G3!U+OAX z=HD7*3$)IL+%c41OD?2p0%!qzMfM)G5kfy0LatqDc!66#u4W-t_RCMurxz?)<2Sts zHAyn?gqPlCLM}o?lxg9-h?*Jb?O=Z)q28rWUKU1STtsROo;}d;9!mIY&pR53`@@(I zPXbgD2+cihHAX{JU}U$-fa@oW=+M>oBnB`*=_U?mcf9@p;rYST03F-zzzDw+LWdR} zcl5B36CyIE%&F*2dj{emI({4A)E<00*vuJdbe+bG)hF)EKA-f|8VwP7KcSDRHh%(j z{q?q+!@Gd-f%wH#5I{j<)@<3`6WX*#6F8zY}NP(cU zXWz;%{J~QsjMV*h$$vc)7Xi8h4o_PT0K6A1i`{L^c?cbx{1Ay4J>LY0#2+N*CCR<6 z1v5u-xQloZuIZ8$Vv_JWWVp!En>Ml3HP9DrDuDZjxaiptTpaPvRoHU?Q7f zqM}bPuMf%pm{2S#!<;zl%(0)V{Z!}`{h^R@_dvfjE`M>>aD|b5BjH=92`M_ETG4FEnY32X43Vf zQ6lTEmR6LmPH8=NYE%WY=yY8e+hxiTduEa^z-`o9K(xfT4$p`UHUU1voUlh{G+=;0 z?^CS>oj0Voqdf^eV}dPEe58zkqEZwQu8g4ZgRvgbBL-m9k_pivQCdlq%mj0;ASNfc z1232=;#iMykL_B}k{PxI|57^}?)%*u?2QME{r|7hyRw z3Z_1VWv9%F!kC1SQ>K%yWnZ^R!|+CGOp@tn!7|ag%`)_o#bAMB*CSR&1M29;`YKF9 z)Qig%d*f8PxCULSU^eWUQ=EtFq{f4&P9ZsDkY_1$G*JGrbj0FMqX10;NX%gq-9&>Z zV8GEiD?`({z`1gX3;I9O`8p}9vjQlqWqZs=liftqDPXkGDJ!>!BV`FpXy?Ql>#3~O zO{)>LlNCpk4@l(5EFWf(Bcze)Gk=B+N#hYw01YfF+WWry12|N=$+Z}DOT=z`=>3@E4krun;N=Im3EhH zq?J>pD`QZFHkF~qm2)v-K$}q46pS4dN0}nYE&2I_M-|#!hMGpsrGSC-YkLaC9#|ad zB-8H*(1zBRV8l}LvZU`+A#?2_phQdwUZ3Ye-CR0;FcGn*vxBQmaAc)KsmUQ_KvT$6 zv-_seRUzIbD`sXK7#V~#z}sGcti)nvb=ATRWT@|>U1#aXidOcnjb2cJbCNC{7jbd0HUOxMs&-qvl0w3kvmGeOjLpx7dldZCA2IGr=~&nQ=A%ITu+ElJqF}oIZXWAwlapE-;LOqrPnqQLDA~ICQf*l z0{|!D=|2C=)E0h_IsH^sF7T&z8^i3nS2~)LD*<*O>#0Dh!6Nj$u49lCH3OgpXm457 zF*7`A8Q;fqIQ03cz0n-*EUgl&Lf{(GHgo%;mLI&dS;mdWGv;X1@JuyzavpsW^lcNK zeTUpt*TA7RHh(L4_IEl4H}D8KTq2YrH>}XsvHPgvLX}?!j=gR7Z_*({W9Qu8SqL=q z(yHnQ$@PY6Gqq09BhKSXC|5lyYlV(FGs$J{oon#^2cX)1c0y_S?w#UkYs&zzqrH13 zmPM!z&9S;UB+;O;z|Abfo1!&ED#TR)J@-M{rD~|TLs5HTqBA3#pB7#x-lY=<(YDEt zfc#p751G!@PnmiI=8#8-=KT49!FVah0zdP%jKOc^&!SZqvp~vnRY=W zYde(hMUZCXN<_8|IeX^vDS@Y%MP*NXUs6BN)BL{#Ae7kwqdnp;UI_oiB6kyhtn%7L~6#< zk|DRjyZ32yStQXML$jq(BF8?_bzRv3HfqgoED@;Q(LK)f=BD#DwtALg?R4|`(FD!C zaU@yM+?K|a|`QE$#DW z*K-J6L6kA!4LS^}{D@(jn<#5qZp`Kw^zK4PkIJ)~$kfIV7HZEsKyjh+8;XPO^BZO} zRx^T1N;zfs`JTr5{IXV*?h*{IGoJ5meX3J?@ZP}42zz|Qm!l$R9!GO#{jQxM**hg! za4UI$Ql0Iak1ZCHT7~J*DbS6M#x}`i~Wbp{ZDsS`Y{Mnt$OUV7y%VuxfU%QJLEw`*I zEoPZDIDI=lr!&(m%EG>5s8j5q$ar{P#c;{AHD6!0 z5N=s6?U!z|u;a|k?#BLRyw|;^{M%}u<37*6qlM%eh?Wn3Z^ffvfNS?x+xV0sB${0R zW4^*&4Bt{0EKmT;wsjk(TFvReQL-RgBXG>Hj_3`=s zXx-iS?e()@$ERR{<`z&5o{0ZB*q?q{h%vn6vIs^{5!}+Y+wG{=e3gTsF@LZOJ{su- zu~?i2X7>AO%WimJ&1G2kr-#Foz&if6vmRGGy)K3Pgo$;0p=QdDAywei4-So{IBS1W z@n51d`*37hBobAeek(dd9ZarTd@uC8m$J*c!JLVza~%$?3g0s9Q+A5dPYP0~llLQO zklazZTMJd_J1(Lo)aQ2;!FXYaEq9#(LyP?xTXx>y8TyZd5{z>q)RS2dyrtoMkpvrd zB6t&&2;+J+$)F*ar9}=>xPydS@D1k#|;?*~7WPE_rekJ4%Ah zSsE~+C&7~_T7sv1-KSzmv6;22a97Qp{t)1AE`ryThEC~)cSsZVlgd9;j$|d11L^3+ z@nT$xvcfle?1Z5lf8fQR7i9@>=*qE6P~(oG%0waKD?XA50ZNSJ;Hhy zUavH1nlCY2aU|19*_g~pP_vlavV`vz^Wun5(^KtNKZssG$Ydh(RRT20)6yp3YZf|W z8om}xxWG;&T1b)ANH1Zcm)koMt^U){0D0%Yy2)OS<1)tl&gdpv=pT^Ae8Z0a_#Z=+J_&98~GzIQ;bt<-IG z$XK&>RP*`w0Vy4EmTd|vOSFC>1em!Jvs*#SFuUPW&B#Az$;pQD_ZwHP!M{)vH-A3k zH!h@*=dw%h-r7?Gx>)ES3vwa^yS{(wQ?rx(28HOplnja3?#0RBYeVclpBjy_E+lVU_)`z;VbF;t0o_Iqu$p+xh&SD@L;ZDZHI4+1wgC zubwwCK~r3LCR#2QF{$>C)Bvuxl-#LLGxtVeJ>Ev5TF*cf#eLiPFtLH=&LHqxh`%`z zm$BjLBKB_%ZAt6!t9EU_LQ^fGMWWmBX0>YdUP)ImF1$l#fV`#xqM73<;|+hZ~gm__-XVSbSN=C3h#|7zMGGwMhwd70WFR@Ff6PW?fj{HHvNKkC_`sR+E7 z!>lZlz&PLCJW4o7Z~@Xc4~9yJ)6|{OwL9$cHJjL`H4R}%x2+Y`a!k}x5;YOt1)o+$ zk#Bl$Ex2`Sw7Jz`w3M);c}x{zezKjcX|O%H!Ihz8ffqa3H9o8=&vXp=4DtTf&tt%q zbWlyUGZ~qXTi%lP4f!OthhwIZQKR)!WIR4AQE^0GdYToZ!DkZkNWT%yoj-+=hCC~s zy?&;3fZMMR-oOxv-}4_V`pvgqON_HSAqW3gTx!l3eyu8%054J>d_`>+vbi*)=x2il{i4G6O4P5|za}1Lw#>$Oyy{44jYx>je#O^}r2i62SkP zBX@Xdd6Ksds6nT#Pi-DyDgAqZo#OZ!QCm;|;?Cg;STB>73J4$tDE1`gE-;%t+#^&q zMHQ3eMc_Leh_s&l!;-L<`MtnFam<0FEvTTTgyLLGFb!?4NjaRH#@XKFI8*MdSlqZJ zxQ(hxrlS&+=Eip-=7Rj1xD+b1RFvi|^iT6bW?Gx5!6*H<&L6h-Y6yoW#hrJorg6DogsR z<4CpyiiTgBY@8aU*~BRc;GD)}I5!SU@V5lY!yBoW3N&2WPGv(mo8~Tg6c|?tBjl$4 z>@r!dT_0s}M7DZUGxU?av0{+i@}R%OZSVt zijgiG=Aa!NHhWj&xRPpS_xB`B&%DQ?X<$Wr4pg=D8YUn-R}X`^E&X#h59{YchSs|g zv7Kv0*320_E6R^N541{t zN9`M<3o5%w zbv*{mVzJ<6&S_BdgwM&|@jVXT$HSEP{KOBak#=e`JC@+Li$}K&iVqzX)+Ybp;F;$u z{H1mhv!967{QEK-+Y5M`dtMdpIsiP`U2z&>L_*^$P&ZoeKX8y$Cs5^kFW&aW@F%=z zurXfa8CyW*DIi(g%A~C_Y`GAquQ32CZ!#}46c09U8!tGEKT^17;+yl{yVyYdzu1zO zZ+lE7(BIy#P;Oq3FI>$ylpectufwiLh{WCt2N1hWDcynz6t(@%-*>DKFE@CdaM@GZ zNa=8nX;<$$&8?B;^ex>3_fdLdxXo{@Q*rX%jE?`hJg4F19*x3fT`8}3uY>nYGw$m| zZvBL%a-A^i2zB#gf;s#TLBw-ES|sW^ggi#;Gi3E6N`fS(fcMY~?HzGk8|@;nS@l~m z4nf}(hm%4!^dO!Yu;Mzh-`AAZ0ncoWQcTuHQ>NaOACx!J6~Q%5`-N5zgI|?t&L-sw zNXWDf+qt!RrnHl`c+dZS`Mp!f@A)PHE}URLpXR@!^Ni;l&z-)j!=O~1Qp%^(=c5-( zB~;WVqC3Rn^V=19%C~9WI`Fre zvBKp9+S>K?bwt_yqcdtnr{MsAZUEvB=uk~pzzZ^hb{)d!({Ji`RTP?D(4hp1h6B_) z;&kRQw8qJ+=MKAxkoIf|qaU!goGvpbpZyvXgz=4Ya zpGH#27&1|K~kFF>%T!|!^(D(N? z)QJbRmzOvi@%;|qZja?0Ab{HYsagU-&!V@jm(I0M9G)^p(+RK0Y|z;O`w>Y~fv$Y5 zBqXnc3=AfL4HaC6wp=#Dhu(>Wn(Q&ALhT(&4UYAfeXROWF@DB*Gdlu}9>9+^cUOl5 zMZXw^oB4m@u%^GgfJlYrV$pwN_@Q-u(to~cT71IZzb?nVru)O(x0&C)2!8?D{w)^V zPm&p z*-3^0oc)VQ_T!h*-*veNkfCcgAtPomq<&49wj%d5B)k#c2((~COz-(0Cb_04v|7yu zeV~HaOc$d9N=O|Qo5#g7VQHXZM+SN91>%N{$aVF4%Gk|bD93exG-i3%fC($ZrOx?JzU#8n>#>oc6*p#rco9T& z@a6aSdgCW*Z`^qIS`Ye~3Z*_~qjNIEx5%gC&80fY%TA&ERRVb@l0y)!wUPQZ^6SVh zCqfTwCoS(Wq-iEHX8@(^?G-z+m-Ho-?vRB_Vq9&yNj{cgLy9_58yIS;EKgry7oJv~ z*U>8)iDJS82sHw?k^CkWPbj9uCl#@I#2M&ZT9`ZIeakeh%~XsL0m0KO(`_aQ36nad zM{NRL6}3+#61v-t-0wwWww8YiCsCac89oPWm^9Z5_BEe~(UCU@TmEj8-$@} zHl-9Q9e&t=$Pd13_n_#{Tmz4(P#oXV^Lo7gzi?#e@52EM|$ta1r5RT=c!1mP4ezI`zlUXTfgTrVBpWh-```iclHkik%Ukshi? zMgQIU#*_yVdAQB6?eSz z@BH=1ICfA9h-_@T3K_+w5}sqZ4^1^vZx{?`%40O=IZ*OoQ(_zO_3Tr0S(S!t+CKsp zBsY84#%faTejbpgj}6;Xn;LIyO-stMT-5eXCMigzxl^^%{QY=k>u7R{W!D+^e7uB{ z^xN4cd!wi1aYU?7Yt*l6yqCMH z_`A3#BJo0b41db4ov(>zR-!0)k}ZmZHRDmpA+J6c=Q5yyu(#LknwTm?&!D|z%0SI< z&IJ4_WN--~Eeo9B%961k%WOWeg=>guJaI`6X3JJu-Ona z5WnteN2zyVW1QH`IgO4bHBkQaxH1Q$1MnWP32qruM zrGWMR&d$_aOA$dghXCR#&ImaigqFE%h5Ue0XWu-{p?dPE-y$H+I{PQBK;F%;9J&M=jjdt^10Kd$vom zU-<%om;&9Jb-cytDG(fnY7;UNG{dhrYS4-=vPYX_Z@)h2zSbflw=(<)x_64<)!UpxkxnEBHUR#4l zrL7f-6oEtn_vU~c2C60Ve>jhHx=_Y%l4tT28P!-vx9%yWG_rjq zJPKVbF1*8JX(x$QS(@YkI)RQUrS4js10JuOe5%(`*Kgdyln%y<4-bSxg#G9%&UcOT zn*Q8wNGmlII{%uW;*H|XnmF(S>4GkgEP1Q-F7lU?$`E%Q0A5+p6B zFd#6HSKPImd8;o|87z9&Z#PFZx#!#O9*Wo(J-pf^S-iFGXJ7mory9xslhETlWhUx_ znJ--MxX*Wsy?PFZ5ISg;b1IoDT}8?x)4TwgK1P-`NcY6)BTbCSUl#|pLIr}XrO;^ifatI!IYB=X`jR=+ih_mtND;5eYdXWb?|Zfd)@w!V1T7Vav@cU_-y z=Mn1mmDT3AeCs${;U~>`e&3j}_R+S2o!+-?-}k8Uc)*7&=Sv}OV^YfCPTHzWF+byF zKHoX52r9499H^?vFECr-(j2xv8%I9xT0y!haO$F5Q3u9uGc#zQTTEK(I6xG8ht*=4 zGlj*`J%eBHdhT+Z4c(NtILUqw(Ct7YX1>Aeg6_6m=i{saeFT`i`ql7ttjWIPn<~m$0EoFI5ajgpN zNx#Xw8aJ-*PU6mCPx)L)6}LR{>3{7${s)8NO()0Z2GyFH(ZSxe^#pYuU8 zfeAz(De#~*jDYYEu6LUEnQfvE&+CMyd?C=&32_23=pQqPcQh~`j!jFbF;{wn1c$XG zI7LDfRvDK@CZ>upin$DQ@5~1Jz1rW+0j;<0nGuSEolGrpDd^U|2BQ(mv>a#ND5FSW zi)N;c3C_M^SAS$cm`8^sQ(c38{7;_&^M!#H`T2oCE`*tkzvsieaB!fv;HGd>^mHF{ z9Ra?M;)Sh!M$cW1#Xl6^?vGtKLJ_(Y3|hc3Ob^77lpfA1`pG;9ciX}CZhf}|2J|i(Jhnvse z!jB<_(E(5ACG807uw@vkC(x8XpZzUR&A0J^;K%qQh>V6Fwk97$*%15s(Sve>25HQ4 zh;t^sOyY(Va1c;8X#uV1kQr!NzuvbaweC{Ww`jRf%@4JL>W3(buQN<@U!BuYhz7~; zrzN}^C3zAF`p5n@rii+=%8<#1eHnCs9(yRWb8nF68p`(->AUhHrjHH1qvoD`F%u>o zYH>@~y`QnH*;jUb|F)6hQ5=~i5{f7Y=NAVW=myujfac~zZfUyjNM3!W9dK6$E$d!* z-w#$7T}<|-W-OiTcvrxMC+g{|{J8?rer=`^d)~#^eQI1=E4y6dF)$O2{Rq}V(gt+# z^@Jo+1eT6?Bb}*iHdN1=+)Oc)UHK5PdzbI0d}UV8b7rJX7dyX+LtpG9KRWV}g}oP9 zBL;R8itnj~s4X1uV}B<{;tAK;9jT8vda+JDSGn=HL!{@0;gmSajX zge9hlMwXy5jF{y^+N>7?@|&k`N6;b^dx@Z}8kI$ce7x=;V@67gRW-FGs)om#m-6 znXDBTPY+(@Nh2##wb;GHW`Ap`QK){&gQ!}yBcgtPSXuQI>e$V2u<*+v>7LtLZkgAG z8K7~W2rE>(;(j%9ws zXM)VLXAqfV{&rBnz7AE7$Z~Tmi|gFMB2qsH1o{AlK$c19f6(WM&pX-b2`p4aTyDEY zKqsZ^JRL!Wru*Xzw0}wWRe-f)(N&{i(M-{X5WxuO>h}VZ7pR&-*O`|b5f#IY32I~12YInH;w(Tyk}4}ZW_XPn?L z2j-YBT{X5@@ruVqJP~_1mj7);auME(og&)%-5V&XvM63#lxNz*Cr^~Y4C5#iPIx8n z;&F2s_Zee|wO+$F*6PL74E2~q#>b+a#j95oJF4lHrZK7aZ);A%THayZCP6=QqtewT zMj;iNLP@(~7Bp5_6d(S6eH0#7mR+PNB3hc8LU7U721XC9ke6yGuM97zm-Gf?VRq?u zUoi&;yCquKMX5KuIr)Gkm~@j^yzyvzetf0L#zGTf6hgUlds?XAdaOl;%4?S! z6jw1A0?wrkjXM5a)Ye8=Rrzq(vQzbZa)yQNEf0`}!L>GZE@HcS6rg z+>4&*Q40pxlV5QM2!77qkM{!+88i9a0lv;R(8Rg<7vH=511dV#h5ZB4tgkbYcM8>A zULHU0QjV|ki2S`gUECf%50_ReafI{HZf+lTV_KB9^S66s=_qM_j+v~d4Tzq3-yB$N zX$7Be$K@va_#KeMMuCwIW|eW2GGH3l%mBVJRh)ueXR!&RzLVScI1*9`3^uP8gBP+z zUHiK~wKGT7n|682>z!Li4_vh^-V$6&VTOPyHDl_W-~Ioq>zbnf<9%}8=nc%766=~e zw>NOS^U2Y)y1QPnymR8tiSW%?`CkXKM@er@-d$OzQ}T`$m)nyZL{EDw5$=NyT2dGF zijKd0$QMlkqB+$5{#;6D7I!88?+mwJ-VPkNlrH~||1X#Qf;Q!jIk{ML4L*CJm#XJS zn{-{C>$+WAXAc^+f6rtds`3^`ZhgfT2(oMc&Q`^}lhg_0HxK332}duk7j7Xxc%0;b z2{cU_1mc%-`*y9KPi?iBKfXf9{MR*beC+0IT*;R?`>*TM_!O7b^{J)$Uw0*^%W?AJ zfjY%UZb3I&xU=Zq~tte5L=_D)RqYO^VihX`3v5 z{l}sJ8WCQ&+NaCIS@_ThA%!!Ov`CuAc>CcJAV%An5}@r5bsq8i7Yf|r?*)8KjtH;3_7R#eJZpXX~k)3`0&pk(mW5<1QQk* zRD{sbP1aUzie(ww5c~ZZ^P}quO@HUL6~_?5vb1*HYDQpPEqH5$qqmMnoh;eu39ZrR z6=W5{$d*_NtVyKJ^nX`Wk*lv1R76tE4eyt_t?z1v4ClW5E<9HwZ;-l-B>*gy)vVUE zV?I=xbt{SS@d*fR#|R=((CesI4~b)qruZyo4qx%*zQ$(fS{)=bv0`CWOf&#x!i&z@ zBUu&;$)d{2Wgzh|6GoINoERo5#E}#tqKkGwuk@?jt5Z%Eyc`4XwFge$orUzKmZV+# zb7$S#7%=z?ilxJp(WT>^nV8m*X8VB>XbhAJ;P&AS%D=v<$-4l4lw+R_LkIG=+k_nI z{(pDZ3vx>jRu+;#mDX7um?MEd7X`i6RMCjL*+awi8Hf=;1l$SSaN9HXH^X}$Oc}E4 z!eo3{Gb?EdDvnt#HIC3sw^$M}XcadZDS5GmU{(pqn!eR<+k75uwfOX~M{^7!9Ocbc zc-iqa*o!0%$2N?#F?_MRuT^y;B-*{>dv)?_#*3uEqP7R!@i!Ym$My-m0D)JmIB_`U zql=1=HXjA(#B(Xq6CXRNKqQuN|G+Y7*T~u{|+OzK`jh!4@4R6C2#bo24n{YyVZvnR|zpHz*tF&hW(g&u@jH{Zh9`C33oln!lG<1PKveR4Ni7zLJYmg21ajuy1yED@6LXUqR6Aym0C}H`z zc!B83Qwz>-!3TBd9qGkZ6(AAOB+ENyzdLB@-|WgFt7T9* zpz)M)#n`p&PU(}!8Z2k4*hsFpC~9(Ph7nt6Xxhx2jXzqtm#$aU{K;Ix%391?!fN}g zP=C6?T1LcK3_gM*B`J+TPKZqOVz<{A#2k5gH?|);R;jcIu2|JG)s88cd$KEzLj5W4 zv^OJ|u|h_TR7v0b+%!s$&BQ$cLQ9ISsE#mdhElVEK__>uj%C4*LLyI;>o-AF3kvwD zP#u*rpR7A5Q?b0uW~^vn2}f$9e5=$cB*GCIHI7TJ5RonN6If|gWn)SewV3#GRarrQ zSs}fnbv9d9O*#ToJGBym)46_m)aLGErSv4EisFw@KLKhJqCEjT89JIfzhs4=Y!M0j`cma}3v6UO<?`=@>zrYSJS8qyxC*u+BkC>M=p3u0BYRZg^6>qI%BNX>q%vbdQe zbnOyVe14NX*&w(qy(Jo6ig2Ft2;oFYWTXW}ieMw9Fn^<$w$~ET8GvtE(@cnQ55hYC z2b8;M>W|)XyDuwlKGhQb^T<+W`r)OaK4#BEzK^`Z<#apjfruefvrBYi^8Mm(yXv{B zU$sY-XM)cY@P8VV?x)#G%6p$3qo)iBAJYZ+nm0A)kMdTX-+NTyq`(kGh;-i|Ni0+i zZpWOT5oWMZZE6v$u|qc*1TmZV+#>huH225ToFI$V>A%s4D-5qn*M8h?p}Y6QLLK$r zCfxIkw5g&WiQSGq1oy7ZBtOpEGQ35e)Fn|$DBSCHy>uO&Syx+$TtmE3O+)TcjIF!V)vPJt4bJ0x79zvYWPN% zLnX1bf18XAbTag}qQ+#*_Is0EaK|2`bgLCEMA&R5d5*lhvqj-Ea#CH!kV!oElaov2 z=B0E338f@?hpd5;jJ|_`x|}jS(d4j&G)GtdjzcBNETCmATUjGrDg?<9yGwRzJ$qlk ze6@2o4QU(PbixFVCJxU4Voa+Wbn&4uGyYw3sTwn8=Xn&zua5_l|8oacoDbQ_t^Bi{ z5btu_dOK?Jb6ua08!f|f$0cL52>oa*jw${+aEggs@ht?fe1TsR>8!oR40OItw>8LZ zp37cIE*i+rpc<>Y$zBOL>6;l6?CSLMe0l#^n!8zl(!4@eVoKvC6Iu&&e!ZRA+C4ml z$c?E?E;!t@js{C>_xvqk-VyJ~Dm6fWBKpilW2Y)LB_R5%5+C9J;FbT6IdNBCnrJYWC}dErnBk zMP57QVNxBu{oKHi{fM<^(_qXOv#?ZkxCp$yNV)=1L0>$X$tJmkhE4(!Piu}Mc1%k$ zyat~QixOxfo{oyq0!;lHZ*B(%hr1ld__eI!*Iog0XUTo%j}&DmYbV;5bgkzb3E zewr(Ao~)RkSwe-RkSmu1Gl0wjk*TD_e=|-H-hc7X&m9h9>wc({c~59tLb+W`)hD z^kDepFm!SuI9^I7j|Sy{nfMU&&$?l@cRuY)U(2?c^*65(x|RdG{i; zD%2tjc-k#V!`6iM^$L-NOrB*kj5G8Qd;+nw*qcneaG6L_Qtc4vc`UWy23guU1r=k{ zP#ay90l~#hE_m^gBI$z2q?!p+1vS`Zac!}ma|OV2s`Nrh%raK4WwY;MGRY%kc#cDC z8&aE$O9j%2tl>Xp2HU~w9V)~_Dq<1QVq(VCuGo|;m*bzgcBBQc-mdmYA!o?NT`=mLuCJ}jv64WbBlC6M6v8?HF{~i+FQVQ&W z_c^2c9>N`9LnyaHzAC&}X_~%DGx-2Q)0fqozMRSr&npyz?}VRzpf^-{N-wK4J-vU1 z-Mj&E2AzQcOa=ghZvThNy~Df4F3;zsp~mB@nJYueG;}wl3L_dgRMC2GWpj~LK_Hop zY>xVBq#c0>)-a}QA`O0acs;y&2^lP>{v2EiiQ50i*jq)#@jYR?xVyUt2^!o98eD_B zyA3V_1PBt`-Q6uPxVyUz?(S~+`2W6han`vyH@kaH&zhdq-Br8lsoHOU5nPm1n7h*u zO==wnvrLPHHCDAvFe{bC?QGpVHr9;k1$J8tYg!Sz2+R-iKo8gQ zS^<8W5eMtZZ_wY^0z94m;m%JTf8r?S68T^5YXr2?r7_{!Ya`etUkszLZ=Q3JY< z&+Ks>)7RIV2eSeKcPQ`P5~k3-is7(+!3 zSAkPLM1F*=H27y$x~XIWLY|g{^!&ba2JQvkf^U%Ax^nlQ_GR=BSWPHZnN?F*#SJV* zr&TE}W0~vwDwug!28m(N=6%4}lEk7P;+-vl zYaK-vo@hkqnr0^g60Azx-UPB4zc*lzPVP`fHpoesEQYqJ0(rX7L)>&b7Z;zQ6@$UP zams3o|GJj57_ZHk;~_fh+UkwpzQ{E=YCX&s1Bo ze)VciLVm7nHOXP_q&z3}uexOtEX+3pC9>rXkVXu9VI)O398q9|=2}>JshVVvU=cyv zpy1Y;>llf3eQ;6IgyWa}CRb{`D$Cf^d;7!?`D3VB@o{$kS0covOv>A%lq-PVe)mYoC7-0j`HE zz$9;b@uiZ_Y_UJSmW;<3xVC}enXs^>&3a=f6b&ro{&7*CI6yTnR6SCMGX?vLC*RMC zkej%pmmSkwCg@*kXhV$ilplLC7LuQ-?VaJB)1bVqun)l9FB{W&EK}D(S^`6~IS$-$Xvgol>2erwW{5`7g$wNAP1cOXZ?-%;mlmz)lheeD`IW^6iS-)i z#n{Su_DPi<`!z|Bl|{*hp3eyAukPO#W*RD6b9BsEguyGaGh^aOeJOECq>o~v&)Gu(2Uj7aqe7k|(j0JfM3ivi7zYgk!k zU!CZ?w5%|$qO@lURCYle#PLT(#E(%EyIv)y7MT4x85(dO`aN%@Cv89UJLD=^=F(|R+~CO~ zTNAxspayXFe!C+!<(G;X~-O@{py@($KhDGXo))FInH*Sysz;4g$@e>>Qp zQM)-yd)q#LEqKlO^YuTkmE9r2x7s%ZpHgGc4*VzU>rF4Cv?(kk5byu-%=b+3AB%j_ z(d4uyP&MT@RczKG?hl?1fP@X!{Z7g5fL#zXjKqjub`F<}%?@s&9sg$1599!m9;kg* zZ>}y()5%{=E}!-Ug+Q_T>*w8tLM$^hb(k#M`*I%9_LBIdgpF%!p}5-Zp{0tuduMS3 z=Z_Dc@#W(e=T(d2C43xx?!Rw&sw(tDB3&)9hWhOroBkdz7w_96x3~E4dwtiTIfnYe z{_kR~|BiG2%kkm>&e8k31vyhn*<>RAUQf5DDVGCtkNC55Ao$Ryb!ZaEszf8?6rFHD z25vxD#;I8ey^!#sr%;#d ze7TbWkWtAfZp$4t?A>VtUYPiR$(gKmv3d@PFPwb9^vrX@B4Gu^+oJ2wF^9H9DdCp6 zaD+i$^XPW(&I|A&$Op{M6jo9M3-XyCG%6+DvUy10b_5BlDdsSgOeM})jvjOD-=zUw z;z+#$L&WwMpjgYF4kULyH66$dj%x2H?S zkJS$D%0w?H%@y~DPhAe~_*_2dp-nURTt?xfayUzr(&y+VjuQ^VlmGqf5`<_-iCWncdC0ar7H?I&}-*ei|*cL_Tx=J1qEWy~E;crCZ{0k+rOfs>iS zmWnwXB~xj)bfal%R%b81e8A4kLGkLTl-u*Yu@MjnusRcdEJ^JF>hs#7$I{XLgT3Pe zeBLi$bf)l+Nqj9HmT%HPzf56~$p;kG9P*N9BG1opDrW9*=o#*27pI2&uEqIfjTh*U zDa@moLtJ9+kSR8|dN|+}dzuTl-#qL;cG^r{Q_SOF1lnE5h6ed^9K|fRiwXYxc9=mMc zwK!cIC*Q@JPt_Rr1EIZ~Zt#U)NqB*1nY2t~RPc&^O6Rwmch8P5Z#@2~>Vd-lCP0yA zFKax&iwxmMh4qe5;6{e<<%Ij~M&jdN;X{R-+k=b|FEwGD7hfJ=XNGXq(8KL|Voa;> zl0weuK@2;6Q|f84lk%OH!;2sfFgrtdN+IX)K&dXNaLV}>KBDLT*}gNJt4z3SLcFYS z%5m-xbbJebleq!ooUfm{fbUxDU)H#R4jG{n_8gD)b;A_K3Tw?diiD#(7)U#t^2OA= zLs{~3YoJg_;}WpQHJepzApwEljzww z+5Q-ho5Jc>BhZUzRF>P1PL4)hLedm*0_3)%&Q2CEL=$s+{|wir~AgwWY5#|S3bt8T{Bi9 zmK-8V>?CR3EZikoTFhc6Nli~w5^^qQ4ik)mIaMSG0)Gf+JTW0KEkS;Q242&L6KuBt zoKwdJ7D;plZ|NEFKO)$LPcBo3pM1_;+adW>sVm##`5w7n)?k3?!Z zP!LZNm4ifs*rm)R^GpZ2krr@*VcI3JDIoM4`RP)$deYiK zJ>VhNgYjmt=|4zE`w8jnwDw{|4Ir zbOkq4i8ni&gvU~1ZDF`UdZ($c|33u=PIPA7Eh7s3P05fD2@^5sC@x8kFqt6)b~6mg z6xV)E8e#%9v%P9O$6tQp1h+9`Fm15Gqav ze_^>vhbYGi+~f6Wt<89u*6HrjhWQcy{#a`{*!-VjPuzaGR!uy&-gM;%mP23`Jk*aS_L)*;vgf&(s1cChQ#q(*k6qajCG&Z+L zT#zy+CYM)D2F4MUCU1ecW>iUg4uqos&;8EC>iyv$9(^5c+y6|MSt#RX z8_mV0Mu8VftbIIG=le3&v;O8DIeB2I?iXv8Scb{MH~1g^CcvB6mWbbe36K(ZqeoK3 zsz2sT;8A?X9GMf&?j1ok6yKv($ZX-+USpww;=p#A?0bo<$A3Q*telWe+&7WR*Yj<1 zYOL&<`l(MyUCL1@-P$9sPeiP2Qe2AlyF6W(+nk<|{cCxZaHv>Z>i;BS{+4dLB(MFO zsZWW+OR^$t*kSEb8Ml#{F`vpr(9M*V4sY5{89lZRoapfRtXupwe7Rewh)5_noZ8sF zJ#-xILG1Ls-Z`<{zaP6rckJ)zD0#e0(U85`qQgo|=$LySJ1m(RUbxP_alhQ(2j6}s z*zh|u0}BJ!(3#Su@wq`cmAw{zfS;YZZc*G}lKWi-pmsae7!1TX=SjpaW`)!9?$e#& zxj*3>Xf^gw#)*T6O%TCLp19%Km-LXcQV7u$WZNN@7|Fq4?R!}PExE+x_@x1f{K|MS zc^sii?2t6igc*~y$p0;jtu?}#9iI~86uzNmzaIg6lg3GYJEo)ql(RhVHhw68*+rmG(;$QJv%IL1rR&`Z^H{DNMWsZIA7JMj)=F_ z-#v_4-bQl&(h_m=CjrU5P|!#}u;{0#MqN|WVBNr#v_*7_`68DK?O-C`^?uM&;3>k` z@$VIE{sQ-lx1R}3lb_^l;b^h7sdc!Q@Mr4DzQm^EQ;#ZfG z%_s_-@MMvgzlZZZh)=)ybGWgJF1DA`y zH)nQf+M;t3--zYL{5u;JG~3dN)dbEvJr!wmFDZ!N6_)yQihKx8G>T*J@-tmyf-_X<;%qM7yx;=wmyDFgCjwj2mhoQFjWU-Z4!@zbrdm>@<^{1WG#ZnaZo() zjOBttl22jetU;44m54oTW`py_&IhJIPGn!xIH0pij$pcW$R*qbFOF&o)9xR-u_dVF zpXy>}($JT4vMv`@$+QZ{z8p1*j2QWv)vp&^F2QN19KTL31kYwW&o$KNr8{rkWkrBG zc3njW6GNqH;=uzY6{1P}zaze~uj>xEml2{^W3X=`Rqs9nt65(UHl8IjH#`^U8;e-5 ze(Sf9-S@SbVM6E4u)2WrqZywTyFT{OI?6z$%~C79Hr&Z_xx6}hq}r;vkm6p!VS0nH z`1B^c&gYTKrle?X2DosX9EIVoo?In1Qh;+;Z@XCyc9b4OF64-2`y+h#}*d zG4hPPzK4fH{%yR%|8(!%Kcqgm#iVJ+3b)-5N5$jjZ?Tp^-Oz_#l!}~0Sp>!#zOA?# zkCZeU*|A?{ir6PxdQ1ep2k#P{9rjwFOYFm+01iCBB{x2Mx&Ea)2RSMSr`6=J!*Myn zh;@mzt-qw0GEE5{Sl>eD79W_l_ge>KtMkvVTG781t&y#SFL4jZgT#B7tz4p(fK0yO zq)Uf@PmAU&==}CKvrgb8^j#uHNi64Mlt+3pn<5YwQT9)P#a^kp*H=gkwb27EHFk z3yNZ;#8tUWQE|N;1~^R`qYFO2ZCg4x7JZ%@4oHPl8%cWPLgPlc^j@2U@fbOt9UbzHW(+QS>r}Z>PBTW) zu<~Uo^YnU27>#<#!e&<7SffTA9X%(z++d0FJeaaNEHfJQuasZa`njXtSWK2GzP%2t zRMX_Qm6lWLtK9P_`qGIiHlxvw5ml(!=?B&`yUuf1jLV})e7DC7uC|3QxJ_Z*Kp0)A zICM0y?D7}H79r~-^gi%37tyz6G0!(&?5sbf^)!N0>!&uiLxoJseZM-XY6F&#{Fe8o2Vgho9d|YItZ}GtL8*Vph=b|I?;%Rhr9#(xCF0>_;vI5 ztPQ?nU#`ik-Ol=zdf`*9shO-4hfO3#{InHt$xi*5WnrXN+l}2$dws1=n9F7(K3DDc zJ#jOQmF9NUe(Ht&bZHzTr+!7%<~(k?_X4e&4`<${)|q=S1x`fy7_+X<1RzC)z2?Ut z0H-zEoC$g?g7k+pR&246f@p?D4RHlCA|Hs)Qr=9G8bC+sqGc~SY=tL_?o2@wMujQk zV~*#-h|PsvDlIUs(+!0fR=QKH74?~Abk|@Gdj&<&k4Z=;@w!KOwO2`j#^Xvc-Q38& zGAxC3aTWHg5#2;^*X)ran8?f}5+xN%g4L<0rEN5@aP76j zp$1x$=-K{JH3hRblz5Wy`jT^f^15lHf4!7Lrk2-95&|eFZL0pb;BcZ z|MGS>YWJq+UXJ}?t=Te8s)QBX8nvMtCj;rR5?#ux3K=%=$KI5~Dk&O6e+^iShew6| zr|()YL_I|k6BvLLPg4=hw7&9hY$L-T6h$4r``Yji$uEJYro>VV5ueqcd+u~uai?F? zcYhhg3Ms0*lS;KhV?NX|wD|#qkp9yuDeGS1ljtSXB=a*50SCz~Z<@?cyrlmpngv+g z1j+k@urAdcTM>!uxKF3qH`SA~W?*XFnBYb*jNM!ooxLS#UJ2}ow6B-{iang}<0WX>ye7B9yYVl)3PFT82>Zc_Hc)9KrBfbJ5+-eC&^8quG-Z zG@;q7bHmuV2`X3phAV-#g|J75|EgcJ-SOm>+d?|z!Fg7j3-Cy3Io6IHIu_^IYWu9NeHFyWXfF0^4A3v+T*#;4LN#SFfkJ@cr!rMZ zKFGDz=I@?{lwd~5A~JFjhY>RqU?iZbU#GhB;vc`+Y9lER6i!n^3Has^!eqni@qBeT z>NWd(F~qQ&)lFK(&P~ zS0czm$(do>`6so>yCKkEKi3j#=wD$F{czi**U1g%lw$2knW z(x9sQY3Y)}O4eW_=yb$DO zWAO<7WP4MnToD6Ba}Ihiw!K&#A7FDYI4wYY2qIe&V`%Lb5_SzFWG8^VH0A(jj+_rK zcz#{O@Xu|yLGV<^3AesDAbEHyY6+!psiubMw!zK)`QU8~RoK_<>7iS&wY^2S2Y$#0 zpDxC*(T)LDNr>iBgtYzN+x2~v*Po5fjut`As-+rq#Y`|WQpfEO6eG1j83ve3P= zJ5;~hi=CZyLhgsD$<4L)*Sq7Jv1=|bOJ7>6%aiL+v;Te$Kjp{X2|`EP%hfgXhp*@R z$W!nHk0y`fMot|1Wfy^x@`WSe|4zGfkfJnnw6k^BH?RSIPk1Dsno`{8@cZ{nO1p>c z^$LTFk)q1xA)Tzw!EQTvcGFa)uMCs!UNHKj{(W@8!|W7x!DIdv7U`^tvZA)%^K@d> zyP;{LvWmy{bVBEBLWiCWlwDaxcZz;85`VE$g;%=()uhv{fxK)3IrcZ8Wfo8YWv3n> zQj4T~M#3Skqbq4tfnbOGtBR^t9Y!N1P1nt+0_{z7;n#FQcr?G6;%suBsacxZ5_$q! z-Ot~*@m)(Tsjkk)F4Uk)DTWGbMvT?`DwrDkPGPj`MWT}C65tU zk)@ZQu*Cld8ndZFhX?hSj`>VDir!CoGQ#!)EVC5)%3|Ut>h5)t1Y#jmqaLq0SZW3ykR)2hZa(myp(s9CJ9?|Cu{2jpCY*Ejd*6e zy&yhW^eWQU;QG>C6)RD5&2bB12c}vfJCR96_jL0_B;59zKR!t#X#0D<;-`|r#}#O^ z^((#Bc;}u*AElFt3Kz7&mmQoBsXc!tG8)ePb%AAP{@S_YVZ-Th-dU_v+I75OFa*n) z^?W7bjTu3R{ump6J_|9|54%8IjEviXiQZUTb_h-susbudXR##HmJUlJ?-#Uz?kjm@ z;%v)j2&WUk7zc!9tat^UVX-yQCg@L!kmBJvTrULy^d2GH53(Ej9t?i8?Pz4d3-9s2 z@=HUV@F-{u06yC8d>pR>DYzYHen%dR2j|H&EcZ z0iZx&vrk#YNG;x{AaCgx?{=^2L!id%AHPCqAX#civt>Vm5Cis!8Bs%D(`SK55XQ{$ z#2}u~M5E8yL!qKkv2}%;>|@&CXp0BvoiTsR2X#88XP>8L5QhCY_PzKn|I}rhqEy~n zZ+>jYd8}lQ(EJsWV_I5MAe~8m8O7mO9B){titwDQgz``_V)1(#fk!SHe-&y!V#i~0 zvEWuRTJ|6L}@n0}L0iv6ABq2g4;@y;e$+pe00@G#)D#I2hbHv?ke;h3vAMFRU>(o1_w7I3*#6tVg2yCLgscuyvIox7;^prXT<*(N+KCU*&k zx)))lQc0gYU~*9*`}x0;pje^8L${4xv@i+}P6#qctc_zUX|W#Bf;yPYPX-emMD2O< z_)b$q?stxt1jF8*7z<>`A~yNYQW7^if=TH+n0^mQPLX4Mupe&TUU=x=SE5^a3y|mo zK7ytjB(@&&jXR_yG-dTXmKobv-@@IsyRG>F3uI$((m~WQh`m)Z8H4qiOP8SWPV)y5 zk%mVJcB$pYl$!GouFRuTuW9pgIDthPU>#$B3HWwn^(<1Pv#ac}7NdszVPg z$bx;Yq@yUkl=Zd8V&Hnz5T;G`01hx_GwmeT@PmDf&hkBkXea8gm~eQ~&Fw_!J*>F~ z=I_9>SX#51KMklW94xaZonAgICI4*JN?ttvZOr&Lc9t;4wNX`bdr|DqY71eSq2$}s zB0#kor%5%)$MR2OebZ=bQhF~B_2Ol9F=i=lqDQaIwOpNJZh8NmFbZt-C6h@h^@PTQm7m zM|^GK6q7Cmjo_~k6+t0BLEctj6|`jiwjff{YEyQzOk5=8)zgg zTa^(*EJFrG@9p1Tu$-2G6YDHA74Di%IXNRcgMIC4j7S+bv2&`VmrxbRTUN7wQuzD% z=T)996(sCo)_0D8=ZUSb%<#X$A>QX-ClVD{S}OMu=ds$WW~q%b7=&;oY>VJeV07p3 z=0?ARIm&O>_gz>Hq%ioKlf&w2wO#fQ79DwXm+iKtD9q~EVdir2B{)ge%~wad4tHn$ zWp=r#$aVOGr)d(=6X7tEjqS=N_0dk_^>G;*M$z zyJy6???Zru91Q~;zjWuToglA(B|Pi(CTN#+wcrJ(Zg@$5{zB;y@x!>OL`F3d(0KIy zx1$UafH|oN>6}vQsN`q6AXtT{cDKR!n}qjU^Jh@`!x&&GrP>(bHx%^t&xe=MSYj&U zm+yn+0mM|@Hges)a)!iPbzrRN9d84K+?Ltv)e`NY0cm@^2WH(w65!$#;+9TsLt2-E&We@A9k3>utBcZ*y*cEa ztma}PI`X_WQ|Ew z(o7A-gW+el=>KGw_EQaN@G2m|w*3|I6iZT4NMdkI_g{ZN%>3o?9)o37)rwjGh<{tJ zo11q>FLasT%MSwE@pR96dvAo-^qL|~|J%q6DL73~Ka{^Y$n8cTt6bd5WoTh~N4D5D zuZdf_xbbe!Lo75;IBfUlb?P*1YqkWn`@b1Z{|<2&dCf^Hv<-tpfO}oIhCqfc{PHpy zHE-)X9Cfay%oROcCAWKH`*NB!2{NUQgLUAllz(YA+0m-V`(7bS=q4c(Bcw*(e&9FXGpGJ zVHfPxSE`$vE3L5KE=kyP6Hm({aOBwNJ_KyU)Ir!8TJx?7Lw7BbbwLU?YIb7eQ;9_x zpJLBH?sl5-Z)|w)+KdUzO`zS{pot{(?>%I?SN0Y1y2LAPzn@Y8TzGW{nvpwgF?OrP zD@{KLYJWegK?%9FE;ruq-@*!ucv}*d9B}dT3jiOT|Gney5@dDyd)y!FAYL@;N%imp zEJwe+&ja8Wx%%+BPsd32jQcFdchEeT5~$?m@x4hP9WXYz6~^st*i)Kf1uF9WXHQf(ONk4_iwEC(E=CEj%o<6UI3w(p{totLlCjv#Uso^+lk+o zLg1Vg#-M~P!&aF0Cd*67RW1mY*P7QDoU184h<^Sh30fY_5(!;P6TE)f0}TCL1#3fj z0$YL*uOK~`$up9bzta~8=SGj{<#_c6g<%;HSh>5EPvn079aG|r6am;tuD$35tqUe6 zNXPxjOGc045E@0V!{ic7^oSttKffLx(UepU-aq>vz->XBlLeP4F9K~T2H=mPn3*2Y zkN5p^@l9IGm5&-jM>v1~T=Eao??JV53IAAWkIFyRV^$`p^7wPDCwJJui>u3vt6D9K zQV+HSdnBg~HT*8FN2w4>*~5dRW^T&rzdV>Xtci}|U>akvWv-H-BmqXFcKDO-e$~J0%yVV@915i85KOAp5G~7)M953cFZ#Ro z79uLbppL!=*J8ld=3$hHH^rD5hjJoij65*HXMbi2zv%A$qM$Q5WpqimD*Kqv3}j$N z6nCF&Sr@Ul%?25!H?_kOnts5^T`h`{fV;nuVzWnhVen!=jbhxfJu=03ks(HtFKvL@`t@yMNErUDb?d{RpIB^6Tz$&BV%w2^|3KDqC&5r5aJz>G}F2< zAKk#E&zBSE+Nw_8+@t@@gLO4b0CuBsQ^JgEYIw-_A?>;>w-v*bQ|1A4KlV@+kVho|3Y@E^Ug2<`2Ll9!V zf@3lqyH9{%ycs;+m?jerX$PMHw`Ud;$Ty>NC9?K7_K9>SNKe$ zbQA14jBHge|K;i?#NsViPR3n>PGEv%>QkOV^w2Op=`JR7-gBP15Xa-hd4eztX-Y!g-Pn~@WU-4OKIsPq~bZ}?q=X|LlT{OxYaH~p`R>sW{sHDDDS(9%$&>_k4VlGKYq1{CKo;#b zB36s6;$=N_298+W^0YCm@$v<}JiHaiL~op3>ibb%3g>zZz6L3k7%HOrUS03*zIvyq zUd@XGOh`Khhe{l$9+-9`ecx`bkIvh63nCJPcAwVow;}!BC_f*YbZfnCI1A!OM^Zo; z@)XZcUk15W&IxF|n+uQ|y!R7jLbk;x3OwH= z(0;S9BRT^Uc;Q^_;EkcNBV#SGtT)QjPe~u%QkN^N4{aZ2W@8Cqyq0#!T!awhHxJ-$ zP{e7Oq58~|t+g}RhPdrF(|~9;3Yk?=WKg4>^(fQs#WVzJQ8Pme)IJM&;ZDQ-eUd$z8m9ZiwiN?%zcKSbdqLO7 zdlO$ioV;5sv(CwPZ9n5%e89``UN5hYZ<5=8I7l<6s;^I6p2eVRv+Kpx?dGH}G=`it zMg;im+4ArBZfju|eMA)r@9S^Mv+P1$9RkOdl5+p$;it5`tGeXM?bgkHs#zqCto5& zB%xgm?^QhXIMdAE?lo`gFR^j>S)NC4C7*qjj{&X|&&G1Fy7@4N8~y>1%^W+$BCuT4 z{=JQLy=g{96*@(SzXsA>zx|2-a(-}7e85l=GzolA8c=CrGZat1Wmxpq^usifqA4_9~PK)y?itD>o;WcoFK@H#tHYw^_UY=>$Cy#5?NhH#8U8 z&WiUv_IQO&j(3caohQVZY~;2^ldaCW5`Y?H2jVRsc)>*XEdSoyOzSc57QrlXd0V5M zJzGlWH^@O{#~k-Jz8mAHTXat2d635G1Xg=PW>@Q+E`NxnTi?jTI$O=1@jwv){X;06 znr#19rp~+Y@N275sBtxX+;UVPFHzkcZ5)dU{-pLIAsW=;rIX|GdxV?k5AkfczZo}? z5!%PJ;yfs+J3|*e8w->$_$fZ775?_}5z>*Ke&i*fM`t4Mcw;KRoFwW`Mhu{ksz&A$ zo-3*Y7idf9Wv+WwXHsFW811kWU3)}K?*X%K3}W{I3a%lb0>V#KNCe0ab#LqXtJ8J1 zNKe^y3LKwHt(fzfasAu3wm;Nvov+TLo^(#|Op&2B2&cSI*>0$FLol z+3|+=^v+-ASw9xm`3@_Mwu$7}8i&9D?K8KQw`saCb*od3P7$)G%h{Yu9EZVr#pT_Y)FZrUY z+v~UVZ8(Y&%$B`wl1SU}`Y^MESf46jk!*}-{1mNp`?_qWHQI&t*GfpljE~&&w%)f+ zq4*CZC6wFgzr+o5ka9Ug&oeNH{OMd{=^DAkts!Ehlr~EuQ-M)R+t(Pr2Ev`E z?hLS}v_`4Z)@cDMqSemRy{_q`e=*KAMXV@wSoy6eH*1O@V>czCAtwJ2K{#=jK*l~0 zbsw+{5|tF7y1v>sY7b-}8MRe8fEGkfnp)Sz$=uLIm4~8D6_zqqhFNB{#PIh1GGpfF z>M9lfid`|IQhyyNDNHu_9ioii%>tv(>8w}|X{HMcbqXV3RgZ8VatE(%Q=H7Es+cWs zR-{Lp_~+Oqv?B$N-HAD15y#0G#`sy?RSShOK;KfZeHy}v8Fq-9#3;}rJu1+;hMOv& zgf(Gh`Y*_tUxQHG3%KNuC>QUMGE68y2aY|8`C}+HY)lm3c z|AL$(_kAwrXzPjVqurzS-_ygpD$=45Tr`E1wqZ%&+tU0*09xIz%pX|uj9&?Bk)bzw7yS$pX7(VLzzE`Kf`J=hU~z~Z{!T+ z?>U&Q2j2e5)=9_ybjKG5ceewUbDomIXI%oT{`b#kS4Rh9sDA$M&qvoq&#Fi|3uwQ( zXGd(7yz%Xqz?>9pag-8WGjG{RNB|Z@KGa>NFaTMIXv~jDrJ`{`U-e|E#g0`0;Wnm< z(b)8;Cb;+qxN^3Ybb`|Qckgws<{Q06LrYLY<&ST2$)$b!_uoTIr#jWFFu&V6+h{9X zs8@^5jrZEXPp+nEBs6oUVrb-r z*jngJbT0^=lR!ZeITf*GS~XKDNe^(_11WI>B{yPY@luqe`UG(zH0uBiUPI^{EVgUh zJ3CK_TJu~AI|SqP`YGRG^o$7mZ%LrVrQ$B31AjTDH;Jb0LXFi=`@g|n`n*+hAW*Hc zPuE{(QmlA z)=xuumWbfww8R0lrKHMTG#~TN_g2oc6m9=)n)wg<6(nkLzSdd`Fd_2-kFMLi2EH`4 zB!cxu?OFD@k4-b~uAymwb}kGcFSd-BMy8byPlmF&}Y0gaeuE(o7!%V?#6cUowU;9R`0zUA^qlx#~Vy~AX+M? z!FaAXOd?$iPjE*%X1rV=3`4?h*Ajx<0<92&@w=ghX&GWeef&y$Ju!k@pyBrbR;rta zBz&%h`%hE=WS=j2uvKx}@NC|(5ht$x887LL$JCU!GKf1?;t_~pQCG8Q)PLFFtTa6i zy3KN^zj2d>zf+8q$A`2+*4Go7g@l1P0j3|b9L8mT(zr+;>{(}2nz4>w9rR>49$t#P z4@`aEm@Gp$oCt?Q1oa18LHDk>TNO-oJSCQNq3eP7qg-|ZXk3Cr@M}TKjeJtUyg17^ z8L`kY;$~jiroCy%PRx;ve1}-+8zH_JW3wYFzQm7#oTYdzu$G&u^(1!06zg!(IY&rR zwyxJmX^RNpom4rE-d%~(6wW^d0V@0K&m!guktDQYn@OHS1H&+0r@J=xXvWa7w2LV= zT?QVgm8=V$Ko2~JJzDj1O}B*d#oP75fmihz)CTD{O_Xcjzu4!iN5aJyMpjc{5sq5V zX*qoR81fn|8KORkr@=CP>9q&B7Ca#AGkBxb?!7YySvWq<~0T@T0OIiEe) zb0+soBzJQ>ewEd0U*&;%cgFD7l@AXrvhv$6M|i}t+No1*3jNch5Ok*8wa@|t$E86Z zj?kJbHD>6`Fyo_iT5$Dxe#5+PmA)|W*a((s%yJamG(z*;pd>OR?~BZ#$PmGdL;0Q% z_2P{SLlS+`^Gi~EADDVKgltY*+39+z)kFx#{RJi?Vo$D93|mhw(!R{j04MX@k_Q`u z_SVi1&-a75iJ9wAB_4A0sp=}V!03m~>@IakWv%(YDMCAj3zX1Ya>+GBoka`}sP?L6 z?AnQbec0>W@HX6(=%~u%i0VMSoJ)HMFk1(NZsV;%tcSmh!9#Did6q%!Kam&JXRLpQ z|B6I~V$!F1;%v2-Y4QH*_Xb#+el|pcg#qCasN5<23KWLV;u3W0uUp)u7bhRcP@$WI zN_$+kx8ZtF%Tn$Xq{cr9=elan=&h_71(2>#*&57O?Ne9S&mYvb-oC3%^XHU782Tf{ zs%(lA{c22u$`v0AnCto5_{0A`$O#tJesUT&H$%>vxZrc@1=FC6X{DonBR0w!H>-c! z+VIWQNauqnMjN(CZ?S1}(1Gr;ZvZk5-{UumVmQ>5!fL(#G=(D0B33=uROCvo!Y?GM zc&w6~jePn@h@hD_pqW_O)kR2J*RtY2we%4=fIV`?o_ z(X3Xtc@chXsIL318?@Gcpsqx14YSzadk*WRf^9cWa^7_(Xh9Sp!19m^t)Qq6#XLy5 z323%9wrlBz7?WRXtowI*-lsf7prEhTaUi^Q)QxmT)wZBb4%H~X^$v3UJ$XYi{is+B%D zHJrq-N<~XdUEo@PBPn4O$?LGzN?q45s+CvMguFBcN6S<$BEi<$RzC>!z}b!(j>!ys zEA%7dd*?|gjcD&2Bx-N1l6|0(TJroluf9L`VlXkju@dtYjq0PPrbQMma(&w%=eDEixhs5 zow{hylubwY>=rHwrkg#&7Q+^J5CkpDP_*oE+bbBNCYWMOVua4k>dE2;rZ{AIr%gdd z&ZM&Aong-KUj$sJ32i7kv^=?|Ch*kArub^#XJ|b?dj%W>P@?<7FH^~! zP!UKjpow3H4x-}wKruE7gx2a~f#~0H z;_~pSW03uBLS|6#x@+5O9-j`lj|~|39wi+zbkw%brUkc^DGsI>Hiu}*jzTrch{crP z<$-k58eL51Kr$OC>|(S70SamXV3)`_M=7nvIT@<=3zc!w$dOV?>*; ztVKrpDM(QDv~boJs$~>Q9%UFqHrR2vMj1|JP7W$4h{n-Dv8Z-d;t(WDfNwkyAk@9K zerFO;lAO8v9&=Cw#82~FZc8puWp!wTnm<8}VVNV;(g9VoN%tbcHquqoH$6x&Q<$!3 zrSTfHJng$JYCyKm9+j_68r{>?7D)%+i}Xe&DX{s;_x@vNnqS1oenBi#er)Q%HSp)*v4~MOGynhfhBHR zcvE>2FaY6}_YP&S6w*G$yK|p_Kuv;zrurBZ?f^PEFk~G^bu~+CKvx%WW-HDu>?o(` z(Je>9YKkjo3w*lXfnX%Uff;5ZY-nLn6|H9elWY3@kWZXhG45yX>6kcn9=D7zRHfU~ z?GG)NKe3Haxwo2YF{BW%{B@CKUqfv(oX>nHF1^nzo~Iw%I@sLZwq`=nDk>YE6)e!q z?bVAjEu0JSzMR6pMWcHr`ZF8O#g=$2ku6L(A}rp6k?RNpDJXvUlu%+^sB7~qVp zla0ciaWLIi+=Bqscu@7|?o;5@q5?2ZFhsI1>Z0%kwej4rh02P&8y7BDhi!F#bOX3+ z^q5*_rvhoUL~Y7LTz<^&R?A;9JIYyf7!7iXq<&Y;n1=f<*FU%>m+mvehO)L({hGf_ z3NxqLz!m@53Uma45|zx8r5<}LLqH3l0gBthYR?u~lhww0Y*J%m&pCCo_W53^e|wPI zq^H=M*xC`f26T5A@p^hWdudZU_oaf(sl*^4zpE`7R5_xk*F_5!oh6st>--rgxS+wE zyIq3uhNjE4hyKe4X-|B5iGwxfvPjFR^_?4#J3;=Uu2a)z`y?aT06n4p2d+Fs4ps%) zz2ElR?P%V{Z@rmf!7vEhFQ}BRY+_rOg~r6=r%Z5bR^PVV@Swd;1_CtnQIPwsUEH%V z_pPBi;s&P6n|^m}Vcb$B!_rdFmTs=K$euQ~uD-R}26<(<{UEApOa8%%Q+q8=FF2?( zX41ojg!iN*;=%u`Ae>rVise zQ8a41o^asGrJKqCzW4BM@N8xQI|X0gUfy> zBswMJQ_&L<4dT0f6Eh#+#~+qUjt^6YU2QFXuTSFjiGipzRTR_ZSkO9&e>tMf*_?OO znQD7g%;HCW_8!#!0~~*uo+0H0<~_sVWF@I3$F1}}GWUFNy*ncu(JueJY*pZo$;}6{ z#|CT+mS(@nkL^DnDrv%7TGk9dhw^CVJSujc0r`L)cSv1+_I@8%$A}L4|JStd2TB?W zgj{`{-apPml`cmr#QQw&w-*NDp7+Oy-&TD8Bdjq*BZXdy+Wy@I?SBxdA~ltv4j>%9 z!+%pDzHEoc0DFN?ZHKD0w4h~ts`|eXt@jqLvX0|}hqWrhOZBD5>*a3{$g+wFz2YMu z5P?|j=0F-maOwA11d}YmWRdwI?8WPpImX-fg^`bsq1%`ow5bifPND9cn9p^#{_h8S zRo72#J^%Ta=*kK?Gcs~ui=dC&+rj#FN`gnu@N)^{?m}pg_}w)k8jz*P2wJi-Y-RA7 zwfkVKzyM<+UaET*buRno_BP8g0l%GpkyG8!56G$#b{N4^Dr8YpCTLfK0*m7Sb2#`j zEMn0;S4xN*ks>Y^M;QuhhBuj{DG~yWh^sc{pc}vG-iRHP_soUPWXqpbeTZrK9dKGuw#h z24-gxJxn8Srt?sNi-RTIqZOzl8|JDDq*CZv<JZzWKLTgRc!pmz`~1+T%kp;3m1m zd>yKPdbl8J|I0*Wn%VcL%d|>B^eFh&Pob1OVw86QU_J?VcAz}90`Fp6vCYXQ0B7a#Ho6#n+Dz zj!tG8E~S_6kGSOQj!ScA&yU!;F0=j(CA&Evv+I(LHob9affPpRe6Vh{`d z3Dce7q+~%kcG#~?ND`WdU!s_3X9yo?4~=ciqFn39!Jm`!X+mg~4s>zdxN>`(E%(=q zz>%dHhh%=%fh^zEboQK8QLjzuvWIwLAKoia=um*D`Xj{hDnXyqXRo1b&ZR^EX4kKn zko!$);L`qIwj88SsGGWeoTg6dXamuU2?KIjqb2_FbC89zqIBE?K8OE!aLT^B`Ys7g zxGPykxJ}?dh6BzYGGJ?cEgKgMUB`C^CD~qM4pZHGI{};>m*&*x-XHPbb=;nVh|3aV zz}evZA1{>GTTO{%K1_hy3L`bZ2bNa}YF6w2D8=6b%i0FaT;uPD3(7BlM<-FKe+@H? z0RvATlAp9Vgm4!~s1l1#MS3n9CQRM6DXHO)+tua9GaB)E>%sX6ejqs1{@r1lbe?)s z?mKBGpnACYzrb(876}k{}{!&6HZ*Yq#&?7wAQ?&c)T{k!t)*@LSA~4 zJ^jT;liXbtqmKUvf3H}G{D1K`I-la6oEK-X6rj9K4?#ajJFY7a&Y|E=K|Xi;_JQO& z1`@^0n_~iP>MnXB&e-niiS@tGcaB)AF1Fpcmf#+!B8C+9^2fwlwfbTCgu zGWr8X2p-2Wg}=X)zRJGIaxPoEx~tFw)pWx;O`b2Ug+e6Ke{*lG|KZ-Vg52oHk_bK0 zB{3OcE@^JzA%Ty)8+h(O6N0VT#B$KfGQNEih5s15%i0@!>OI_G{tg~)t*ja1&6A@2 z{5FxCUi#&P=b5EPZd)Ekf`A3#M=A%2a0~3KIPbU^FH&yNizGjL zjrjY{gsTxU!Ofy(|Y01LDPtyG;38C0RWN@2_hZ(~OS0h{|IF+_1G`i;I*tt)MnMh+ppN*wXTKN=26+T7~weVYpk~~LhWh5 zbJ^jwuR+zd232#9hnMeua6!xz!p2qd>c$~8@+xt{Bmd<|3&k7isrgxvD2B|MXR#Rx zU07Xb5LPeC&v=;Wn$s96@fPYFuj&-n5n!E17_jyq?-_%lxpVu1x#w=9g5ixWY zLT9gi&r~dYQ}+FO@XS~pGmrGsLojGQ?jSCRzKZ?}$9>%|zE4*tBi=r@Qy-o#?ze9b zM`!n^tLM{0UEd8vMaKopZ^13_g@DGCzr=f$swPV z*h%I;CJ2&1rz?&4q8Orj>afhbaN9*sy*325c`q&K5R>?lKe*qL!UJo?ctd%D9OpQj zh5z>I3>s5~F%rl9IwS;Ta22kLk7y=0>h&n52%8$z(;IXed1H%w;AA^r`(MM^^4eo~%B(Q{ojX$ecL7C0D7uqXDO0Y{3LB8`jtv-a)o}2{! zz#&d+*|OJWb)1ZgQjCva3hn}6Lvh%uuVJz2*x56>J|D2r`|@)@MD|hC6-lokzDE7{ z)y7!+vp_c*d!S4}2%r1kW8fkB`d(z_zh|6+5hr^)uR3F}K4y1$2cFh*&oa}_7Rali z+e@Bw4*^nGdxEi0P&4gtd$4Kp8OJD7>@;)LND|RBQ{qrRbe3fc3Ua7=0z2HqWJIK~ zpGh-cdQGPV631EQ@8Q9O!lUyE#HX5Z@j}o#;j2s~Dj@bFN{mBBara|jzQ1L<-qH@Z z2}xF%2p|x5RM(&7vqiB~OpKA&FilsU>1;RVyS*OnTjsgfLroJF8+B)@%rl`yC24uC z)z-b>jZDeYM$?-SQuJHO0}0?Py6?Rn5J7n%oV`AU>x z3Y|0n41^*841FLV1VU$}83DX70DLBt;*}H8?f^dh1J8n69*9`8xqLAEDf~4{*1l_v z`ERz)J;L28NiCo%cAFr9mb2XV$s2n#MV=mEBc%*Ei>Q1}o#!A)zcJUJZ>MVwK|8lx z)PM;hg)-ff1nUMBh?5ITCZ+Wn~Ub0i3jm%K{;BD%QBDvF$}d4 z7PQ{+Q`86rjAB_(_{jZJa1d~uRcC7no8T~|*h05UcLQG5z;ze0#gsZbk$b!r;Hh_H z7c-QeW6OZN|DMaWJFAaIfM}I)ePxyP&yCuN&&n&`RvbJo3^c)+9tF{Zjs8$N2huA? z;KHUyK$cfnFC7^&rLI6@u=-GqZsdEmX7rIrJD+r5!wsh_{FD@mAOtO)$$@G9PQMSu z(bo>#4j0CGd0^(jSB!qTSw9$I+4!G3vsPyCw=mN|ivaamnLRK(zDv-*91)DWzfZB; z3vnlFO%NX2MzB6(CwP1(KI8}G3fPcr*TlbrJBC|11NVde4hU8=kgB?ErK0RbEQqro zILeEnA7=MkZ~Ha{2;3IR((RFk>fvEyLL<3SJHm4MqI1VL!6C+l^GNRp&Gcr+yTWn? z6wpr4#=ETgbJsN}OAyQnAKr+-I~(~-+!t7~?6mh@qeK|TIPIa2GwDaTfH2?LPg78Y z$J@W9kcJ|n&#qqZ&3Y8i#(CyF?sNU(=_KFyn5|{{!_{g2e%O8l4-bw_NP+D*Z8Gz7 z<(ROUe>r5PQE&WUg558i9$n;u1&m*gFPg~+f>_3GK&$ZjwYUpwYd)d|TNBfVZ~v4) zF+2VO#`$YyY(F0I4I`orsu6978IyuwCg_mZ2Z0V&VYP386nj)ZVl#CF`me6>FXemUPRt1Y_Ytc}rDG6W=Jz9w)ECcu+-~ zZa5WWxDTnYPPPM_?g|C#ZR8n6l8_VU7Bz6ekpLcLpg+<`!v0ER-o^f?15zj4J|US+`eT)s5!0Vhp@Rj2O6jm60o!bkI z>u(V`NYD(5kUxF+;8m`yr7z5FUL!z@SL>j#m}ZzxOBeQa(#qM6d!Sbz+;VK7F_>53 zZxMsad&O>-AT6oOxtG6mq-yfnalO{W@xz4|x)k`buzaZ<^)U@yMlDHsV~{*YTm<4w zLJdfG6Gcg8tb`e(RU2G`<+^E4v1Dm$i&s*6SI_PxP5EZ$1O1o7QG1GosnYU7t3Ed& zPg;DSEv!J0W*(CcC4?^Oz{iUBm%PK6d~#Q)nFQ1S@ww{;@6a$tx!gu0UhfAxzH*cb2y{dE1OY)3rSA zaL+*sK~j&J@Q^`^SV?9y zkmAu#>e3i8+{SUrdTZJ26{U81Ajn;EUI@gj(Ol&ItL{nlxtyA7R#$N94lA0VcU~Cn zPM?_&4rfs<4E6FvuRprA3)fW%I?H{SjrT|{#TEM)JPSHDd^cpN_|CJX9P+mkIm@db zTAimOVfkyFMV5uV5Z1M)^u;AvLmQ{5W;O}XQU;iN+%lzcDh&6Y2@!uy2zhY(GStkY z-Sk|-T*Iz{M!vOxHe$WD z|5|5MGRvW4_Yy+fS@EQQ*|Fgb{qX+63PMBoe!RTwg#rZ_?GQMo-dARTXtA)%kgU2q99UP#_x7GeJ`J~naJ3v|?4@J*x11Up)K0GipuUAJcFQip? z)@FkXXUA@UX_Dw|K#fT0I5o2*gRl81a?T*ONXG6}gV-dp&vn;AHB}mj0ViHq0g<^- zYG|cK0@tVl=KLp-$4ypf{FNBidaAl&sL66)RIcUIG2@W0CsMSubK%P$L(Bl>@d(NH zOhp6nx$vM~uHpz1%OWWa<3_Q;Qh#wh8R5$k6ZvNx%N>6qu;sY5DSKz32UTQ3#ylDA~l@`}S^l6EMuV!u9C`Oe! zm#v69z!6z0f7LH%iw3fK4!MN^9o7QkwJSY@w(Z4(xp*LjNk$?t-xY>?Mb#X1O&tm1O)ife$FW-Lt$E(hPtP zQv)-QKG&$(%v|xR#0dq3FIg+fqhhxePb@mmvT@I)9v8b0PHE!vomo(4ALO7YF)G}E zRGw1JXWd$5!73KktJbr! zn0HGxFb(I!CUs)e_R_=jmG9-3#+MC#US@<^!DI=h(K@q`FM0g#Hm#unYMoWbPy5I< z69nUmnhDYy8Np2iee0P9jjAsEY+3LVxLkXZ1oUP*ett0aKnO5LS7S{Y)Q;d zTWRP}p@slpYMhGl(dD=zn-~~ipcftb(YRg3E?;Uktlvnbf$bZ}R|XV55p^ias4rk) zR@YC52EFPv3P0=&ZH15uEv`|eE70%Nyb6!-@~l>xQY)8M!Q4ArvQTHVR8PYgZ_oRe zM=0i>gQTW=o5~r?#*KQ|mX}9>@6W%<%T2eOL3A_Iwew{)IZAmv=Z}6~fIdiwRb1bs zI%Q+6M`e2(N`Yn|obE-i7bj26s=uyzWS9iygnNLD3vXQ}ck{c6 z7>l>k%t4boj&TH2Cllq zt^BP?ME3gE;K3PToHt)wM5X|#8KL`^zMNH}tTn9{*S;5nYxMWHd8JX?d5R3GyiKU%h=W#OztlhJPV`fYa`DGK@e*`?1Kq%S%6kA~h5 zIZ&C~Cp!hjrh-tgt<_4H)M8C&Mn6Vr;~l~rgS7pmo{C`d(kenPr#uW&S-cr&`a^B} zEhqZ1ey&~uimWkzjObh@*Ouo+6?Cl#X$os)-c+McnYT)L$%e9v(vfSrnj^~_ZDWiI z5Z#XZsw%JUIv6VcYTXm9qzfm&xEu~WPS3_^nCI8@cUISTTl{euQY2&$bzeHqO_r-? z<}kQ|(m+BaW8pxm3=6Sqda)N>jGzDd{_b{~*T$z^Er1Yu)}CXE>75O&YK&=Lr5Ke@ zivr?$Sa}L?Odyf0Y+=tg(bQKh*ZzH!nph0!tJ_RoF8BSj^R&+SVJg?tneI?REbE~? z+oj=ZcshDK7UjgPkn4(pT-UQjBae%md>1A7Wyv9zlo<0`ROqWb9 zD7*Db+BSGw-N8i83? z;(mZvNPkkaEQe{CC@F~bn>!JHVzVKefQ6ji_X6yw&K^`B4@)W zJmi7E$eS}dl?9N5u*^A0=HM8^fqYN$uBE0r1FD z^Zj_*U1I2T@$0oBEYq`aM9uGEe`Z`J zRy<9FI?iG*Z_x;BJd(b5x zYM1Fy^E1UV*yz^c$Jv9`O!RWKIY;(t^>RZ0CB_qd7pL*_t?@b&U|QmMm99JyLe&!#UkS&&yJU&VoB?-stwz%O8=53m{P8;J>MFVVc^S=P|OexY5;>XZo84JNy|Ey^kO2u<%dufM* zZF^E!u8;?AcB3lNo5u~N%b#MTeL5`OQ%tIq>ltZt*~OoR>3n=)_j+*1esEws@?mVF zm|rovLnjnZL5kjRh23@HYa2hhyYm3nI)$w1657;q4j(GgqNS^r!?_tp*fwUJga z-|I6xBt#XnnIAETyp)o_bzVAk^{<1q#OXlg{U>yYHzyTBo`uCOSQCplsQkj@Od)k+V!iXzO-f?IE^{G#NoZA;}o^w>l^>pRPq7#y-RpH>oKB{nqsO5jEE zwO!+ZD)p=P$&hte!RwbMc5{|oYVm?jK{S6Ag_34glFB4r)KcjlJGJI1{%fb$&{%^O zsgbRx&X^Yao(tp!J_+v-0h%}&`iUfyQ`WUYGlq(+uOwj;*Tuq?J`#FVaT>ynycW*3 zK}CN0UV8QCy+~ZA02fdLS`#YDQ$2$MwkLs&<|11;T=&45KQG~+cLE!=#?{Y>ZhK7M z3YzI4Myp;OD(2G(l4IHzVALsjf&8;^i_Kzu9=o8*s{w|T!r zSy^3grp!-UvG>R`X@6|qNv#VT@hag;wM7qMZrQ^t&emd!$KN`fBbtNv5EeLxm_%GU z*5svKsy4>I`^Z9{ookie&W>f79y=-8;SSK(wgbMF6>66|#%yLSFznqHT>0Hv`dAJ1 z>F0YiG&RRbu)iyRiA@o0ouj%xm47r&otw<9SI3Lbs~2||RJ5wCy!7(!3YAmUN)f@P z;jgX7&i7w=UZ#4`Z^OqmRb6Ga;{70N*HTz06sey>*59&qc~x&eLs<+c=;w_IHOt}Q zCTOsQLPQa;l{pGDB_g&aU2kh9O+^7l;h)XAq;CZPQ9A$Wp#9N99(?bu40`mNCg zJ_cFL+WgScnA*-MEy|)=hpGI@=<0HR?~l=WO}`7$**dLloOV9&lVPM56QY*n>C%b7#kVQld4e?qMQC9kXh5QCY`=q zRJ@K1)KDN+Z72-(n(7rF8*3C-@Cm3M7|7BFkGa;df2^|6})@biI~KU97lM3w66s-8p0B=*J`2G%=w>$BNk> zMnh{tO`H!~>qT~(a(3Ir0lh)*7Dhk1Jqqu9Y2#G2?%*v$+jWgwO)CF66E85!-Xp`@ zSd5Fos_t3xwE*!Qx=%o`hGi}V(nwrLJi*s;8bKXiL~bdy6ofkKWHI;Rm~$}tT{{mA z@s8L4v)e$zzW!wCDXD^P_P9pQ04c4Vg2-ZI9*vpS0l(rb4`xVu&_GQS(+>cP=zG&bYvLb@- z`BxY5vF$~`6ong0^4^Q}UB? z|4#3o^K%`3(kJqS*hu83>LdR@qp|xiZF#1IAn8j{;N9EZdQ1a;3LK=O3sJCTTadvgHw` zaxLD^_B*wSH{3-_f(Vx42cBxIRgPyh0$jycr99KwmuKQ+{4o(+1cO+L9;rW-TQOmr z7P$+g{N}}eL89(oD9Eb%MK!aI`t5gG_@7O5#B{k>+e0Y6=L<-Cs`PlBoiZBHjY;&h z*?oBQD|4I-_a&<8K*ch<)wQV}_ig$ySheiqe{B4xFsYP;8(a zeRfu_j2{+{Ly*yj0ysV1rCxkW#I0~n9^ciec{yv}C^Hi>mV}zH(L7HnS1`QD*8+mX z$}tR8<^DzvM^`DXxggRgyo=Tk5y%g;r?(u$@n*S0zNGQyW$>oV?1zwjbDx+7ZLawu zw{hz!=uu>@zk?TFuN2RxY5qL1?#DR&v~-`Y*!Hg`ZoL&}eLq^zObm;E#<(h_lxY7t zgXAeRVaW5Im3e;IOd4ghuEwkFe@e%7+EqreFGK8A!1zJEGPv)-KG=%DC}T>tdrCaQ zV!dA71Y1M2Em;*W8Gu6TKH}*wV8dn3HC0~*-{U8)+sPwDTz04{{n{qo8}KBT@i!zQ zvW_rVib(%VL1>ol~O~N!Bf?j9%lDX02V7BEx+I3oH0H+0mf^eLtXI;5A z#{#tZY%ipp<~`k4kiK8bwI5%^c95$ob$U)#R5qA-f9Ato&29{pdCVPm1>hg__qZm_ z^^L=$6fM90n6NNPMURTX%ijkyVWN#~IAB(lzP3Mx znE(7*`qm>1JdrQ>!i{mN7buT1;F~v3GGsn04`xh(HbCHtDW+4jCWZ&&T>GcS-$Z5>Y(O@i2h-K|&X=@&Q88d9cpV8~7>-X{d|{ZcU~GCNvSF)KsgA4GuNBc* z%~trSSguTXa+sX&F}7`ik~u7mKhzU3E=D){$xcl_9XnM%>uo zSzF!bmk_{k>+W6uayx|T_1YHcRj;GQ!N zXaUB0J}gYHDs@3Zpl%)*u3ZE9dj17^~lrLf_WTHNDm6UjReFSw)mUvY}CwZ8kVE$)b~xxmF%DiA4_fAa8;VHNAupPJ8hGq0G86t|xNUv-vV{8<@>PZJ4b*Y;@5Z zL4E1O-x})UH^NTB>~{Hg@<8qT0{|ssgXB}E4|iQC!(AjzR6hu)ASpkI23Y2BCfj5# z>rW8vkeu7YGqDP5XGJ57Fn`49x!rqefc8$8b0DX-Y8as0i~v&UUEu%ZGfr9GGjP$` zupwIc<6NAg4YiHJSD{L2K)(1ij?It=Qf9xtpj;a~Uzu;+M{kj8?`=9|)HE94lx7|J zTsE+ExN;!@_P9xW&e=F4g$D6cjm;Wg0-UyOVP-?CUSzcj7~#nN=c1hfz^@ zUz)L7wvNkb9N1v?ji-gnco_fC_k)2CAkoA8o50oUEo2&dbUn?mWa?01@y4UxlT58H zrjOb`*?_7R%%C%*l;>Hnq+(B9Bn9(0noA6SyZBJ zoLN6yF!-A~59=2VDRRtB$J#yhNNC1<3t|h(nIQFS;*f$>N*Ut7onhu$jCILO6up>i z!fCd*7OewXa_?+6&) zB%XR>`YF!TFxx+YJ7;G;Vw|nfiud)2V&$^e;C16WOxS@sz5DarSe}llzq;`ihWW9J zQ4to_7@{Bpl6QQ;?ea+qQL~5lnh5Ogk&0B`2qtEE?ta4z_lLpMCNHVsZ!w8#R$-Ok zq4h97hl^oSu<(Cm>@{FrzLAYpCoC@E~?WInZM z>R@ObZ6iVbUhy9P?2WJ&a2@={hC%jcnqgbZsmf8TkCm+FLpesS@I(+C z(WqHw*74NTe;?2Pp!OImELr6~fR#YnPNxoIOe&D0y1=wntB&&rZ0E-hzij&h{(SM` z%Tos6#6maCx^iS9Lx;*kyB{YpcD#Fm?5JMGC=p>ypt+dieHm2?ert^89pEt&a zNgy}G&$tVoahT;F*t;RGrbDOUy{hzOsH}ul9#%;o>#;6xY11OpM9H5w=~f%S^*SiH z9hUxlytt5_y4runP|NI>b-!FNXTpA zDx$GC;O##_j}#SigJ+UZ*Y5V&SYW>*nDl@N40X#oiZ}=DaS~bC+SYwD#APVl|3Lr= z0V? zzsjbg1ZzXCy-aYtm|+q(v+f0Nu5T3AVhbNG&JJhO9=nj?FBeLH##24%tM|A9gDju` z`k@KRKt*#kfv}YA;(9y##9vsE;Okmk`TKf%@75dOm)T1CE6|7|_v#g>KsW)kzB?dY zFM-{EHOgK5=i$Xp}?GQPPI(6V9i&wpbMEr$P&)Svx>7z{62pl-x z;YB;mtla3~LP@}8LwmdzRkl!i!BX&-!AS#kfJ#@}o&J|0V`Vk27li^GDJh-$I`&7P zuk1_v6vRf7i2e{fQKWeP1jImJ17*9DQ+MorS?ifpC(uGIo}2BBdUfp9Gax9jidMWt z@aCq*yFHQqva0PudTMme;{*0YL|#=e9meL?l!Kx_x)IK=Kt&`=~QA$|6^DD`zj|C5(a0dH{JD+Yw-hf`*99O@(u+2BkD7@<2KBweO6bqLvy z&1Yi+veoeL4V3sB5udU~2qwjmu-|=N``d7;s_fhh)$dD8nyO%VwYG2uT1+5T1NOF4 zYzGXuP#vS`cO|l>`4oSn1dcHF>p;+daNVu>^`Z2r%_=ebSJNHxjM$t+cW}lzi+0G& zkuk~b8Ay3HmSX~sgKXDfL3Ce$R(z`00Z_$XuG2t|+vZ)MFE?KuNZ;S3-yoj5Juo+v zD4;C!k8x_r2Ahs-d57Xh7>>Qd$J*{x9tKL;Fw$^<%(Ii+jz-*p)H%3m&%E?Lg21dg}?vvHF8k`N!&4q4iHZixS9GN2_DnlB_H|G_YZ=WAdmw0FoZ~iktUiRjFP3g}~>7`5v=o z%bji5$VLd$CoxwEm)-fG(*EKTM8_L~4p)YBZIuP{Q+UHO0znVDw^4DP6Vqy1PBN4 zU{}8ZR%-zN`RSkAoLTYLdO6O7E6%%4iu5wCUR&PyA0u@e#j;d`H~78l5VUGuznR~p zFoMKRDM`qwp=F5ob_jP#7XOVESZ0k)UT&K zkjVXNMkXIJev?mm@mNBxBZ9(FLUKAq^c0_ybTW0-(TkKvfx=OSTqB9P>`M@kD{X@G z`f1x@wSAfD{n(Olw4e1gWnzG``(a)o^={J!bhYdx>+(o0u= ztohj9XX{Dw$e!2SJ}K|^d5L>z7U&ewR^9+4l9$Z-`o)BM@fgtMS^sqn_a=?+xhmlb zCQg=0eOLSs-s){b2tH%bz!ejVscZ1>ZkVpoIeW3eBq#%l zyBU#Gd>$KI3Q3-Wr)@_7=H|YWmPZ?c2o()w(4-i2wdgp{#@>vOy9~m(=S^xxp|Hj5 z3<1Wp8}5EL%iUodYL6T4@_=ld_p;H7*5X^pkj;XqJR;u`2)jm$fKAO1=0dM_n6i>L z1Vc}=w|4rKbDbY*x{xgLxee!G3u71Gxxp-#(qYs!Wp%sK*jCmAj668GwLt2IM4xi3 zH{_|XumoL299X59O3N9djDr})W$Gc}Tux%wDCi=+j5zIjO5X~ith!kweI?{#o%d`! zR(z{JdrcGGbX%=#EfdnFY7^ZzOB#2v2c*uy+opxz(MuN;dYP0Ih_YVTyr&J$6=7*N z%rVA&%h=lct~6-d(EwW@^?m?C_-7_A&~$109e8~(`vGJeySZS)qf%g8=D-Cx60tDt zbG`h<4q}FBiY1sIeZY85{@GjrX#Nku@9x?uBGSmF-?t?(S)bP1b6ZxmkDlDIvB-Y-*vn)tlQF zSl(FjWh&ryBA5h9*bmbB3jCS%XC>e{!siW;T(0~f$rugsb>ouh`=Cq!8Z~0ggxY_u z)PR6i8+haKOMQnab)`wX9*UGgjP3KUIoe;w5hs+N3|$CYf_=s_OCqKLf^j-WTbvqYjQa^~35{NkbwnLpzhVDP_GF>Ou7R7*#TKmQ_F=_j+%nye4z7yCNVQ!=rd(tTNGjMh*M{dGtiDyn>0Z* z?c9z8q_jMILhHl)+RlF{rvVZ@OZt2PVj}JWVCoRKFR0PmnrzC%nVC!#nqYUfBNWho zoqAM0ufv@o#M(rmMDJln8x+tTOM=7-&>guv8Y8+C6CJ$OfHL0IJOrPgEnzh>K$7p^5Xj{qJxZl-l#1~h8 zjhigwd~zWv9-LDa)Uj(Ho(-Qx)%lMle)-q=cSHLq0yq@Gzpj55Yq~HSWq$~M%Yg8K zzg9#*Tgn7tV9fFP&@ssBclzk&D7hY((|Cul3M%$AaxAZHjViB{t9`~lDM-fK2ib!s1{3Np?F?x zM}ccJ3~`{!MQ4NxpaI^qZA>gMRxpj{@O<{- zx7OMew#o|e*5uITchKX!v~-wy&z`KP2IO~OZGM8kO>wBAt>aS@D4PhyU8XvIZDEX# z3D+qD>j!yghWvT-X&U$f61@*;6+TCl3?ehdx(e2oK^ZEB9z+-+D3L;7e^HfNLXgQ&8nxVZRQWOyNZ6d_sY=NSn!K1i}W zT9%Y0AvvePL7-(8`FXxL2C$2d{UE@EA%Ln~5x*C!o1`@#rgaoJ5QGbK;={ZC3~;|g zdCiad67O&9q@H4t-Y~Y_UcnTAFqRtt`>PW3OB%?5yv($f_bz{*#jFLo`stKWcYVXn zC9NukJaSunA)Wb{TXoYz+(#OTmD{Mux3SMZi6(A~eb-<0(%H?nYtW|M_>WG-SrpYs z=1sm18PmJ!=kbn&&mOTg2>amKu8X6D6JYcj+UHtfh;z|LDA=EZZ4KgKgK|Z3=ypl(42^p;d)kuJP4Q zxMA5$>N!aHh{g=)6pQxYV3;Ny{?5aUZI1Qwt)|y+y6|>~Y-zxLV4Fhl8o&%4LSbTG}9x}0;GrVmRZkQt@ zb=RV0wEzVvKV-Q+a20LV^`cV3Sy1-51c>!i$?!*Zltt$|#_wmSGDdb~@$MxxF{6^G z+Y;IBE2f|kzPRUu-R&2oXRFkmNGyR|VexXuWBhes4wa)h=VP=u(wn}q+uWkeTmSHY zuqRhHtNysS&SpDAiUW^G72HIiHV-PoH#g z%3TpIPI|eE{tvqd>e42)kWi z$X~fhpup91_hIj~?~N7bE0W~1L3>1H`Xc;+Ep?jHrFMtaS_>cwM?Bj~ymHf>72?Y^0&W@A!4}_Bnb^G(E+O_z)t(G$vT& zp7?li?1)N8s!GoRJg8-VS%tvTObMIUAN-) zur--AMXY-g5Wq2e0xSSL16M{(n}BHhXIFDC)d&r?oS$=G&sm57PprIuXXF2l@>Y(% zlip-v{z&wDetu5xv6#LlNC^7jzy9LW_yi1vj0yms6$lxCx7gce?s#XuUKzhgGFtq= zvx9?m)mzK4_Yw@&wiK&}aZ_Ad>m@dB%3E$5n(+&UIuSGA6XmS$4v(`b%Ort|YQ(g?3rS5_O z>YD~2HWLd--dh009+TTIetz2mqL)4+Cz2N|RpaIoV1n28T0PzajatjU*UR+{ICBpe zfqS?YEdLjNFZkYi_`!%(?edjw%Xjm!y`#i<(;>K5n8z43%(D>ly&4g3^ctM_nQI)J zq52(>tbp(8)G$d*n#PfB0CNdPBUWT?Li~csd;s-R6{=@PAKyOSsjL%P_h_Mhurg;` zF#c=b@Y8w#_{#SEXvu_Ec^feF>GuKHce>7Cjf1}B8@Bgurr_%n1EZ#>l{4s929=?2|3cd&E_4e{& z%cuVSU#Icmdz@YJk>fuO`a?DT!(cWY@Av;M9-I6}Q<3gc^uy^$1*xw|n$vrpiqc6^ z7?aGVtrMe`Ab?pw;f;L=GdN#)*@N=1ia-nvc4|o+>ojJvh5-}u>Dw@(k*@z$)!q9? zd79CGx-kyllZE?8=l{V>&Hp``jraM#cJkQhKXV5n6Ac&>@OTId$7J&5|XtRUmR4O%e*WXXaFNvW&(H$m{kHg4Kg)r&B64+FmQQ6HjD%r z^40Drs^~nVY2um^&He(3HmqhHdk0iD3fC}(d47>4H@G3`MO~AJ-j-IL%%GyB{P&pg zKl;;wn*VP+*vJ3f&GQ8DKh(2h@2RqbJ`>4JUCZugHp}jxFV5ee{B-^OF^QlUYGOFo@a1CPC z?v*$_P`}4jcA9ylf{CQ->pp>oPv~=PpRPxp|JM7zfd*)s{%1N;`Tt}v-rN80EDOX1mq*Q653z|${D%v3O=E3@)@=$X1=Hle?tX!@`tPUXBR(@wdJJ4SH}L&uZOBRc2i~SYLCkH#r)LjnMcvh zz`_^Aj}P7E+$A58$z-0z<~+w4DPqludTc{1Fe|90|J=705+?5|$LjPQT- z(nrnx%92bd;R7hiyGQvq$oUpfexpy zA&&nRCb5Bvg&%u}kf~|N@k^dfmZfwh!6@SG&`TY5>zlS8)WdF0=V@(}Es`vk( zKi1-Z42Q#g{Lh^{jpe^HnmFz$q(7cw>@j3N3ap{zC+5X_u-vC6+4};dK5IfmcbAWr3w$H^f3hZkW*LE%s+g1sUPy1E?@;{w=2zQm|qp% zO=R4AqVAh#rDPSTBNKzO41y0C8k9VxOxvOTbb#z=E$y3A)Rpo;U;$NX-olT)uTh_D zP`aAz&52C-5e7eoK@hOFRLjwJ8w^)S{Gx9z)j= zeI;ogUjV!y{|{c1T3L1QH0+$a)eX#ISis!R0ta+uoJ#F}O>{Ua4{f+ShskF$Wg3^Z z8C0ibX`GQ|!^v3In}=o96f7Sw`u6s%1K*%Ieasa~Ync8ndb^Zfa8kN$yv!?BhsDPN z%}UiKs%S7bHP+Sos~#2%Hc3V@Sk|G0kQ^we=wwlWh`jfUQ-Emd4X4OFcpKjFK9{Qr zouaa2Rp7LKMYc(kFfMXOFn!I14`N!m5AX(G#IoDJy3GjlOq&sBUc05N*5ou$-LT`F zc-zW(W;HWY-%6un=YJCQ6Sz{rrnZQ*aGjj$6_Jn{TCWN~58x!mWnfJK2(L^N9hVCU z;J|4`ibm_1JlY0wBGS|nX6}0tJcTTMA^=)`6NS8q|5F54r-(?3V??l>@S_iL4rNng z<#GKIu0yn8jZ`fI(hDlfy zMOscP&Oa@NPZh32Np5Ok_PBQ+7wk>aZcnd~QsLDg)5`g^rA49Ti8o^LiW3d~ic7q) zj*p0uP!<1{BxM6m(#j=cp0b-!Jmxr}ta0IsYn{^ts0}WSIZlik?Lh~RIMM9WTRko zzPGYhg+%tx(uFPUzDw|XXq3jJ;a3q-|94M`ti7~DaangZ=V{5Vo2MYha!u=VuV z_<-d3KFsqUlK}FJf>@;Iz2@J=jKU;Fs9DQLxU5Iccr3bR8mkEB~FTI+Fcr^p}O zZl!G*U6B?EKpcjLs#O(It};c&6P52(3{n#@?s;s%18IESG)s!aPa=6Ly1@DV`ugIE zD@?2PrEJ(q!lFF)7Z8opqA1ebq+#4HnzT}s9wZr&RM~QKPNP*`!0hb8>4F0iu8Mu^ zQa(y@=JSI3bolHODbIgOd{rrQe=mlEV9GuTHD*kE5B92#BD!laKIlB(BeLc4ATN^a%67R`VwQVwN-N<2%Xxqsx$ummIC@*D!)>NSy zC^3mMf+nAAqhf|rXGp9Rg`4|bP~b~EUFt7- zC1&x%+Hpw_>x#-)lHW~M)Vk$Mfww&q9T26~I3tul;=nkFK+1(Mdvx%{wB_TK_3QQN zg>Ws--XDYO(~FKtcU_h!J8wW%y#O*oklH9KlyZ$>d=9WsDKUxjB*1!c#8!!Zi11d7 zTueW9yS$U^mCyzDO5pisZG&k;5JQ0&TKQ?$_8Bq2E~Qct^ot}rHqkcn$+Ao2&yEFTP;A^ZX32p0#@<&O&pLL_Qw{0wV}yZH#uZ3f*vQC+`BnUjl7%* z4FaucNNuX<4Qbj$b4p_JvM*lx*!Ph6YW7ckE7U^&^PU{q>T7|v`TvbH`|r_sJlyMl zcJW~S&m}BYSxl4d;3FsAP(mc1vtaWahz2R}GqN}2P75I?LbV+f+*WooE@IA7=g zaQ>IW%@Gj2wi~QwFh_)q7&&emGr7acn8`-dsD{HPtILHLvL=)Pr8vBzL)c^hkto9I zOA0s+^A2uu1@TYdHq7$EZaXaid=%aIzrs_8{xk2@{1B6VuXf@;`fQ>9WF)Pd9q z5bZUl4gzFxGrX#*!x~|(2KxAjd**(7)`il>w5EY-Oc7KK7}4M3i0q`vNULSwGCboGD1=1)1PXKkdhx*cwMK$FAD7-oJVOAWzNB_NQ z68W1v+w6Y_L(TqYHrU7i+{t5-|6x{0!MmBY3wLa(ZS2CSi5w0IX2thO6iAV71v?&F zVc9;$lzfVs!Weyp9I2445yfhjc@J5Om%c<@<1KJK^km%HwJO;u$teW@l=^rTaQ z=8?|3vZYb8(RDC_q!VRtH215n(XNV`zi4MRv@E@~7e>Ux9I+UhMY~LC$uRpz{B{11 z*a1$j*TbB)aq#(PlEYW;{vPPQV&Zj5Beq0r17zErBFZ`2DWcr1mQ~1g%-g)tLP(!2-d0mtu)uVsJme4Y4_3H_TfxDjVa*(PB^Ery0y)T$I-T zJ@LrMevt80>7;Zq(vhcu5O;6~Hz1Lwp?cs2p76yDC2$1n&@$t^-^7f{5#2UYglRP& zDuLO3abwkTXc}x~zC}S8gYe^N`8BT`w{pdsEcE$H*{;0|&?mM74!B9KI()7$Y=Ril z-MVkYUfyQOl1G!rVqIm=w)E&3MF}sC_K25>SmXaHl^y7i3#(C$i5qInv#$8}G|NdK)UCTT7tp`sgOL}cy-l;>D1&|Wl)K(~U6P{Yb*o2^ z+U{p7Q|Q#agxUUSM*pd&LqiSVHu~S!^nb(QXdnM)CyyxqQGexTq942CK%0-nKf$Y| zB84yhPD5i_uT2d8G$NUCPZ1FJBuyE8$G1GG;_Ow zF6gQZN~V+9E9QUnfRWXPp=ZQzOVZ>rKf9rB80Uo-`%vzgXlAyju7B328T}`V>5=2V zjAt`d{vY;dd;5=_JeW?s`Ive%$1-;1NN!2^7BuNr@+1-#!Bl|6KROq!C{!;M!PMht zC2Epn(_sMh3LJ0`VZY#^T`TaK>PZ=^hxVD^CN9&d#~l*~d5P2>CWY!&-pI>LX3 z%d6GxZTJy5J;yACcTRD{9N=*bZdXyX0l%%hD7+03qexRcA#UdvNTB2L1!@CLP7ZFM z@2zqO@?;6|0gh00GL5$(i~{0v6ot#MfB{LD9p>QRW`n2r_4ySl8^&{-ptb9E&Tc_Q zH~;}cbNJ?THQ;w4%>{k~!74|1=D@?qQ*5i3Olc$}EStE}uE>zygG|A-n+rI9I(>klJ*0Z)Jp&b*G9Cfue1SYBX1$$aP_tZ&F5)Bk@Fp7z}jMji$ zsf^2xt=452b-l~@5s~acQmx)j1av0~OB~TdDm$X(jh8vyGo%!j&bAOoD(5P?0->V< z#i4(fl4%Ch2;0~Hn**HpPILOgdZm(eDzcvVezJ-SL=q4MsqRTG)j3youb{S-3%VpI zm^6EAt!hdF&4jRPgBr_0CAFo?10->Oikg6|3KPjgHc4R?ZGi8gMZp#crHA)0?dQDrNGM)T^BHTiGAaq)k- z|BC}|e+%MmEbq4C$fTFqb( z<_~HRL#Wl((#t|GxOq@(6o%SfEyYc<{m()|KBoS6IO>no{IA2|bZ`H;lLt#T58B>l zzPHw5unIyV1tpziD8w>BO+ZcWDr>EBm>H@ZB+IZUPkf}N8UTHXdL5Ltm#e(MBY{pw zAF{B3Dpq215-4sH=mMv7tzg(lEtw>b4u*619N>Z=O@fosnBZ-g7bL8e{GJSb=`JaL zdmZ`(52;d?qA6auzn<2N0I)Q3G=L_8Gnr(eQt6S&aPs0f!DEX%W^UQof(a8opK^I= zsA-#B%eWFHx-_KZl{T8>b*+IEWXq_8ZyQSiaP47?yc>NKwPscD6=Nt=1`fNzk%uwz zZj7T?)-*0s<7atvjYXP{v{z^8+FPnO^kseXLN?=5)o$H6@ht0G#%Rj~sjFT6Vw;wy zS^Gx#P3NKRPB1oBNmLBGKx&qbHHl(W(v&g@KsnAhVFgJhLPwZvWSHq=dT&T=UcjX# z(Ftxt*8obfAEGcXuzKl$B|#Hhxw>-n0qn0{z@-~YiOodioc{e@cfJ=%9PK5kPdcOC zugYT>z;(EN__hp^0A$Pfkdj~c2$f65z&?d!H5{11+q2}CVx|g_%EOGUYG7N{W=X{O zT_Pv-*R-%L`C!YzXV_2}+N>l}1Xe9hQ31Uki7J*Uj>QF|~3E zr7bUcu6V^qbiB0OKolSiW)s8_cY0foMQ$ySACJ`1225nu(sm0HD>Txayt0j=kXGsSlTYoVky9PsqmWVx z)<8z}2Ah%45^{a=`38?8b~+6sIEMkiLCwNqgH8(YV*x%aU@XeBA-y^lD64c?N@|~y z+O7atyInKLxpsP^LdG#&DQHJEqpnfgi=yPi1q1OW_q_;j2Mw06*71nt-Wq~@m8KC~ z!np9F@3Lf-=AcLbzPnnG$S%xJQ)WRpLp!Z-{0bm;0VdOzLcj6in#(21uK`?tXZto! zSNb=Gb-F6hv}HXQ7cfK9EcAdj7skdOSY|p+f-7aR4WnZ2*sHcsl+}BZrsxe$l!rPs z=Tl(-(rh7@1x=&RrVb4HVAuykJs5s_6tUCvcNafx+i9$rX$4UH#$zz(&#bul$?_(Q ziDd}U4tr5#S=)^5i>o~8Y9UH1IwtvqD1i0#ej)TeW6lg+57Esqbx+`*;*GO*#HZ0tHem2Ay43BdA9Bv z<`M%GHQiZ}H_)fZ`SI-Y)MQBvX*)wyi~=js)LR<1T@u3@Yht){zyId!{Pp{* zHii$8nmbMRbB*@EgHMX z_h%NaS;%n`UqzvHDg{+ZA&>xNwwd6F?2t^Df%X|Hbi2N2RLJuo4`e`NN^lN*Z)7IE-rG_QP;1F#@i4p}z zC6RiZ-)ezU+-o*bvZRBO97$hGltsZ(g2AYn3IxBGX@g1wC04Dy+6m9`&6Dc zl0p46^1|gcvt`@m1lC4W;}ctOBV)A%F+*VWS{UB%y*>Y>p1Ss*+!EsOJvthsB~5TQ z-m=;pbc_A>Xr$%;pNyyb_%AzoD)avr3kYta6(l|yw@HTIER$6%G6nE!as!Hmhn0lc zD(>9C+azOtQrNjXBI@FbtZ{-NmAt%!zg`zpV3CDe%uBN$$!dWb`1LXMR_4{ zOpa0bt?i;gEF(&EEcqysAlcsl^uWp6w;cd7nB(-_Jijs4gfZm#S5c=^Gix$hwq6{N zCVRj+yb0sOeBrR)J)i#x{Y3))dLrpl{3OeuU!WNmDXHuJ_22LB^}HWm5TMWNlqKi- zHjE%&cQ}P^QjmNghAPytE6j0m2jFbK{v!DhgWe^WOkW;PrZ2(aI*kum3;z!M#WD%d z_xZnlkiUUXp8)9-DRb+EEScdtjcJtN7uf4~ldRCh$Ecs@-(Ic9;NB+IEgnaTTrVEg4`E?o-xO9_n%#Y>Swdp!#I%%CKsZBM-uGFe&)H_l-F8n!P z-N+y5ixPlV!hro=xV1ek~b6ecgmmWr`h?$D`lcGx z*yZE~GN{%{6y8FA<1;-P|M_sp1rkzYa)w*NJV#rM^IYNMkL9;xVRo7W7q+JXys)!P zDmECek0n9m;=8lgbO&Oswlr@Qhe# zq(CBOzR3%?lqiT+1s&balNeP2nqYY~eSi7p48zi}ZT#1_S+cB$0V-LZKJUet`!tc-4{&n{ zZ_8?U_w)B%1&IJkLm8Z}TZ#THXLjnRFdSSc{vm{=k5n;BArUa<`hlOd!Yr`q=4s9!vKtno} zanqe=cghF837@UCbD(@{EDw{cSIgjUt1yEBa7^9HNt`l#O`F_;rI+Tc2JnQ4Y3yp+ zU>_tLD}^Z}6Y@+iE+D_eS(8aOdkXq$RuGzb+>y74G*Yh^j%J8#E1SR~Vx@oJP(cc2#Hwk@12_lcG>)#U@Hu zA)O^R(2O-VO+0+w0VMthx$e2nR`C4f3S6C@ynO>$n3@1!6YKakA)Q1ebu~Jo0UaP& zs+1qu#fyVOQDR$7%{coLzZtHh}(ksAMJI^663cJdJYU*~#(!=n&&UWm@x75YE7Q%eDuCV?3LN0J-4mX4(0#amH* zSE;tpZL9SVl@(mU6wlJN=qC)G6}Y+j+8di8xZF$@CKzDk}PZ3|0}$ z7%b^UeK?CGFV0D74pc(;*$f5~kJ;aqwME~eI4{*f{D-6=k&4Jtjina?oYQEP7cl!a z%<|%wuvmOgN-9E&rGm~MB&Tvm8-4F3M#kJyyheE`_6=8Xt{l1tSq=8F{5G-0Lit$wbdx14954=-RA zVp@^J0j?yJ_)aTeS^tRq@@o?=xm1aHn!${P^fZW(7#3D2Xiu?Vq-XgVvFnbF=gjV zpIUEw3ChFvyaeiZ-0%_};%=7_Y_Ziv0NZBP*Vs=5_ff9-EnGvseGUSA#PDpq!C1h) zPN-3mG{NrU&tRoGxC--fB8{J$Pp1h?z3p04MWt$|=-X0;EZeCq|DQymmlHuw`1$a2 zQ=9~lC))b_xg-95ICSq8ABgeZWq&^$YLTQ#l*~6*X$HOEG>P*f^FnGuXZ`pX?M5&w zgXIW68^Zn*YQp|CpH}+6tY{Pie2f3bU^dqB{|*QH{9ikH@D0EP_CMwdKbGf4Qux(S z_u(rNA+8XQWDv>W9n9`;O70+lhQ1@U zdrfcoNa`5)5!F7-&{3N>(6Ae5Atc8=b2H}s5IT!{@r*l(s{k9|lK(dMEsu_#1=&cB-Ep4ez`E^8~TAL^76bymlP{;J0LgN^eeeNs?{ThrNvP2=yr{p_!%DE z>rG1X8e*!$)ACT}fQy_{c8LC#+!x8jisX+J(zvVAoY)%s>^Q=apbxZ)^qvVXCdpi$ zHc0}ls3`!+w>*Wu$yR76@mR%{zBIX0mVh+zBA-`L!hTb70bT_DCY5qde!70=XoU?U zC$?Tvd{Zk*N<<4p%>1j-l@t-mOTF`q0}5>@tWN!cKA7=z7DbVM2a99JG;3;UCQYQ+ zK>X{q!+MqyA3DuU-v%J}7Z3?NB?yeH6@qoNaUTjly-NJM>Rwb1sWj(;cw%Ucj{z2E zXa|gyxAvwv^mIF1(^6tkv2B1Cy@rvu;n!HgG@@S5iKBEIK7Li6QV;Pa#4UAI zg#!Fdj6B5CI+GASq#-dgsG%hmv5`TsBqbK~uB3bkp#rq4L6gzPa*h;!^B{&I2&dIp^y$_N$Sn9vYHfB-)@0w zBd#iAzu%sGS4w7UzqVZalE;WW9u-{;Yro+B5z^E!8Ds4iT1Zlf z^Z#19AbxkO=&u<;6gja%jpUgo zS;(k<4D%w4=a|sTWbW`eIEg-Zn;fJWyoDL?Vjvd}Z+RfC92PwLhl=K_swR7?#-yhr z@vd0F>_eDCK+q@>JlhvPpAuEQ(yZD;ROa0pW?2{*ec7<57FHtIDq&GY*UJd~J1BFc z_iE)xf7Z3P*VX;wV)b50Qw}@^LW&@2Yg--Q+ax1e#VUlh)-VaBrQZ{)T>M;$B}8fG zqd&QcIB!wDq+t3nWp4ooF4JQ3I?Uw##okKc*JMdg1hs@gxY9I*Y(iV%-DM+$NOEV=m= z`UNLx+%J}|Vxa)O%Y!7mpGb=FISnm!wv465O90lEsavJ+<{8kAWR;!f7l7n9S)V2O z7a$w8#AIklE%NvIwz{(9sjnN#TYgLeUQc*+tVbl-1`v%hKL+3*$HHqH*QM zRAK|OpQN>v$>^mAH9zFi^`UT5{<*SutkgA+W(xp9r(&SC_k`RdNCbu%#)*ZAG;&2Q z7EG2*Ca-zELC%u`cwp^CVE{A~4)E=@L9(c)xqEaa-UFVR^1tXRaQJ@dWuX_`oW;Ll zE4ytcfi3d?WHM0Y|H*hT-OK;GcntAhnbU6$JS4#f$r7Yqo_|QP0BfOOoUbx;S}54g z$bsi)NuGmM8sH@ZgRsb%T#46}_52_?q0oiphID0#_sVlbOb|QclGwWU_1Y=@4=^!z zCx{e?l8eqz@WT1r;uKO13=DLLNOQB=P2~p(r`c*d;&MqaR7ZGnM2ur z9bl+%6-2dB%txBxD8Z51s|ifQkx_Ihyg@mHXbWM7g!9!BO#0@bF%~lRmI1~i17lx~ zvtaL7*_x@Q#DZ5@M8|?(xBeC#A0B?aKK^?Bf4*M#Xe-B~QGbe6?&=1k|NfN2j6{Q= zNXvWGQtP!>csE`S0h@oVm#Zv_lRR&R<^Rs}Xqg1?6%CWRbF9Mb{DE)7VK4?94B0ym*RKRqE5 zL_~gSU|b0-;v}uLmzEQ8TF?kR{~z9 zk5xL0!=lDD&^G^%;Z(K%nDqO5|BszKhVvgg-=#^Av)rLt&Q_M+&;i3aKeDUIg$m#v4!{j z5_4CW(^jnFB8)&fe;?)<^nwlO{RE8t7XIYK|MO?iTafDmGNGS8|2qg0kVg=vUL{dA=37BzjXc-%0GdHZqxr!1nNSge^!AtG`>Z3XF*qkrZ(OHtO@Vdia|bR z#v-=(O9>&(y%V>cJ<-!(3h>M#7dg@ zIEutN5N*0dWzfw_7{m-b8+wIfp{FlKXtb6#Y;r~DAPu26^V6eCU z-pTW2o&WH{ddSfa12CTY2&x5wK-N9nyfl5Z8`5?Xd<5`FQ%i}k;I~fVcx=+`Gh^5#80=v;|Tke zz-oxsxIP8bQm7__*-Qu)&~6OBuIT%aHf#bfT1k)IkWI{O(AZwc`m;SX<-b)CM)~1; z8UZtG6#i+O{5PErwfKL7ef+20JlOw#9WIZF4@ek6M9p6<(XjXncubtZa3s6VB`j81 z3_Or0w*`ok0G_busAb-ejv?oUuxwDR+(iI*7^OS7ae(vfyLV0*AL#(c$aB6qxpdHf z|I48fl5A3>rG*|&p#g7UmciilDhuQJ70H4T#`CjzobcCgK0<$m-N-ut^r(X#jD5&% zW|v;!FW!7iGf2Yhi#N6`d!Z`@c}7o?B2hZYj=@OcCG zu|6p(Ml>S<4b5T7Eo*5wX8H(;ZX$X{N6nzQ&>*uQ=RY8FD-Q@u5Y>>6J>G7VxZ3Zt z8%wsgyWQBF!S>9%?(z1VmaDnehI{ySGiXMRpujn4jmsS*EgI#BJuhr`);fBxUaQ}6sQ(uQII zL7Jh%5Ha2bl$2;2fG!sNj{^>9`d|F>GD!;ICfh3(Zjrdf0+Q0enMcWu7h$$pK>*|y zI0r0kwOIrVm$xbya+ehfZ?2R=Z$5z{xxyjxdC4*e%rRyjN=q0}<;ejJUO8%Dl_Tir zWlni$#XzzmG*ju8K`Be~ZsISmLlTxwh{{bTrMx{NbzvYzX~IRsJUjPN=6VLItgE*w zH>#BsPP~RGEa6m4p-|{4XOJ%c*NJ}zGk^{M!6lrBd68}C^&!BF85{&K&7kiUFgOOQ z90GZgNKyzf4{jLe1@wY$#X3mK;>xz-Jk+|g1~2U2hTU@Cu|ni`olPiV^@t+~k#yh{ zXb!0=#VhZs^NL~8#`e(%OBC+650C+$-<$b2=KoY~e_a0GpN!P}55wVfZ~w8Arvd-} zfgd73UU+eU4&7uySeHIsFRZwbx4~*aVWb@NTva5Ph9)rxU>YSG5@?%oI`KG(4OQ~B zFPGScr*s~zMwP>SYs38ap4oa&v;ChJNrt`L8WDhP^8aY8$^YZoKK}Pkp62qu$iJ`1 zdH^^*y@?mI1%nf+lnhvioMk=+h=J(J!vLt{vr1b$QOYy=0V7GWg^7^>#gAN^Ojbp@ z5|hnvt0=8JS2!HN-+Po#w(;nyts6nxIxHzKSh9W63=l_!HO&$L>Cn^`x7RSV$&V=? zPZ1fTPPb1vT6){G_gW@9Qz`R6Y#EBGs`rMtmn_$d8H_SiU3Lt-&>&9%QE1IlLm|AUvsVLWfB0obzt2mR4lmH(%c z!G8bm;%Tt|e<70(yqjcIP}OyoL=jeDd-JM|&({qtf9=gH)c==BQdI46BQ#M+$5+Iv z2KW=m;2eJZHjD${^s;~aBlx#xpYnw_oJ@~N`0QU!F3-=-zdHt(Wv@U03!Y2uYApu{yFF=Y#8`L%>jUkESUt~!wgvf&tN**-~aCB`3hWkMFF!I zYgfs9gAWTBgPT?ueyf9D`yz$gOfY)5QjIo9EQxVVgc3+$2BI*AZpVFn_5P|zGT8YF zoZ2mVY6tAh&%iy6{bKttJ1gQ%ShW+8N*B|tT<8BAFg|I_Aw)3327K4D?7!x1m2*gR; zTYA4H894a+SA*HhX)ScZJYT{55S8zCJGMR#Y<(WI?sH%1^FZwLi1qo~@FVK6pJW;I z3$P6H!n?!ixv+VF7e)AbYn9G3FMuG7Lw*j2S#Ir5-`1ag%l?eqiPE3Gxj)b=P=~yr zL>hH~btX@tAKr#O?#b!4j*Q%ixg#TY(z+vKsUstIB6eihZZS^B%@*TyY+Z~acWmo( zy+%xZ9w~hui+vun>+_`E-r#+n3@Z9Ovh{h?y3a$U&m*DFgQIqR9yjdsxT?<MGO?5d#n0!Vh4HM9v%*1v=B08HjF^jJ*Y`6#R7c4G7>m z^r4+FSSa?WHN_q&6ni95?7^(%;Js`(crPm!jD@O?T2u9*wn;>)J}^@C?|wSN^A*G5 zLz3N*SgxeAgL-)I&JOzBZs$3GAJZg61Y`@_G>>pXjaA@0f!`7Q_sBF5S zyy>(tB-iQD1}*qi3a~>#&&%fgtVKKBaN+dr3ukECEW_5DWvFbHp}bj!3IPZbf3<{h zLF@^Vtneb5>TT(zSU$i3ro#fHUY0|wUq@?6-^c*h$yde|rJ0u3w*>;~_Y^_|{v7Xkkd}py8hC_pRL?*t$Jv-R-_RmAXC9yKO|J z?@rCA^xb-5y$KarLhZX#5tV)``aOMFPtN44?&ZWf{C%4++ixw*_7!2aFA1}4`#hU9 z>+@_@(PxV=+ixw*_7!2aFA1}?`%L;vUt(qa0e;n`W6+HJPG@%V+qVg~{no;5U*X$* zNx1DFDdhJy{0O3Cj!#|W?hAFLBlWsAZpAa`aBi;+;W%q8_siohR-2&U{8*kjpyX3YCO#X0s7E-Jjcp-PQ>wS zClE{;3PBUQ5QGr4^|_@$aO4h0N}tCrVP<^Do^-wAMJF4ifSsFkeTK9LL^ml0NZ{0c8iOvCniNGr=fNmJkHtEskqe;L!YFl|_He@vdiyAX)5P zYjIk=lA@HK8yc-8Rsw1{`x;{O&|oFN6?E`DT#|7;*Cq9KagC3AVmjM58Q-B=Q+4pEmPXx&U28#A`9npn9)}t zBhEC|DVR1pbWyuHEy5?=-;h>dx$TzogL>P!7qG1m`;>voIQLzb-HE$VhqoN!n z2BHv&RcvN-Y@%Ij$xadMj#M<{$!Si0o}MH=BK5Egx=jFWC4Zudis&gyp8Xn7Y&GY%Opq480UL2fdM1`|}u7*3vxN z;s9jO&mii0atnNz6}_Cs#SsaM_Vdr?R_&zdsL-}wF(_=d#`Au24e56${BTfn^`-IURtdk zjx1MIM{RGaUaHgEH+GQSQ=Ki-2x6NTtc=OSWg3OIp^rTxa&Vg^OYjYG=OSHic;h^> z-#EXt%1#-sW>&&9vrONt?exv$>6=wgA2UVA z%T}~UC&pMmdMQ|VaS+i7r7Q)H!L*s^H=0^SznNtL%-Sx1scaoIvn&8kp2YLGegQ4p zt`XS*h;eL^n_r<{#EmU~g zmI_a0Dm;~_aM?kb3KKJ7c6UpzZ`Mh)T0%ea!X*#ffOlcK_Ww#r&Zr?b8dytN-T_nKyKN2g)TqXUARWdwkMh%BYn(mfZMvy>WSb0Lq z60dRU(-+2b+Yp<%{G=_HpU7N(B5`@)HkC{9d4kC&(fBOk@&;x=NZ6hwNx}2o+WKH- zIP3g#H*feTw*fdfMn?|Bx)1cR{sV^K(n<+$xQ>#LBWHWaf zwKR9aHD^jEUy7ZqdEqo{Xqq{+n`Vw|Hcq3~HclhO#%UzlIEkHPCTitz2E;)^QpXSQ z?nc5!5a&rsRHT9n=y2LhEE-O&2iK9!Dr(f)Dr%%yMU6zOsD5u~J)P5VUWcVfa*P8< z^qGlU5YAyb>!!FwG%Iy{rJk z7r+a=6yHrC0))@*=!ehZ)9A6voREBL%oYWP0|gJBT~ECJ!p{te-TCjAWd64V;0y)Ep4Z8 zO?Bf9%$=dK8DeNWhCAC-guiK>LeeUkHM}L`q*&lxJYx&07^o3bSQM(lnEi zm^3@l3?|kS&B$WFHEL_XHF6aJ_DCECU0;n(c55#~G=(k;a-u0R=q;l#h9I~Bt1QZa zH@BK}k1Q5ZqqY`NiZT93u!y3)Fr#6UB3lcQiVQh34kq7nOl2T&vsD&R7Z2v{IcVtk zI9L6iUOnEeMj?wAmSV9Y(tIzz^?JP1>I^Lb4v-iHF8Cf&F;6O z@Xdz$^MTzI%NAj)b$~4;zShVUMK$b=Z$`r=7PXd&6rpHT4-K0<&|Vyn(HPc4!^+9q zqM`EfdT7`fW=noKR41ih2Mt@CqSj%Glqf|*c~Zt!G|ZFII&hE@H)tqNiX9E}q_hv$ zqmD+u4jKbn#D~@aAC!0x@@Uv>(XC;8+Kxuw9mpY7Mm^n@B&_YUNp?=9} zs?o5KvWK`}4b)ZA-;T=+p=?^M5W(waUkOWjp;~wV7=G{Snt@c%AMGlJ`J9iQv z?c_s@T{i{W{iCBs=d+_D%kgYxW4p7~YaE4OUL3Bid23`{yIu_4CZe&S$OJ z`AlKwGnJhWEbbW}!VJz=UKRituff{Oa-7$kn86xNMo3dO>|1SLT(hrWFK%Eh4n(}V zBfft>Uz}5W!JH(j`2azX#D6XDg~7oF7G0363Xt5=3<=gQnJB@mwNNvYg_@Zv)M!0I z^&?n7oLmRHHm>4T4g=mhtiR_w4#wV11c6lIHp$R<*m`IZmS$~*rI{?C%oI6E>mKb> z5?O4^1lH>&Isnd1uyE-kHhr&P$uwt~@2 z7K~Y%Z^OJGD;&F@ke_55BWjdpi4XIf z#?cPK9IgF8^g%e9HHz$WG_wTunOS7USzDQLCd-U7MP{t296V}f9&kjg1LUa8VO;4f zO>W}JU^cVII3ng4xV5uonk8#&;e`K!Ac)DtqAfy`8Df*+d=nSm$B@omBWu4So3Y=_ zB5KdtirT26A~;BLgKpr0sT>XhPZZdT)s2wO0uA(c-=AKBWte4jYA21HXO1Q>)!R}^ zT7y*@g+5w3j1sYIjo1}Wk?3s0XA?`>OC|E~Nis=aU8Fyvj$pqmQbifMWR)S&Q_2s5 z>tDiKk2u>sr&rrFJZ9u=5ce+<#xQxXA+pVKBpBpj0DaU6G9Qi1LyjgE>yVk{j5BL{ z#+k`yoSAaQ(FYSp97l{4NkSertGw`v1&`B0`0H&LL2T#@y#PClbMA}>qZuWbjEu1{ zvQ>PNpC>WSg;*p44N}cr3+7mfEti#vX?DPvR2(pDvR*4uZ>l82nJFi}GFq{?OfO+x zWGlZQK`-!P$GLA1trQGo%b_Zlau71E*UX>m$mY&9wPnL|m) zSyYl0sPEi;`0i!i^NQXgq2>}~m{7-?1@t(wMLDKentR^X#DY}qOI;ty=b64WW+&}q z0rR3XT?&cC?@_bJBS*HtBNRbvuiH=fk=kj?gv${ERw?x)_adxbknFi=niL!Z#`BAn z7eyPiNMJyQq?urZ{r!ILG-dnei5_eIzsol#uYY{=@Z^6r@;^_8LnZ&;WHOlU^Z)JQ z`3js-zY4@XJDqP=F)h^p6f8wIA1$NWvd;*tcdgxC8TlakeKf??iAHb*1r=IY9lKw$|VTfnk ze-8Hp4^yXu)2@a&@WA&lT7tK9Scp4mnYa4-`?D)>`u)k}H8{Hh=kKn;k8e)Sufg>@ z@XZ@=c7Anz^7ieU*WmTp<(t#%w|~PeUJ(b{PNxShND6Cz0sT9Ca`^jitI)sep)FE? z`6>)xUh)KU{k8%8L&FA6(-K)%beY{|?tV><@bHQW*Ep^dEM?ZJ6bS+v$NT z2yr+6{!4fl+8}p3J#bp0^g7J_Bn!&Y0eRuh=ZD45`Nj43zg!m?s)U*Z9{4-vWKDQp z3_l$DizLZmx6|wOIww&CF2nhv$dL>Rvo#Dr4_wPjn_3h9!C0l0{x4v(>{0E*1DQZI z{hv+8Gd2J7tUuh-|D8ODh7rSLL|J+yC4Z+Qtm`lbX%;TMEQ~fJDKsL&SOVSP^?!bH zMGctI_I5kpCm-M%W-q`8NZoBoSuctx{m%i;Nbh9}d4e#;l!2ymrbH2wOuVE~53thzW>fMdQ~@JXB-|7^_hMLvRlus%WFGp2E3lFI z1b%>sx?gWnMBUlwp}&aQU8MCok?%=7pz}#MxR#ku!6&My1)sn_??3+&d;(WEN9qQ6 z@y2-8&A|d@*!vG1ba~Hhv{Dt{|oG+49#1pOMSW|QdH!fi_Wh4pTi@^=K zI&lHT8XY+WJP|3sfry!Z!jzF|qwoxr8N<=a@FG;dm&Cb?isCeX7(P*?tTGsYRUE*K ztOkrw*{JI$0U^Sf+Pfb}Ref)rM$_&&^Yk`mknXGIMJzfCft z#0=xxpc z&73ChE1Sa$)(ZY@m?Ov$`RAX1|8LX)V#Fmtnl~5*1k{HxiqIsHlWvhvjU8VsR5d1a zlZhXUxRA{BRB9D!62&OaEEKUMg^c)^J1`Fm+va$el5I#RA`*VdV)MXvVF9vIg1p(_ zI0Q7NmWQY?R>NLheUFx$y=9kp%M&`47a4-^3H;M>&=6jFA20+4ttO;zyc|x)26*H{ z55}lwpn`V6FAErho1|C>6X%hHuP^X8XA~iX2#G6}X3&R7s)m+*FQaxvu0wUy-h2#m z?8ikfOzFgsokCFzuPm<}D!b1Yxfqp-6ZZTD5xeNJ$B)P?Pq8zvVj+EkA&Nc$k&P;OZLc+SaY?eH;~RK(J1-U0_c`DoMIBxySJ|-pjXhM=z5o>M{{XK5w|@0>++2i z|KF9OYs2iicUgK?8Fruud_faZ=15=f0RLPbfF0jl;ri!(?=DMwrmtUol9rr*?n_vH z$4?m?9;UxgA1xT*_@y=&kuC*G|0F6}!%UmvEVw6DN`$dLB@6tzd=s<}C$N{!<+HX# zyd>iNnnr72GQ(T4r!nb5eN>hWwl-Yan04^MY&gfeVwO^Sgt63G6$6AMmOLSHXepS& zu67m@>j0Ru@TFGvpxkY`#7B+XW}$PsV1R(L(`16&8%K%*P3Z#(v9C|7RLB~{M`5Ip zR6^9mMitI(1{Q2N$y4R^u1c}XTx#@!qJ-;khE!tJP zz%o_YJjy+ivhB^fN=P*}Vy|$N=axb4xJ1l|Yp}|wL~YBMAiJ7YED^}&f%hv)C^no9 zW{~OB@yv>_+=(y-q;X7BDs~OK;5mtDDh(>rBw{It=f8xPZ^3!-+iy9EKNQ~YTe}AX z%0NQ*B9=xZ6THWxHNo42rZ-)3r`$+AX@TCP-HhRG$}s6YHn_Sd#a)yN+BJXCLORK4 zN?rmhws4nfvX{9EAVIcGk|j%MR552?#&4KdD(kE^=NAfv+7S|hmuV0c=(&4k<3PVz zN4cCK_lf|z?MGDwFVIaH?j4k?8U7bvqv2$FKJG6jqs177AtH@C^Cn1;sY zDs}|`*$T!Zl&F!|h5d(N;UA@_!`MUK&n%~Z%D#!Tdb|tWQNt-L%e_qEdT!bor2_1J z%;H+4%^Xuja{|{mz>h%Ogsjd(hh{imEj|)t4Wh(FDvOrPx;vahAQIbT3F!H zXrV=&dB;ft3avat1Ic!dbKA7kx~w``!(E~CIxg~Cva@&3`Y?K;Ks?bj1!Y>b`VD z&a|)gZ=I&*hR2Mmcyi)C1Ih`+Jxh|LrtmLsHIO*oY@rw~i#<#@m9}5TFt2yMqnxtz zXUe7gdqp?k>(+oq;A2+suOLZ9wf5GkxtFN+6_^Y{9^OGfUyz|(P$l6Vsh85kOoTH? z@2%U_bGq)sz_xSdkM#SUS4iK_rV*!GtwLm^G5pro>e zeT1=p{@aI+k8_sEf5E1{EbdC-qFnN8*^~$(7be>ZY3dm}?x%Mz<+d(gtV?oKRA*T@ z{Pv-AN;*Yvpt5Sdqwyexit)(tq$gw6x~s+`qeeX5&kpQx|TU+Yemz z**Rz3^1Lv(l&fJ>rdV2&N)zE~s`X0x=fA0s{<#koL;a2q%;%r`1OM}fj?W3oqc!1n zUCh0k_x#P3TopMS-mxmBiMUerM->`xgLYm{I7{w`m-2+M+ihkX`z%#y7mibd6S2)S z_u`Z{=%ISAJ~u%If_eUBvgLy0FKEt%@6i~%EN|>Bf(NHGY@<@s_f)KZRxO))$s~X*1n{cU@DOt{}b2$cl6C;>^4LpL6fs^`-ah%v)Yu zUA=#P?mhYR$qU}<^7jzp_xbY^@3LqBKP0_-k+Y5d&GUl5tOfkNcD$R9*ICl0Cy?|G zVo-Gd<~Dx_lBXznnF^A}C?a*M?;R&P$cE~?SR@1lh=AK)s%(1SQv)P0fq`;we?&Ps z_aM3^+-0iZ_U)WoCNOm5=%UH!1OriipoQQu3L?sHz^?@xNy-m>P6Xc41|S)crbv|X zO5(doScsA!-X@6@3f3Iib4-#{(40V&zr;h+LT%8{DA&TbzFFL6#~?(h$4nD50`)qp zy~os~17x|Cp=x)_`nlh=j;-G$BdN%#`fHDfs3%);uj_44mPxW+E@kVSaNSjY2O0b2 zdlzBc)#$r|fy0Q1s0$QyKT@%Ve|C|gyLV9(;Qt1f|3 z4`Z#vZ&&7(x{~??pFnd`J{a2ysTq(=N)X?98I5j@(HukatGP&(Ms&xcn~dcGrJ`kL zn$U)W7QXDN8p4HvajyijN&AF+|FhdR$M34iVZ(nBbs(Y#A)P%3<2ek#fm!JL0|of9Fdsbx?iMp z2N{u}h!}Z;wt{Vtpb-QzU4k;nL7TMpw({Xa(1rsIlJ&BTq*y^#Vflcxz`|{~hwZ68 zIw!%_B)6AUWkX-VEKfPfq#i@gN`y%2*cJkQ7}wh0#^5C>?rypEQVNx7^{J|RpgK@Wi3?dV{)Fz9~nW{M7L@z;Wn})CD1m)@;^aQMs zIC(TyXnizR{Yz2ed5;?6wpAfhCR*7du|i5Grf}EffQ*zyorX=bEHFBl*&F}ClAt!^ zLyB0*Nv)3ZZ7fx=1JhnZq{88M4Tr&NshB`-rQxY|Mrx~@O`58wGI>YtANfBbq96#) z0`Dd0f;o}IY?LzurQW~*=s1cG(9F_gSA2$ED8D7xLndZ_*Fe5V>MT*5!`H8_?CEQ# z;29HZ9Yy)ZJeRIiODSM8f1;zId}2~@bdY_e@qy_2QtS4x z`s+2RLICYVM>-0UZ)mC*l;xP@hXe8Tduw}#rDN=iCMM<}-=-a?POlQ_ZHo>hN)zrG8rCD6bhn349^PXdiqG&!lZ&TDS19hWdn>Sg} zQQ0vEdkLjV%~h@iP~_yM^gcpx&AYd+u4L0KCr;p=9KiEuY7$Iv;oh6fB66|)9U9`y;HMFTt@#RL!L zIK+d&Y!=R@Bnqc-G@4BZgHafb2Y58bXgKOeE%~Ly-2W*gX^Cn4D z0~!!x-;@QaJQ-PT3eD(7uqITWT@^5=8v~WW)j$@e*U6+Y?Ancut|lF>vX}9Xh$3>q z-0$+<#LYwrEsWFZ7AT=PVF&1bT?PC&+%KblU40}|rVV2a}*n&Ig@91kbqA{x)bQU5rq%$6v5-VbdExAB)9%tv0i+rVZA zv%YO^qt;~LRcWoqV)8c7_t||eIylGMKc z=oW-~^RnY*cTvY9n@sGU)4ZeY+D;Ll)F}$T$#X>AtTfZPL78#*wVhA@ z)Sp=l>9!{1ZDUi^_Co#ZNKbcAYNG0g&}OIFb~h-i>-f&$SIncHbCqUc#NJ^FzP4}$ zrs?WMK87(Am$h((1MM%t5bk)s;YtJwfP~r_Ot08Wt;Vk!pKK2kd(s`L65TyrYFb}- zx}?EY_ec zvyZ7Ny$-KAHlk98@zKnGRXlV5ZT3JxpJh}{!&li54d}k_ec=%NJ!}t$oUgu199-qi zVj1MYw~W$IPf|2>$%|%vq6{z4mcwfXR;>=?p3PzrB)61 zs?&NRkJ69*0?XRiHq3&A}9HQBIy=NJ5jJh91Q?mc~b@wywL=$2sRzT9y^HfOFC4Qr=eB?jag z2~YOYmjnzqcwsc1oc>8n{zj8uQUX|A(Lafz@fpyflw!W}VuGL)_l;ZvNXgZitUI;^ zha@-GsUA3)AdVaWd3scOM(gwmvT08WyZ4%dv?7~~sd629-kNYXt)N+`?`Ro;)bDl? z)yvlHp?}}m-qqxO|C`qk`aLgvzHKcn@ExvuzD@r_cDyF`dtLf3&Q5y3l%kB`i^GYf zW{FwhF)oK5HGM#tKZJ&aC~?4j>mOX)EOe z3gu^a8=BBM-LHOAQvls}xvTSc%ZW~EVgas`p$_m&t>k?$YfbgFNmH3Z97Z|8Dxjy@ z@7o126-f6+a}>??1$0z^-7luYLDd}3QN?mXNJr82FxnQQjI&!Heha6r+Utf-f{RPFwNTter3LA4U{*)3CtZ{gNX_Pg(}lsIf|$b$e?@;Dv4f-oq0;jKvmP$ zgzjK9P8Ahd8blMEYN)^8^VRu|yq~YHm%68kD==x*APwdBp8U_1&CEMPo-+prEf=g1LcZ67;ly zu0U-XNA(KXzrI|``Lhr6s_BDfP?$7jLObN_eOzsAECaXA&|88LJ%%|gq=)5B3%16d z1;V5FvlwanBz#*AEzmwNi744fEK%t{&hO7?icLnegcU@^xBVt~ z-6(d^G{Mujz5wh#YW26hM*KzH{y!4>7l19`-6K@_l%<2Jku4;?g>U)w@%AJx!t7yn);thz7m7e1nhFJ zr>b!AmV7KlsxAgf@;1w|UM#^L0Jg7ZYg(8q;@ULZf+T`@8Oyebk~g}&%^cN-B%FZ? zW8gj0^+=TOR6v@WQ-VsKOeBr+T_%+CP@k+Fb=3~HkdSW)u@ZNbQ=Q0<(p|{#P9Zm| z=!7Kb60$K(^clLR?(FK54>c8*IlZF^xgr1L5lVmqwPUN}yY-;t%GL`@b^Ofq$F`ff zdVR~7cwzm_rgF9Wg0TAADUP{@3_X(!eN-t2TMp)cm)ExYvO*3ft=lEEt;#}KpR9{Z zJI*R7n!P|9n$U)nYN_7Q%!|!;V94U4TZMlAVk!&0T;7d4^1stoB)cZ{<_dB$uLO#2 zYiB#nv@+x1aoTshCB$Pt-=akSL8p`3ztm}Y;CzSHiB%=(kK(HG0Qhfn%6i> z0lhC(Yo4`EM>7H&Y*>=@Y|G$#|xV~JjV7XWCo-bE{r;J$n2W`$~ z=ws?3@A`6S89{!%A)?r+Q1wghpLcIx!B^PV&JD@FK?#)K5OIiei?@iJ_7%T@sy0-T z$1nl#$hlAt1ep?X@C7X7RRM4XSu&>9zP68D{xaf8$8;5EontgtZfsW>0ER_?WPYtW z$SJ~F;26b2zqH}XKd{c*xT1Xd*DL^?d%y#7u#V%z9m7l2`0r7(;=ryk@Q>U$ygeJ) z9zxb{V%t`s)RT&|1@dxPy5x7Iql8BAA>+cBE_;pb z20N$R|K7!??XGVJt?PoeM)OJS=Hr^kHFq|$0a&O!#%OCm(egyZbuB2d3|kpifq5*9 z6ZNLECRmre?0D+se)+o=S_EtVlyK|p*%C<(fhX?4y*e&{6_}!5(vV8^y%hvl=HMnr5m}O)LL2}~v0K`?4;YQrOH*mBKob)|kP?EGfulhZ z4*<%!+7&l}`?Lg`>*svzqKx*WrjRg%yVmmUWej)k2EE6&EXdi1+JH9Fy1pT85xQla z5d5-8Xd@g}S--qf{H1KqJmD@jPh+!nQ9kBW2$BZhVC>z&p3%3~6nvRtdG--+%|0GK zykc`2I~z9@NM1=>QY#WKP?Cfwy1izv*bV7 zNpP+d96xs}g0GyK*)+xUj^Zs!q*-@ss%1hMC@zqFx70r4v-kGnJyI+1 z``v#Oh?*}zDmYHK0kJ&~;%vav5Kj~IgJFL-=r0CiTO?(M$T*(&2lLTH*SS$`wrY=MN%1`|_{A@dh4xo693?vqpFYs0n2ZCze|xxqn^m=-7bhY_rZwz!58EY(SzS}lKkLvu}cVF z6C!-C_ai*8|1(K8UD#mq*T;_^dsh)kAOv_DYPyn z%z5|F&%Xd;acUWi@<4>!b@x*vHUI8)`}^nbpTB?p{`u0M{|^8F|Nk^O05AYB2>|-U Bzc&B? literal 0 HcmV?d00001 diff --git a/incubator/weblate/0.0.1/charts/redis-1.0.63.tgz b/incubator/weblate/0.0.1/charts/redis-1.0.63.tgz new file mode 100644 index 0000000000000000000000000000000000000000..26b4f2e6bfef11ea46ed7bf078b62ddb2e573dc7 GIT binary patch literal 68677 zcma%ib981w(`S-NGV#Q=Gs(op#F^OUgimbSwr$(CZQJJa#N2t`-Tn68z31LKb-Jpn zZ}sgyx9Zp3L=iCPVE?(kXuxRo#T6M1#bwx~-MH8cSX3E}l-SHPmAKgDR8`q!)GW>Q zt&QB26>Rv#jV-OfF1y~GH^k~W+P{vK{?f8|TuKW(B63`D;%LNMt<{rX97~x*FM#2a zlOpf#l4{_bXq~W4Uu03eVB&(o#)8567G9F~YTAk9Rv~)~siEhL_Fwj@YtekRHKa{uW0ClFO!}&C z+o)jtiQy;_%VfVLf3lV`8AK!s=cHSzwVuy~c}>0dK5pvlVLqH1F@MlJDd=6NS@vru zw25U($)Rg=n{@c^MU7-{ph4!yboL_geR->42knus5+H=TJwWcU8sKSY#@W=~K$>qWuKX>w9k?FSIv0_K5t;#fY>!5Ors}cR_o(OJf;py-*mDyk z7-77Ip$%~ZCy5|QmI&B)v#J1icFs88w~%zWo4Md|A?XnI7l&nH3kg>b^nod(dJ!;w zaxe*>g9MM(s~=e>8QMg!HcXhQ6B`pMeKLg&W!ztn18A!u_C%q(HeF0jTe0i(ATBia z;^qe0)#{@ULqU(QVTO-TI|r0|ND^R{q!ZN`S{-T=kWP{{rJVS!$JBio5j0dO!ZdVE ztRS@W2;Ft--R}&=oyOVRmtk$ASy%hxmHFE1O!wi<4fwco7nxyoSl9mY@JA7i@05~JDn?DnGa@m^ru^GZQW0#4%^jBt%OtNXI^14aUS5s| z#$0ZINIRRzmV{izVMGry8=chA{|+7~0wzkX15qDwORw+-1`)|dUPk2Hp1pG`@ybuc zSA|b@~O3JVB@5X&f26kUx%f-0tvYpYjlvSa zFR}$W%-C7FxUw;sr6zM8JH>^2^+~2>wSS+~C($xuGR$G**@X*VgL#~N@T3eR;|c9C z2Hs%e47!hgZ6CS%lt-okPk;mqazcmmTIM`VtjEf2J7KaH%y6VWskOU4Q)96e3ta24 z55gJWMpOU3TCC4cC*Ve>Jzp+If9KLS8j0@h+Fdo|Ijkanxg~Y;!SC6|u&u#jBm-XE zdha+0Khj9QVzbHVoP2JA`T@-Y{%^!a2ReQEvc2wIVF2AkWYKHg+s&u^v1%}PzT@p- zn})d8_uJjm{ezdiwY#~`?W4J~v5}RM?;)MMo#2;nVes)}YdpVyd%fM=KCB(R#Q;38 zux#XJegGkPp6FKhaCBrdIcvyc8WunkI{GL4Uns9DW40)aU(4+3{LZAWbs^Z~KEaDb z^|zBC;k}j}XLmkpo@rC$!D-1$(R$*{S>n~RIyq#Mqew8M!Peo&Vk{gd)+ zq4l@yPmB(JfGUvELGJT0=L;q#&~{(Ci0+u=UDTD%6LVgbffv*SN8buOI;_Dk5?ApiS)!c3*l$Atnk$e?7-MPsye!Ps4l5ys3G4S`vcQkGXK zQii~V*x`oYExC;jX0Wwy64xJ7E2=a?3(@RV!25jR*Wn_e%fxWqae-etaov>EW-i zS7M6pjU*Pyy=Tf;x3xDS9UBu3kS`&Mgj~!>GfG&m!X0eHMH1gIhXu%GUpVe;gdlDMJZ0U{;fe_cAx?IBqAAW9kZvWI zTAFVyEN~$Pk!sC@698G$-WQ_TG5;#hP4M?BpPqF8wM4b zS@?b*a6n|=TiD2!3$ct9$1?Ow{R6xpU3rW*_mQD$cuZD(wU{yLfRHCQd!^vm$Xxd3 zz)(JsIQHpB&_hy0@0?4^RRQ&Y&D4CMggJuve*o`4K{-%Zq1>{UPw$UfD?y*PGoD{^ zmL;47_8j`Ks`ozrMK2FTX``(dUq9~9m$&q9hMlK$^!f4JJPa}CExYrKLNOpi&L<^w z%D>+KXxCDVJ*{SXVrp-&rQyMmv;XpEYEbKIwV;v*5C58U?Pb{@wb)=RS( z=4Vc${d-b166Y&%=$kkC@1gIWLTUxr4mt%7bQF6wl3Cf$XZS+slDb#HXE39~sW65Z0L z7G>gIA{HVh<|W6O`T2U@UF{!U&-Px1U!@0}cgkK}R(M>$zQlDJ3W4!fhD0(OKJ}oK zKgCxgh6S}CtXdG~9wF!xJCHTfpUSsq?PVge)STUjsyb#S2Y%7##g5`dxtrp?v({(K zi<)CA-r4VQ_+v=NIt|M?Vgt@NtJHIN27+fy1CW_fNAS zrFE{Ia0uP$Q#T6zA7|pi6L1I;Y^D*E;OG)~LtI=tmuK1AG-2VlWLPxZX#1Noi^pyh zZT3SQHCNWVG-DqFlliu?2QFi}ct-v1-BtRFr`PXTL=68zvo4!JFKfZT zix2p|#*f?;qV+xBuZ+;0i;JGuZ=W`g2CVplUq<`^S}u%+g-QpM=`hJxwYg7L{H+=H z-B%a)#s64*Irp8RY03X!#1}Nj z59A+GGjNr~^K#9RlH;ur^gU?XN&DP+?#;>V2#6+Gz#4uR9P}5={Jc9T2lj^p`8I(H9TvDJz^Rb%hgf+>0n0OVYfOtG={(a zf>g>a1U!uz#H-b}@8{HG5Q}(J#TsB$npGIR^5*aeMWl?0z+Pnb5WLbK3(OpWc)7UN z;ux`t=I}H{q=kvI?Z&bhsHIf1m6N6IlNh!2$DwM9$E1~sz*gA)v8!h=uX$tn2`Vb2|iAT=QrcdK_Bc3$XceAU7`y8gAsy$yG{|MMrWS zRY#SWc^)$^j+B&)x@KbdROEt;=9fdmC#jj#s}vMz#Tj`@Vq54a%w$U27AFJSAlp2% zwvyk0xE6j$1ZT9bwwsg*b+j2W92zbznPAK?njj$ggk{f@2)12L$B^7TdFf5{c5Su8 zxPNA{ao~{H!(Jd3dd%z>4>kVVzPVyLB0;<&pW`mvbI3+NzjmOHx>j}Zl8#@Yu{CrE zc@Zws9vn>QhLC`Eps#wB%JGqoptXr4MH?<~|Nqq(OL0LVyfsTVC4J{H5Uht6?vY#X zxDz}J4A~(4tu5l2O2@#^ve0ZH!i~tM7n%kv*x0lLWhl1h z0a_+|PI$b^#})hzZMDclBE*qS;HA9|C_y0& zSlMCI?=xnO=uZK{8hsuqgRA%x&q{(kGxnu+w zy!&?Zbt&f)w+ldRAvt{WydEAI=Z?c;=hir;P`4bEP<;|QRoakoUD2ja118H8{+Nc< zbkOxEHvctKS=qxTaxS7eK6HTpqJGE{GUsdjj>nFqp`-flPHd>^*{S|6d0d)DDIY|M zYJx~1>gw$PdE={H!Odpvsz-qH+vdL7WhJH~;N)!*Cc%O}{;I?oc^(f_c`X9Y2E6G3 zQ+`fMz|AIa5NO#lr<~ZiFe_SQB-+LFRyh2fzbsog1c<#(a`=N zE5Fyfcv(kL{*#-L`ldILj%o?d8xO$=W2o|0)|}oT5xwCwE4R}{u|B-9tFA7;6C)ee z{30zkAKkgYYieR+9K);SBIF8`aSFB@G&Q1 zmj|DQ>G12QcQfeJdVi@iiS#xLi`WJF<|-c^4Z~JUB_GskcHyh(dv2_6=bue!ZJ&EB zIRsg>KEN@oxvSLOFFPMqwcZvV!c#F^7^+a||3vC<+$z-Ig>KMpw_jS>^k-7x)2RR6 zWIzVk_&^%6%6#cpnM6)DcuMtHN)8GqfVaYe4u8W)hS%1`W5W_GY4S_4WGz)kGQH43 z$NDA-pK@h$V%a2lGA>?Xeb@NZ5fYqK#?$sf!uQys|5Kx zalz)IcHQV{rx9Rx$#FKv=v)@RhOX^!WT0tO_-k@+xU#K%WU-~JObyWtgG^H@YBH+N zEsAcMkQ}PG8>@{n2PHJ*Z;r+yOoNFY8m1fuc*59aW7bQafYWuF3Dcf^2#xJjT7O#n z(WXL*Dd{9BL-9Kbs=?KA$e;y0jUabIMr{HT2XGP+#IfU z{XiU_4r#AN)`Y_TZStlj#2?uD-o2+%M1fxkzdO&N-%6-vqMIFFgrnZ{jHsu!zQB&? zKUW5LcM4Owisw)R7s%~Z=f__Dq~NSoJ?L^8jLDYi;->c+4@C&S5U#8uODo;TPzqW) z(|?3!UFyK_7GApa2i90qfI4{X4&ix5nmy0}LuS#Nu`l#anQsJpJ8@Q<CLSqJ(Uug-zh12?G5AQ~R+p4&sKetJcVhBYWILj0;FX z6$PIuwSE#`{QR3du3pbUul%H;boV}G|B@k~C)yLs4hvbpcd4_bNdL`@AaL1$OQ^?L z8B4$4R@;;4rt+6Bbq~m{hp>CU&=AhysOiOpY!hGH2*4 zgXOM#)B5GejvFXvhmBpn86LWUd%Rz@)HR{dx0(cb%^XfoJW+Heiwb{|6pW1sfBHH6 z27EN_ z89pnX+DI8IZ@Io@)wY92)Ytv>U6t$;Jh-Sw1_D`hdq@f^VLv=8`#X)1v+?e!hPGzgqrLzE{+{E8^@_{ zxYul9uu32TN(_Ik7KWQ4?@k5y9v$!phEh8m@CWO>r-Zl_gI5M(+2M)P^Zi1&VLE-d zVtTMT`Q3&dUn3=!5az%S02v(2-gMnwul@q{pk1d5Wc^KNXTQQ{6=&ug)zX6q}_8Lx{kSTRY)IPPPN`Laj*lja+b72v~o^H+zG0=q0a@IP~0ft?1>)P}p zhvsMgm|ySIwwcQvrP1Sf;XbT*=!(AsVt2X>eu+`9a+mC@uVl667#_?cX0AChA*=eH|X{n zixd$!<~HO5Nfu7-rY0mFS6a<1HIE3TUR;bKrmT~aMrWwOhKLXcg@Ho~WdUYB2o^4s zCV|WpS3OxjQB_L~VZM|baK?mB7QKz6Fvs<2R6U$? zGK{8YP{HI-ex^IkJ{c6<2N!9BvcL~_bkl8k&V5;bdEw_-V9ev`_*xr-g4tT5!2Pri z`9ra~H3nLLxoXKlBd;fIJ#*KWNdVFf-rvkXyv_uxFj^$=e!8i^(}it+-qvk6*gux| zEz&~jV)k@J%JEl)YeYz1&pdZJ6F<&x&hPe8tf@dpFdU&xHcfQGEk{FlWpU2F*iZWB zs3q!~tv)Eq;#G|rpaX&L<|;?piBI;jc-50_$md$&li3WCm~EZ;2vYe)DYj)Lt3tK+ z%=A4gg#F*6wck@VPYLRYBkL{@WsAWJcg{ zXxAm<@s$~u^=w6j}3Q2SncW7ZM1Z11@6~H{U5--*6$U!{|6`t&P&$M32 zGhd{16QDPKMlqfDo$qelDAB0jpZN!{?AJpWD#wbRwxJ}Ze)SG)1 zdz??Ydn4KUMFW|hDI;;Q(yUD^2lk6r+RNHCm}GPY=a6C{N;!o^$(Q-u_yv!hRx<`q zDM=hW6|t@U6i4NWQ2V5PS8gZojEbR@|p+?h2lFP^*5EJI+3R}LO;|ay~s`; zeTEHT#sqpX-#R7S%6WUMpd)@LvYTr|ku4rPVf}kPt)^M ze|MZ{c)s}`D0FMbOV3}?F^(%gP%AAQbY|1vP+7(mODnl~Q3%_Nos`YPEksekei$+M zY2-H_>RYqYqY*1)q1FBC6LtoTa|}lX{=k^Yl4rNO+{7>8l7z9gZek!o7{*N@tR!1XBKC z)7}eau;VuQ#Z^y{>Q2hbZ6a*G$)8=ld1)fWyoqrIAhCf87~zL^wlBE0^yGVI)%SkZ zs^R#-X-#V@ug~!>4?0Gc;B>UH+Hn9lTYozMO51xE^yhiJY1veBYPXBD2F;^uZwj?N zQYIKvNcP(S5|?_bXERLrOaZuVowEwZg;IQ*{@PS@k-vmD!w;GrmYdP_2}`bRE-^ z$+Ix{>Frc-5&+#@tAh62zrvo-q*o%)ga`TEtlcH1g$}elRcV;rlEH)XYt0x^>hi0^ zJM42OvoX9!_LZ)~AStd#_7_BmjOoYs8wSm2#=5idl!RIb>oh#!td^dHW^OZ+M21wg z_KFk5Riz5X8X$sy{cg}dvj3`#W}UcQ*=GqNVW4N2F`u7wSxarqHga1ta8VBHzknK1%XSlR=PtlkG%7QoLG?773aV=hLujB7&Z z5EKinOg115>*m2$gHNEF#|&bkNA{+B!Cb;F1vn+7ZnJFlW2lhOc=b3ROJ5SX>)b#s z3utOu?}s=W*VVb;VCO}}InGcT@wJPksDKDO#PYj%G}wxfwL=XNfU`UC)tnDMePne5 z6US#0$DS^yo=UiWx;&x|aOTmxkP|f}z+!kS^B6fJrXnmRF~7;2Dwk6%IXZ}Tq!U>8 zOD{JLE3oX8>uT|*GSEoWV-G4XRqD%h2ak$vVsZp8qg8uwQ7Oh@Z=#NX&OP6_!cMei z0dZ~iqy%-QzKbo-HqKI2VqC%UoDGKAshFXSe#QjPrTN?_jkSLf8=7G88I zZKlo*yjVTM1mIrmmTzRP%nr1(k>+t+u)Ox*ou*OALeZSqm(RRE&nId6Gx!SUVysFb zhDMI_B9DuYzsS#Ol4lTvc^(;DFg`wwT3K$~J#Xz$E6W2Eof^n_)Rc;Asmp*0y3l9RHY%H)VfebIH#V94wu{2av~(B=H_Ke3jQvBEO>1(ImlW!@ zV8!jG+E=D|eN;Jr(p;;oNT>BN#sBWw_s3A=faK8TYli=OjCcNijmQ3XV)Kuf{hrUy z)11B-hnnAC4z~vfBR*dfJMKp+Y5f6f92*3$bTE?o!t5ULS28*xP77=CbYq+4SLol2 za+Hu6n*)f00eZMF(^f-2{ScJK7RdE%Z*!g>tFCJG#~ha(i;dGousuv7jQ7sD%8NjX zLqY!aSC&bnIe?9UgZuu--H1_Hf{~7lpLdLmruJ?EMfV;|evC!PCggfzPjMYsnXcBA z6Ow75ux3&Un>)9e!r3vCg0cSPyceBYM9WdjY9>G=oR_myHT24{O6+w#&79-A)l0Z+ z=Kd-1hAuADWK3K8S`>uivG1Y-%}Lg$*^qd>rVh0CYHm65yP+}7zR;~XH}~k)MD4@A z?|i>{5=EUVx*xlh$l6lZ^uFzrN$R-austdFHaVH1 zsQ9d{&n9CNG2`-U^7YQy8cehOODUNGXY%Gtgqe8jb0)-9MBy^(IY`q^4W2JRFJTz&ZWKtK&Kcgdu#7L?ug5fy z5f#i00cIpNyi4FcM8=v7*jkr17PM241Ez>9wsg%$p*M9VP#E%TI7qNLAwVyI^HIAy zB+X@3cU{Kg>N^ymxFbgY)9dViJ3DXhZeGKE!6q!i5YG6 zM7f)B>@w5_xQn8`#?-w|rqb|KyJHn!d!w7Yh95_)3&RC+dpOx4g30*@0Va^K>)Gjx4c0`UcCUO81>XF*eFJ6cYQVgv_&%a8)Ob{mk z)Pe?vHN5$A`3Ko*iCMeY-tKo$q8ykynR?a%Ml2)vn~*JFyJ>V4in0xtv9fM2bIji%qdc>^-9r)BT zjS1Z~A_+q7P7l*6P%F*%SmCl!)9&Rp-L1Cod7TYGT_voWp} zAJI=?jD`O;wFDeCXSRa1Sy&5kXEXXZ*XZdI&YZl|x1KP0oE9GlyCZB%Ir!AZ<+sx& zO}AMVC@ry{)rs4|hh40uhm#NIHxf`J*I91ViC;yFwnslWIaOZ$kk_es)w%x(30#e6 z;TY+Vx|O@EVH?q#G00`>X-@o0H~ri2gMZ-G2MW6bcn5I5SbP85ezYo<+VRu*5Nhx1 z>+91;5N>Q=^;0DhckSLNo>wh3#Cj=CDnOm1YU4IhZ~`+zVC&zrV$hS@Gt0KZFsH3= z<{(o%-m;)u()k5OnOwu|7=_ul9);-~^%$YKRz2h$hgnh7^N9N0IzIaz^nU1UyYN;@0XCm2e{RM$Fv9(^A^r_x& zR>0Q{8;6Jzz+!9OK-S2=eA=boGu*5Fz2p$rt+SBi~ zYkBD=av{?8OWDq;Cd>>dgG1cyU!XLa^QZhh`5pKh(erfDlav6cjXgaL{1K%7TpOkZ zkQpvzXhqoT@MyO&xEy0DIe}1N^@V74-=~5oyNRGch$XRJ{zL_+lLrC>Yo{MiGs15lkFmoBrTg ziEZzL(8k}s-Sd5s#N7Nau2?MwFN{SUD^O$2%(2Msjj4Z4mZ>>s6Y#bSjDCZdgg{n!fyKo78n7E@Sb?TDzFs&Y8M& z0>uAc(bzu`-T#OtFP*3oxTO{}(s#Ow%oZLx1|+fw&M)NwA)iK}B|JHc|1sxeawBK* z*iI(-A9K2Z$4_mO8lIv>obKscr{J3zz;kg@7`nANTZ{91o+Ftbvfh!i)-+t1gGJ4ki@%c+a}LQ@0Jj+5&t zKh=&-dzFm+y4b4kt-E$sVE~JXsAe^9PO|xyv8p^I{J6V+_(6O3e0q4E)#~C*BSbC5 z=#pyZv@Z6yGT)LmL6s1_q_4D5%Ysxnj&$b1qU?vre6!k!6_ct1c3?Jtb~IVt?7tQG zzhD$$rsumfh++nr3pj{TaWHwV#~Urp1Hsa~2ngr1vyYqFv^x+7Pg^K_EvGPTl9g4w78b$OEZpR8f+jMf>0i+l$5B>l zJQxMjMBGfo+bTnv45I- zbC(hdcIZ}x%0tO-Ikw0)@;Mf~4=(v$xc{6X9wS5??n4F>C?plPnaNi~i@Q-q2!=5; z(y#HIPm#Fnf8R3VhD6Z>NJoOMzte^F>rFZ%$yH0XrCDd!S@uwljL`<+*kP?Xpe@Er z0|vhlQz9QnPRtuwX$Qa+Ef=W|un`NGU*k%Lsj5$IUJ3(CP6PWK&r=Sz!Dr{KeP{jg zt=xF;>0Y+i&bDcRvV9>83{TVa4Al%t1)z(76*ZfhovcnT@7fOyU=k{CqvZ4sA<^~3 zP0bIz0xX-F?Cyl5h=3CS*3H;wMhP4@-)6U@s$}hTKe&J%bMwziJ}^i3U^;%ZZ4CVShPtjtJuU=jdFbGl#IL&QS?QAfu_!a ztw0CKMqmo9>Q^l!wM0jWVlG~8Sz1hgK}oBlZ8}v&Qy35~eYk|iCQ-jUYF_twp;#GE zNzS=5fQQ_axz3IrN+InCLpN0z$u#I&3?9f9ftt$*nKuqogsY@d4hE5zk1WIVd8gKy zQ%U#`g2HyX>Y(01bA2UI3tL-OEPz5Ubk)pDh^xWJ)3fdqQC%&!tw-SLTAUleF*38A znb43D@&^25IRa|PO^AOz3fTUy~=BtXi1?`TbcKO(%I+OP#cqk zT?V6qVHb9{dwr<42)y6FcdC=eDSe@^R}IKh3A{SCLS9G3)#S!#*gdV5TyvBcMHUv- zKUdC3gE3BSuN-sUi{VA-ZmS%w4PM!e`<}0bLQd+JFM*+87)`t+r z1m-kVUrQl@U7Cn1)@<$}T$PawKdd$S3QtV}mrCSG!=`Mqt%%YticpM9kUE>64(B(9 z0DFqA6aXH;EM_d4mux^BWDXZN3s$dxIu5NlfLZ?uA*tTMW=R1;8eR&qn{xJN%OTEC z_#~v#U=8ensqAgihq6YbU0mvRkGDirXVQyqN7tjRJeB?f;5N^Qei63#VaRujl8=0wx2%Cp?|C(C2;zeJ|nWwwIi-hFrMnjzwz zZUM=kkpPDriIOg#(5b_6`>7fafjZ zd$OnCFJsqgitKp|OjZ#CmV4S~^v+(b>xnM#ZgYKu1P-Er)7gqdZ$$ zSwa)LUxA1erMQ930`XAe2>lu{y`m(aF^JX&ci#HiIxe5QYLqr8tgA5(PbN5XgF*qQ zk>puvG)UQf73`IP`&*8nB^cbdke|sxErw32sUMUI%Unk_Nu;!abL%3SaBss528OKI z{nUk#AldiMV^~e?XP7~Ujo&Z|uvVw@$Xcwj`yH3N33)5?AFCBbXmgLmOEJ`prckgi$#8T(_f!0Ep1es z+*HRz?{s!}d$_t6Wg)y(QiG>%w})k>t&+sQk;NMS`q;%IGr+T>rW3VGf1yrkMzmLh#pu8 zEln;=RxBPIMbEF7I#b;Rq(#Ox8H&|Aw<=&8jjySd*2ls;`0t!<%#j^JKBggGQaR*| z=RSYr$j#H0gOej2Mf-j#_%$8Zi=B>7~qjWG};=XsP{K^%0JdU&+cO(;1H6w*p8=woy)0HU}S!6>~(R z##F!vMo3dn2B)5P#Goyv9|L2IbV?gbFSjVJ9CN=e2ipQ!TVrQ1_H5~n{R*E|q`_nY zQ$&|Y@+(85J`+hG7geAcoD~SCBnkY5gWGOCnkX)?R7)o)#$KBEPu<=cHXLR#ODlY# zn#WxNxfy8hkeGqpMQq0A-bYdJl>aZU9N;N-0Cq}oyBnkj(}5SCt+KLGvy`KiVoNum zM~%S^ha-{Kj!)@iyye&u2a^t)>R0Tff3qv_NdB9_a}EfcP)m!7yNS9o&9t<{E_7Jj zubF(Rf5T6PfxM7r-5*XR{?m9ZLIzFF zUML9)8>TseHd&2ZGkAWi~Sgy(E z(Fl9&1kb#YKNyAQL|I@Yf~lv-k^lJtMyk9?*hZhyysWa&_^XvG>dLRUDf?NnG=<1h z-KrLaW7SCDIQlnhuB8%`JX#ziv2G{pOP&QuLg9zEsO+|V30;X*qmr}O-NV|$(QhcR zVp7^gd2s#oYDIHYI*Imb$#jHLX%bZmF{dESWD1lhNogfx9Q8W6yNIg=C!|3uvYTXc zVv#6NP;ee|n!eNkCVQ+oHQ3)mL#R=4vG_6}$S@%o1sJx_VRk!idw7i&6@NIRa5fm$ zQQvUK1cg#!4N6qzQo1o|j$Bd}*mLe>Mn%SDCMa~P{9l%2H_hg=tYUOB?0)ouxlHh- zt3sG82xx}F{`HUurL@HmMoEg586x`0f=yAS`tWWoSy1_yB-qH1PCCu3GJWD?_0VPc z;Q1Gn@qWP=#Y`q<_0hiMW0-x*Vsr!SKXTHm2zXfV$nDe-c^pJJ&tj?=J7L$7Z5`$W}k? zbo016**@#Py&AP>)h_)=JF2E>-6vzte&af?sWHf0lvI!Yu%p%*FY{<|2wkC zQWg|I1qUm9DI8C<|B%4Qr?FBsHmsMCE@v#3M}TEwMI^x}l@9_lZO=EP1TU5xoewKE zbFYv{YM(^Zm$o=-TOY7m!Hqw;qw!?^pa=q{CNLPv)(`(x#sDBL}+~@jexv^Gg8JgubotG(-k?%aZ}c7|IUStT(a~K+2oopWa7@Vjb?kLb7m7zCgP4ix~)ieS_aIIe+<{d z88_{%% zBdK>c9XIez>jMk>k6S3t*d6T@%XgdcP!xfx|HwKt9tsd$kLdjr6Oqu8!wIc)5mny_ zxhAPkRTL843Ur&ljw_TafV0S$A<<9a(s|~YVdE^3$J8iw9p4X$n%eVL#Xff)u>nLA z`?l@!U`ma&HCp#@NGbuA@L~>wIb~u&Y4M^Y{|#HxDthzi-;XzxQad3zF%qiJNZ@0Z z9iQDb$Vl2q;v2u%-m~F+eU7@KWS@;?)K>(5beh?p1F91&EG`s|$+n|l5g1}H_&YF; zU1YXae~X`@74V(Ki+G%fRg$?=W~M5dK9#%L-AwD1$i<0P^jNeCURjG4Y|Ss!3L9+G zxQR)c!(6hhVI8N%L)sN=E4o0Pb-MLUOw@#?`VeGuY?4|ikJVrhcbC2>%;$Ky`2yZ? z&BCU;jewKK0BXQ`CtpiPrk!M0-1h8wF}%~5-?6b3=BV$efYN!>E!~5rhE?}L(_W|S zNQKMPkwJy&!ky%G?I%R)AI%Cqx;EZ=!EZKUT*(LuIz6kFJ+ZhC@MTs#v&8GQC!3yP z3>XC;W8|{iKqJ%=E9a1}M1v?T>e`<*ozW%fr+qE6zdgtZZYCJycJwm4eVm=WAN;hD z&z9;u9fN0PrU?z;uYST3YElqocO@bvCA5@`0AJ4X?vGzhzlJIb7Aj8O05iI}dR?pk zO%(mEXki-LQ^0?1bSoV)XY+jGy3{&0i&KI!;4&6IU)a+HWEOLqqt3F{H&Ws@4d5~p zJ|qA~$jHXEXEc}WJRSx#>o@S>WgSiB-}!g#?H)h3j{45dlG5HecnA^ir~1>jVlR>zrUYa0Fk{6gq%Egb$TUL zChl73%oXa3N6r14431XF`r6;1m65H%f<{ZH@V%r})7-=f7;3j-xuW@us^f^SH~zu9 za!wm{18*@Jo|h9{2MZCGn?l}BE{K#@c43rpVy%HCdhHIDWbNt+3KLUa;&Ee`CQi8D z0Wm|SJuNW_Eu9Qu3+(Vczl+oX!V@pGI!@ zJKNnqUxOMy_Wu6Y8?qxH#MsCmB6`^zLVh2&=e>ssm&41gqJJ*+k+{Es{Si=;to4(s z3f(k;BBsulTAIe!`MDW@;fBTolxf~%B&(Zk7NL6t=KFNpS? zY!)-D@HW?$8M42(Zfx%L!JLu)*VdEnG{j41CvP)DT@VB0`CVhrf@Y) zawM^BN9O!j%)beA#`-Fb@L3q@S(`sPl}hI82_}4^g7H@BzFiaTJ|o>>)xSfIvl-Vi z$9gP=_gDz(dfBQ(b=0@{oE)u=a9bGaJTur{-11n3>O6zkwq)O(0wynucAVvJy_@B4 z(cQr5lxEN`%3#eKg7U1BpW5lCWw1_;pXO=Uu}_NYl^g}F+le`JVl(JRWv~v9f7B%v zM%aRQG6F98H{NNM3)^qme-y>jcgkRG7sK0tzQfumHM!J8SS<`SpBZd8)>#p-`_bef*^*h7q%T2w~_R&tVH+1Q-OSVw&N$pfj zMag-2+#D=468=7z+Usc=P&BrlzKr@`_@@z-xQdrTL#DAm`VbQ%o?ny-0S+Ly2WEP< zrqt-VWUWQ`!)p6+TJ}jd&IRtbr(2tgvzwh)8Ge=?QD?Wi$H(>I6)4~;qviht{qgc; z381A=2O%IrO4Q~LhrHM)UWECAiM%sLuPX=Q8(WMBK!h(3GKtUEq-=!~2uGZy$p{C^=JAc)VM6#-hF43d=izZj6rpk>PhtxqF2Jyo8A{{KvH@pz)}n6h@n|-!W1SitY|FE=A^-~ zCfzJ!YXNtWON!?95ct0UsX$i0O_HoNx>~INx)kf6D+xB;!j&Uxxms>05KEZo5LlW? z8Doe6O#=vP79~Jo2tt(+N;RgcQ~?A+MIoA!zj$&OQG<>>hqYTZ-<|}U0Gw(H7U3e? zZp-7L(bco_tNpj=>iXpU)xn2n3Oaam{Orv+IeU4yFYiB7uD6e_R!Z>DDmgnn-N#qg z%C&q<_Fqb`_R!ho+sl)yYw5j$F7cb~t7N4FYXB4ko1wip{d(CoLVI!gx_GDz*!&VX zs{zp}!uInw3#S_&Wb$Ug;a!!o>A;F0hKjUuU`>*>pSCD*-0M-SF|cAuU72e&QOki< zhNiAE#WZwDHVps(m9VN%RkajK6s%K&84_av>Y8O?OOh~9DK(4@L?hTj)?YvgQNaA* zOR1qU^OlOxEn+Z*=)i;))l>*fW=KG%m>LWilrbtR3bhmiDO6J+ga(ieL*GPfiY;XQ z1(dLMYuHNW9h9pNB-e10c(OHY*~+`z zDk#2ITh_TrotxCTNu8V2O~iNbt0nw;;EC@qj`l3m4sKx8ZR3gzz`}_ojQdaoeYg(L z%dP6(P@g%!(wjjP+K$MTpX+Q)q$%4@Y2!7ntFX)ec^x3T)*q-|Y$ud?negHn^@MKK= zn`n}&oo!{YwCiU%2A&n(QJ?XQhK3=k17k$pAqz_SeNCb^Rj7$jQm1=|H&ul#qKfeg zg3^IhlGlq+R>G^aQr2ayY*5T4*r8>NHYsDRt{?Ahj#ssr%yp{D6KonJ`FXqgG;Qxr zid%TIyOX9AYuud#Rk`Wa={cgMo!P&iga}lP;aHNve20d8wNFGTow8YLBySx0BbKNA zdzSeM6NztSWN5hGgVhC2y})N zNjI3OOO^p7W)c-ERMm9Ll!0W(uqwCu94bX(6W?~jzD*6Ev*iAdmcNX&Dn-jVD_;4H z=B#EE>+G2$pv8%VjA#>nshpiASlqkUmd8W;rB7eIx;#C4{_HKfcz%KpPSMqi7uO$@ z*Do*LpOC%1r`z{SS4!~UClZv?y|ewR=V#CG_3@taX7A>bCc9S}Sr}@c)v2FNX;8~%Vxnwz4JYBvPk))~;#C;k} zJ{5|ywOpDME%42r^QK?I*F??GQB(3@u(T}X%I5s4sMe1J=gGMk0v5JG~~R^0h=P;k2W zm}BZ2ecQFX!H>=pJsO5S{WsqrIer2$QY0WLng*bxCfg?Op3IiMnv=E@LRAn}C5!+f zprH_Dq^*R&Se78rWQZh5Z6-u1X*(elqyj)BBtxyCCQ3x zDO-raO12PJx1|aaq^_10RU8{wLL${rg49?EGL%*-Ax=}pHkp;4!Q5<6H5-i(7M<>RZnW=#YsKbKL^PFIC@$$uqsGPrge)2m1 z_s4Vc@$jTSF|ERWy4GBliI!XY%CDQCff;vgoU`|}QZLJjnUO(5W)3431b3c)Gn;4z z+LYf%dpw~=_|daIh9mZoPd%Gau}(I^ZJDUHKIU5HEATNsjWY-aztCGc_{F>#q$}bD zfojq$&2~ItzD=E5+jCf0C=kNwTrzddl2+P^dZ{QbS0U>g&fqBr-4_?feV_WpEUQv2 zV|}Cd4dy2T-bPL^u+4!g6Pe%w@9JdBn2)Jz`t~g?wGK85k_GqI2iGYo-vv^!iML^} zV*70B-SAbUOiID(Q0H3ex3T(o-YvD%Q3k;6G7EGrt8*AlXX)dqx&N1^Nx2ZSOanBexxtmd{% z)Z9cx)?nr)ET9OnN*2XxM7f>_{2GCh8f-+lOoU8{mS;rCwi?|w2SmeaaU5Ebt_^!d zsmESXYO&AuU&n;DIe-9ZPy?kolqYST$&U~qNz;@XnPf@ZWgYi1HBZJCJzNZm{n zP<|0xN}1bJ90e}lM-7pTMOffpnQAHPK;#%~=-mzs8gQeK;@HbQzBmQ;7W+zVs>;26 z$tI!vUew5)S|8?y{{3JaIiWpq*vEX>YnufhZTF+aLSrdNhbZfyF1h$C70|Zl`{zJkPSwYz!*#--LZ`rLo4T>$2f+1y%idR90XKnx|K7UJU6N!~s) ziR4cY)kF#WAdSHj1e?JHq^^MWMWR~sPq3yYx;IDYk^M{%JNM4xC`YYap zM3Hj!u?_C64`$^7LjCm1HoXS{o!H`yuS+5-+xZTN2s8yQ99V*ih|`Vlc#VzkWn)_9 zEj$p*I0wI4&@KZ_xmA)J!YHhm00M!CNMV(wIq6!S4v<6uQ42>WN7&pEfe@)$4M&8h zTgE>0qad_DaaE=A@jb-=NJTefS;ETh!#*XGC;d;B=NqhV>tn<5B9qHE2M-5Ok@Dxj zo71j1;?e~t+oFvIL{qkBqhs#t7)_{(k^&Y_d2YgJHb=gRFl}*jLS5&e=fv}Vp<~w$ z2d|i~Gv5ouYe|HCD2vx~{U`Jp8;touiNTQ@vLW;TiooeD^DW1_D?J6eG43t9trd3; zh3c|QG|5m@T_+F$9VikpO-;hkpvbZS!N8JbRicKb14U6#c9rtjc3a+Fy!o7$v~AmT zkyv>R3_{w%-EOE4`jQC0%q1|h^L=aHu2RBlV_SCftk>PLyU1%p-gR2LZOueVzRXTI zH0jAnD@*@}vO97SflRex2M!ZO!-ftlLM0tANrej46jj9pK&yD2%4S%$7g~n#;K(eQ z5km$HY7#INf*59|1t?&aYGPHJ3opAFmMw%HGk?fF`t08k3&LQaz&c_r5UsGE8^1FQ zUp>220T7IPj53Q2Zljr#P%k%S>r&!uQJ$rur^4+_O564&J zrSzVlz02*ZWTgZTt&;PLBXW6!US7U=`v$*1ym}|S!}9aX>*udd$(vUnqzAa}ZUeDB5n>sN2jPG7%#_UiphOvpR(;sI_zTq!}NN><%wB1*GE4 zkZ;G%P9Y@c1SJtEP?L$&`q<%0rmaq{VS*5>cXEvcj)eilnEjHMp zpCf3!Lw}+5H6&`^^%M~jD9sNlo9=sAbgNhxZi?(M7}&1KKJhBEY}d5SC#o`cj<6od zT7_2>vKaS#vxQ$LDw>2h7hx^swZYAGGuG?x0i5Tx;?R9XyBHj~hBvm|;g7s=NLtPI zv_Mzcm2Zsx*q|0m?SSV`JfDUvVfEvL4%rjKb3^8a{8B*Md~)#=0xajY&$VXJx}_r^ zLP>$!?&fXo7tN|2ui4T|cx|es=UGc@ZX+$>RoT?2VXz=5g&O1kTM1)mGB^8O_k}$9Mi=C7NS%~`$96_ApwaJr` z8Ea+zsQ&Z3miHrm)2bbfIqM0Jd2dC({yIn&1=HH+tyR(poaSfEkcMCAYpzec!ulwO+QJ z%-bnKA{YZ?N)kgRGAY3jY8qjh4os$-hOEfCg)I|E3{s>sOn^cuGUbgZVmq0)Q-q>n z0FkU>(*PEgRjBETfg~9)*|0PXs1O233<3I#>Nt7{_ zXiR68CF>aLm{L_^KrswU2eK|1s-j~V!_9P!?PT6k5fYGf11r!Z6v(P6nJO_AEJLJW zNmeZxLRm2}g$8CCw1CMhWGW`kmiO1t!sc^sxw!&ZIzlp*6sBmZN)dsv-ZiXK9mtYy zFp8LtRasJXtRhBKNs|FX`TDqt%&6V|imhbcQV|5ms!ml1WLeRWg>+&fpz2sNh(Q#H z4ap>iqUok;=&}JdK&T}t2y8?VTgkkoA{56&92Ty^Yf_<3F`__!iG<^qyNj^zqhw- zBZ~v@{_RhJSLwcuyP?FJD9OK*-Q(CvPHrw~JzYnei zZxVH}ds*?EZY&ZQ41mF4W-yp31}0pu-V!Bo8qLDAQcE-q&FVRN*`8@xZ9~)B8!Lzf zx%UnxDEK$L>&#L=(5RtW1RF8jfni&o?i!;(Z{S)U92q(?T&p+i4h=Lg9M?3V;a1Ai zJAm6nwy$c2s~v_l=r%@8sk8cyeTY&Rv%se^MNOE(m`7zG2NJ6cf6$ z1S9O!(afN0^$IlOw2i-+y3sdu!_rJ{U@*5ZFt~GkkA|c(L+nu|GQ=Kvtqf%~ zt>5p7eNXIveqtY!229Pc>&|=(y{&xkx6M)C z&_|Z-8H3RPL8O~Q+wuB69geJly$;$?TNpPc`Adh_;^^|AZm$BPf=KfikQz5U*K{HR%RZkySe%J$~yV^?AzCGo*+=!N(`2&+|?N;O`T?(w4H&I*R)p_|05e1 zXaciU?XRe}P4l!D>)SWfdcR-uO6(@6GHe0i@V3$I^0)6^pPqeq#|$h-{kApGjBQi~ zj9e}NCF9O$76hJ;-5|oVgvmOcQ{;B6TypFt=teea{G(=AnxUEEr^2Fk0&e-~y>d&vXY>Z9UO1pHecw&kWI<&c z-ar-AHx+tF-SvbXSz}|N$Ixu6SJs#sSK8lEtv8p~B<3~^V_+$c7)y(-58O1=>}E@g zE!_wRFJ_8h;*b3h23aoCcKVR!x&Mm7o3MPNrx}Lf*hPc-4){G$ZSNt^^+w5s`uM2X zw0ne)8Ac~_ie9JE`e7>ugKn?eAZ!IKw;OIJ26)r^_PqL@11!6xzLdNj(<+9m*#&tM z?Es}XjgqN6$RPAH@&klBMpy3-dY#LYtJhk;Z5!IF*=U3kO++2Y8-{iOYcny(=rbwG zYA6QD@~eE;SFT~hAOehGl)Tp)*W3{b=MU&<&?i z`d?OXxd4kE{As02wpq+Qx}xlctfgn#-ACXoOZKIn?o?+5t|+&O&po?%)ju-rzSGF( zUae3+Su`W9qE5hZ#CLM5W9l6~%vyRMX*h-Moi>CRdD@Wixrp;Q?LP5Sr1_ynC&j#V zqj+(PXG5GOemJIYZ^tOrTt$z1`nFe}l$RsS8$CnU%x=Zmcx~CuX|{9`bx*T_9X1zSVyOqWzOwq<%{ykC?Sh)gE4bqZ`h=?iyE|)f#&v&+kCR+Z%Z{F!EsJy3sVQ zj+ivi2K_Bh0N z#)exO!FH`3O;*@AXvaV!v$bZ>4yDpEp)wO}xN(7z=r2ac=nZlr<lYGhxp5TKUR7}Pe(7YT-Pg9drLf-JY0J>nEBzZ(Zo(q3U!N1UaLIgPIvC|{ zHjFIWvph?8`*$>GrEvmnG| z108mz&<{K8w?N?i^+zth8@=`dsw{GMFgH5m=5)8l8Mj(v8}+AaY@q&#N>A-B_M!Ll zPgmCE*>}C}h4aBYdw=oWr<3o0?w*?$-+y=W?bQ?HwOob4HhiaKn0{)$W2lnh29>wx zJEmuKN3PpL12pJ4(6nr4Xn4rfQP&>z9mhg_=(t0;0pDo~`Z4*AY3!cwaF|>0oppR` z)Eaxf^XK3@IU>22lWO61Z`v3H@f!F>Gkvx za!t3t0pDo~`Vsj~*K&5wcLdBW_|6&;Eps*YeCN->cZxS2pPcVFz0LJ3Qh9s6W7+yh zN5kI8a(YAnfi4{BaNxMZk?Yx>VM1H)cFpSORJ#HFn0%+--96voFt^}4y|wwy5)<&A z@BFrWr!*u{g4%Z|2~of=+Asn-IevX%V(*vlzJEJE{r6?~aIJmUA15FBqwA4no}Q); zFYgwUzWpAb{Brwo`nLuA;eV&l587k;zhr`L)P6r^Gs~Fj6eg(~1$ZB8V;^gyajXrD zCuV&NPs=d6el(4$?CeB}c7O9DDO$Zz z@J7}X`LBpxshh|h8NGJ9ZJVCegVnZ;#x;616YYH#flxRUVe)Jq1m$ts@ z5*xZxbo+3mo5&p4Lr?FG?0yfKu49izt`5z?uy6IeVb{@hWLZN8IfMRi;5h?lsKk02 zM$z3JLNQ7<^Q(A76gKrSv0dHl^}2mW_lCC79omC#x7X`K!!lg6H|UzCHF6Ah*moUh zclG|ja=HexcQ`1Ih{Cp4%8fxs?^T6-*bc@nZn~S|mU?x#j!j@ZwfyLuf4F#i`N^@* zzCAg<{@MQS2lKn`_oqKz{Cv^1PCtEmeED%D22VXC?|Nr%tn-Vv?~i-k_x7isKb^h( z?)>cP-EsH)yAQ8Vt;Zjdl^AR#!WaX+uREKFFlx<}{$8UlQ_yhSfl2DS0qT5jSe9wp zeY@=TwXF13P5on*PH%BEOI-AFB=X48a6{xj@^Okhe>Q!2b$z`aTI)dGSm5i~gQ9Ql z*7DwlURH)+pw9LlTLoB4{luHdm|A|sHjq+_5OycD5^!4xt)zM*O$p8Ya0uPINi@T# zbInKo^+Oy)e#-Oo_T8a393sbZtgfMtdfvcA$aVT%t7m!8Fp)EIdtK9$B4jj6Z==!e zFq(xPz9kaFt>9KXu7Va3XGlBzi*y|z7_VoV19#|vfcoq@m-98ayyZvEJ)T*69 z-_X~P66IRXhFOg*0z+8?WBtHTveFKuc**pQa#*ZQVeF-NDlnSnTl97g<+g@YF+c^HcBj>(`cj_2&DNn;&o9z53yYPoJ*O zfBgB=^~sMHr>`D=NLFI7R45FLcBN3L_cW*1E&3lBZKG{?n$ANq_O=iWVS;H=NZ*Bd z*H%+Etd2hD;53T08TP}m7GkLR;V77)&_$XXdGtP9G)uHNiM*McY6*r~ih=-Z?hL2V z6eYMLCCA5as_rTPl?vTt5vS2Of$?O4!m%GBl=$J8q9QOLK<{A^VvWW(jbfBw4UVB7 z;#BiftVQ=>UL4*%=&d`EPLMW*;X)e)@E&W?Nb_beK(3bz#~UKQ5@a3H$!r=EDsH<; zdl9$OsAF_BJef_S`*!S&Bql4$)!qV369lL2d;EWlqEe#11~5f9)g}mffgd8=xxUs+ z&9SV(fcP3|4ja!Z}eu{#No&(prr3pJAOlKCfFemX(7I89(U zCjUkik=r%|vJnS1bWI9a&db$_1#Gud9%)6d#~p(K#31K3BriX zN++HT1K(xz*f~AEd2Q%d*T=clzcr*~DDr&A_fZmflwd-1kHv`SwxQF3$V?Y>e9Cvh zHV3mbvIw4gLpnu{+1CrfL-OC2fk`JQL1Q1MbWOBpciD{F9ZZ-2x}{bc9Nf-lL5LDK z^aHZ@=33kwOzoOS59}PN{V<9W7q$K2)D5B;8$uO^k8r2!^whJi_3JKM;i>2T?QfNF z-i^Lyn0@JODUVwFZL6(o8z(rWim2<#INoy~-Me#4-gVMs7T(dn+$bFRgn>=Te?+`V zBix?+BSCW?`%(DPbR4TUpq54g;iVd^{ZX4(%Ev{EI2xt*FhR7TvFmF6nxn-vDs4E6 z1I_66?cR=Oam!1p-5r=u3$PyJUT$}X_j0?-@8xb1xV^ih#L*S7>Mc~tx)Mob%lT>z zyKhvl#pQK2wI&e?U(cE(YiwanGWyP%cURR)%hvM(r)cWwH4ED6%OtjPJ)5?n_5OcM z?&?2ElpRCw8-~*;t`;e{EM~~c)Wf;1=6qh)tGcrTj65Ej)NXVSoXxxVSHmeB28bDF zyEb?}gzjA&B`Fw137C^9XC)4+?}%>-ZNpVadb!pjlohsFgT289Yfx0$d+_W%cy{8! zvvb2~_q!i|IR5_n=H2nDpKa&$$CImfpB(e_?WdpK-rT%-ef{{R+m#q>>ww`HgAE-p zWX;XP7?{prt*8mKeB-zSwDgj=1MK@&5`g`iNC5hvp#-2W$qupZHg0b&0qiakOdgL- zYHz-+u5r^|t+3x#_uJ|pbz9xAQjfz_dIQ{NGcl7ln8&+p?vC-76a`c29P5UNB zN9i%NgDjQ>SUZd{YpFq>H>$pY?MJv24$WTAh89H5z%&dC86&#~Ez5z9s}F|I9k`>R zJ%C;l3(&eSHxyWDm)8u9Yi%1VLD%eVcilV7N~NdP@8AA>dGh|##V+hbO7yZxELF?wrfPsu87j{vL41+Ds0S7 zd%bl6iK#WVV5f#tk%_!}AM{QTZHAFsq z_OvR(+Mz?31Z`~TX;lGheYbN%?;2gB(J>q;xFbu5B%4ibArincYluiiJq~ASKo&0} zWx;v#ml;ML0miFYf2@zuN9U5;T8l zv<>RJ>qcRU!crm1e&c>p7ZV&AXZdjH! zHixnU)C?t6P4#8d&7dry^qGg|b-^X}zLa}k%Dpe;-sxlS^zl1z`q=wY?)_kPf7Y^M z``ufd4n5s8yJi7u>HDU$&V_K~ zje1?X2fZ$YPFEkIzSDO{rU%__e_-3ap5+>**Q-&tw}-nG(HeundQ@u+8m*FfF>FIjE>8jyn>sHM)nuY0J&)n;ojr2@@^FQGz=m@`E9}Jz^Lg=y?gk)Nty? zFw_d#k(QtUrpVLMNOLF1y~DF9E?WX0tC9NE8${#wgzk|(O50)7p@6YJ4q-Y=kTyq& zKjJ!nu|4I`X*)Q(yLLkeVT)@wqhTX3|z}y1fQ+s<~pE_4Rz5nj)toQcnJLl8K_g8N&KHmIv@&3(E-S19+ zym)+X@0A!l`H=i(p8%!|>n*$yf{^8@pfZj%np@(=9Do zN8~9?DovkV&FtDn>14yw|K^SGSaY_Z>?us#wjYk7&Od^e!`V1Z;4jp%VEWQ9Ov~&! zX5X}Qv)iX{?_XxLy?)gV4I6IHu)3B#H1yHHg9srL>4Sl8T7wa^^&T<}qmOI|2dLkN zJ>52pUe6x%TqQKocm`cKjRLfpf#dNoSd$ctfi@VJ)}xTZ*iYLS&S4nBiFBKA$9~#L zVbUi5a*=~96?drj`nGL%ZLjaTgVE45MqLZKsMj6zx}$+%^t;e7bxAFc0=#EauWl;F-kx?Ri3!qzM+v|QU>YVJv4!fic$LpN<>9aB-U?#=?T z5Zc~69t)|xk4m?XO1EWHx|Q)noPoJk{1IAyO-64Tl%^kn(>FaGF$PAj>#TXC!Yl1a zQRic@dC)joeVItxd`t2Mo^4xQXJ8s#eFXcXk<&-U(13Q&@{E4Zb*+)t>*X!Yy9Zw{ zoz`ppKJ>R>YH*h^a_~x5&H1tE5EWY{X;DC|L z!GFL-1U}{shhP-VLghH+;6F#&s^>ov;*+)Wm*4J5kmuu$JAp}xDP2Zk=Y;%fFW@xT zO&iql+qUVyx~>=h)g8a}A?EnBGbsVV!0KhB>GV}`-SaFU)x`@${K<{8KaOt-VyKO!dPpDe|a~Kf$ zd1nk@>H0VHu5IhZ^>11Be*Hhi^9*Pjcpszi?Kp?*capNB(%0(9^hsXW)N5 zM177);cJAz5CzfwK@_8K9*1XBI7UYY08m)h6vhIi69jkx;08VlQ{a<=2LL1}jIo%CvMXABb7h!S{kd>6fQ_1S&%6l3(obwcmmC?b2M}<*mZ`cYYe*39@;MIx=wF2 z)Ll~_jI6$HIbG90L(eiCZ)C!r=k$lR*&PmCyFaw_#u&u2AOLX``0nBW&|jDI#}POi zT}0_+f-vdO0fqL-PtdnBn0V`s`n{i^F{xNT?iuWcLoQ)9fTj-g+-U13jkgT6C@&@`>CW5Q~3F0{SY=!Pi8lPF5p9bHkcesm?|hNCOW zuZC66EV_EvvusO8Ue7f=+ZrLy=zBxYFnYaV&q40c8M#)^F$`OS@qh#HY&1%+jYW=GUTP z7{q>v)*We9tA3P^8PtXY%%H7;lN(lx3X5V~ZGF(S1~wcHAsXmCG_Z%p$Q*elGCkzD z_Q=!?*c}dfy4~$rrfs>fkA{Zh4g0P)?71tOUXSfYI2|Vl|FS;gl{J^J-VAzE<|}J7 zftTOr?6%R?CHdOOghO*=dA5OcduSrtGx~<9cl$%r8S10q$kqo#r|Y7D)iu4o+cWIZ z$g)PR;|%&vqvo3q^}#rZhA_y+2&DjqAey5j@jXNpG{)l5$bSIQi2fSQf`BL^T!neh zOXr}Fawtsw1kp0ULnA-*>BIpEK&|QH>yzX2*GFIk1B?z1h^CfAL4Xno7lm*bAiiM5 z*Y*M6AG{-~yA`p>iUOiEwdwbdFz`JPQNfEsc^>T{3;+znC}mgKKon9uvN|0FWJk7j0MuINK2DFoKmWzxb5#*X zQ^W`U832H)TI?=et0)NkaQq?mV9M!|z`EwWxki=1-iN0sKq)GN$iOpTr*tR?7~qe?C?QM7$K;#9 zpDe9J1#v{pin9CJ7#CWa!Ur%5;T-w_S$edV@_QXHc$SPA0Qy&r!B9Z< zOLB`VHlqYcg62NN}V0Dl@sNeaVM z@@&dZ!M7jISZ4&}BhaG1TL-*h!Gt-jPp2^Sp5sFaM{KfW8BoL40WU>SjPa7% z+F$qiYI~=^rixwD!R>aGCg1nE1h>qQmGRP2h399kH5YT5kd9 za0Su?d2xKr035In#Z707Lc|0Qu?unlOemScSlx%%9>yWa!MTL#1kmsoV1j}vn8U;; z6)-Is!*p^4zV3Wosz+LzL^yrH$l(D_;{Y9z@nFCpU=cFF*(I$@${qn@V73jX-*%j~ zQwb8zqI3#V--SW20Aon62YbK|i70_-|7bn_;xbCoBj7lWGN8+Myg2d>;>bI$*wrfd ze-$a5(k+Fat<`=0VbB2;N4C|8D{*0GE*mj%R6vT^OLG zAZ`DT=VJ=%?+1{V@k7e-N=qPx$rzd0i zhtv=Jf77|XM2U;SlrU;iu%DHCho(`oSXz|z`h;!EMDz1q1YI|pg=wv3!HXTUVg<#* zS0)1rh=79xcoNM54-64tk^s>{*J}vD?jx7a9lg^$q>47xL;EW!$dUaREQ}q4d9o^Qx)}&%j`t~LFOy_r7rMV z0kyVviCs0uLUbe#kH1|Pscclru$G~CHKW5{)yaf>%2gnI1WW;LwBn^r`#5145t!1EL2rojTx z@G29&jS()$g*!h?Q8I!qox#fhK};qNzPuP7-4YN$AWAykqA)|!r)8* zz=|SD$@l8zWVJCA$p@X(%h?DMI}Vw*Sz5 zl8T}uqOlVFj3}7TC>ex{VdO0s0xVX9SUSqFGZ^^+Y9BCUrSgAye0}}t{nhCam@YJW zQ#wjK-raYQN=I`)i9)KSO3AzpZuriYNl(wf^&(8+gD@W*9Xtcahv4StBk_u)NEJaBw@ zMk*8TELO}JWowSUxup6VSqJSf@(>w?g99mXmWDU3C)cW8XQm5Q?0vX}-=nEDqdew6s>0=NOhOa;%31u5A{ zDRB>((HOfEj-M;hsi<|aPX6NR$Cj1zp#=TuM$mEw9Je@d|M z{*Fwp=D~1`l4ypt43RqM=z&bApHgm1X&9q4C9;cnA*?8$CMXmtc7)Rlwn2j_yh8vJ z(SY(QlmairVy}$AXD*Sv@e`bqCG(cm{d}MRDXL)E*4zQxOUxDA(~D~{F8GB!ED@r5=tU{!EDKEG0wf4W!5o1Q2T^o4ivjcA zB!V4Lbiwy>sS&8N7*kx>PDMyxazD1|Fw&&0aMwhxHMfiw*9zDHo7j0-)HkFG0!+^8 za2boDowvJG@@PuvVy7qU`Jewx(CA@NPvf$jACAe#kT4U4k6?`# z>^x)pjvtP-bb`d|!vnTGT(h6&et3uT1aksIBC5^yQy2sw3WG)afd4v?Aa~pvBH}&re0st*V+MUr=~Vw|AMm4=N({u=Ckz*~ zrK}KD?+6Z_PhCx6vH*UHrnn7WlO}Veg;iz(=Lq zJ6GbNqz&GpK#{_Lo2_>;oGOwvJyC3xZsQJBRa(}sWmsmgDsjC`q9H0B!fRR+e#?Y3 zQJ0Bc5?|$g;LlM=6jQP=efk$pVUo^bEhf$5&fzkTtD(?@G!2|{P#~_ro0O@B0)W6l zIf;6mojeCQum?mXB3Z%!_=2F^wRg10v}m%IfZv#m?m zEGT;--#g@guI2uF$hsWEbRz0hHQj0PQ#&Fvi(k@qNydc<)q<$8s&5w0mU5%k=Ah0- zT-FPaOBBt|VkGHIykKauHYQQvVF8hQDF|*<3A>JR0LA=>%Rdwn3{Fu17uU#*LJuDS zL+4*(l=yU$ExacjGMc6GLzllFK|h!!=w^~2Ob{ktvZGE9`Ww-@TxQk8E-7%?i*n2`>htSnQ+cB9}f!+m?7m3;A z@1H$m*6AsNAqIX5CPYpKQ~2OdXH$Yz_Zv%pX>@g>6_UD?j0l!s7K0%(hWaU86}Wmu z)h`@JKR93#E6lmbvE zF*$LWn3y1Ht#Xm_QG>DHA*y*0K~GB%izb0PM1-6hoo7-Z(u_l*UvVs`IZiT+v(O`& zJOY#GzIjKoQ(IvK_v+jSKNIcoGqv%2eglJG2;IAz=sX(Z_u=a#iIUI1(J%-nBi{Ha zXOqAWGfHFUQXoW#(VZ9z1jY$;(P$O~izmXK;!az=EbSLXeOb|c1e;pxun!Ak4fp=2 z(#KZ-KCVE4>r~M5*!c!QlY4GS6^^Kq*q{0VOvDMs*Mua$7GPFleMEgF{IIl_m5(WT zjfyQTtNRY#i6bAyNlG{lJg0kvAF@pYzaZNYJ!weYcDsG3FlTylLw1NM^EZScFa($v ziXE1o4MkzF$Uf6rFu6k>(RVot3^e~y!aC>A#0uq$j?{&=L=!pJ-d7X zE+P+IG8Zhdk;|{lid5+=T;p0>>s-q_aG6AN(&-w9F17(o;ewiZ&@VGTVXUyy2c^Q_ zcSE!`^7^gs5(l-UH$l#aqO?sau(+j{y2%0M6p6EjRU!qcmJN{7W5uoCkNL5DTcx6K z9H8qIx_2+YC1tgzGZ^p}SFAJg4TbB+Z{XAq7Q)J^fH=s@XMPMuq^M6B2UOjbsD&s) zLdL zcq|=@6%1B^vmuXVBVNm3YnW_~Iw**cI?!izq9i>klqFn?^dpVjC}=C+u4gfYp*RD4 zCR)bl7wq3_^2g1|B^RSUoL+ubt22d!eB!D}4DUk#iGGuLxP=}Vqcr3D)MJE@(ub>a z`jzey*{PD!dxr24gAZcI2Ad4rs60Dg6Win89~erfDlqju zFSv&ZQpfX+|A4%A0e~wvznTAr>8VqB;WM*bg6Silzb9piAA|$pUKq!IhsKt4%^F<^xK-%bGB{XF`p^ zst*zkvNT}Yh5}Ifm9^+Z@hN!rtgtgqBAjNsqPoM-FWDkxsK1Rcy*osa%Ac8w{gQea zEAkJ!bVc`Djk`0pgUE$JCbJZgieWm*kRkvwX_S1*^p6a)OPEgDpczU)TH-socg!M6 z_X>|luSCF8B3gmJzXV3xur<8|iTQ_L(%aygjO`$^4Ww@; zBi|g=XlZ~IjKuXB?t4wO2uR(*s1IgD&`40{4+8qLC#Y_cD&UjYv>5B{yBY6aV} zWX)Qr6|9@}^s$gDv|fp!bSiEj_bX*L75o{9uR%m_;M7b0@@6a{FIW1Fu8{sEf>rXr ztj+E^6)wo-tL85MgH@O7@^z~u1qwhG10GBv5a9$1{8(NUAoWPWoVYQHq9ZVb$udgY zn#vl^A@>Taaj44hkw=Ey@419)?hKwD9OCxUqxi-Ip|(UiT}Kx?6*B2{*gUaZemvnM z|0lG2%T5P!VHNsYC*qYSNjdx|os%9BN{j<^`SIih|MTtT3lPuU7XVG;baCn@FZf>f zB3o@Q=srd7&l6gsNB+veNIX|HDw<82FKW_2ifCVyq5tFu0hM~F$`meSe4B*p<4lty za4zI+Rtf(TH5sH4+ozZVLln%WNGNOhvt=>B>WzWVo&O=|+(x6@bb@YK^}m09!HaS) zep2#l?Q6b!Vzs5=EX}VH_Wm8gh&4!&V|P-(Gr(Oe%jXRKNClhO`)PILQGXzf`2>@? z!e6??kk_ptUh`+|^9$fDLOAtZB9XE99%L}- z{X(oT=3F%@eP}3A-RMyBm9uNmhtIh z^Xj4G|HFZ=0)xTeTVDcaMumtfF^nP!lV#UdKAwPC9EIRB4X!c^`5lJO zoNu>t%~Y%4lV~83gGx9%1nO>iC^Dgzg=gCwVdEP^=gZ zRC?2~DHedqOq04;p84=SiGHW6iZz^PHS|#G+W$9VA79bdKe7?~3`U6N`lL6P2_5nA zctJUo3q!GYW=D1YzuEemQgDFxhEG98V?62;cm@ncX@3aPn8PH9#&|>8n8Tz)s_&`e ziK&AzJv5CY8Ude=&C;1Br8k`BbQ=E-Cz#LfpKo%XZs{kp@Tg7^Zm{%|S-7W*=5!(B z!0=cJ(FnjyBc1Y)G}}!*0Y^m41ofYvp-d1y*FDloKm2a%uEJ zZW4r<>E^SVJ=xXZdB4WiF_{A>}fQPXhuLrlD;KnDuz~WGvwBiTO7p zW_}AQqv2XhGcBl1MbN$_WT#jb|G=g`rN577@H?euDrS;nGx3pwjFC&NJX_cz1aDzB z2lk6}Aa{-;t;0w16%dv#W}vW5UHQbU@Y97Rf~3^Yl{mI)LRzA%I4xa8U%6AJvUj9n zLd(!#MtDLY*)-Am?861`Ru(|$4@|$0O}>>g&X3ktPd5*|)NHO<;nfq(TW>haMX383 zu47PM#-OA#BpsuvYL`{UGsil5yiu6RF)kEepWm!{Lu5~zBhvbnVCBgNSsDM!6^(~)IMM%OpWIv z$Q|Z^%IKLjjX9=jj^r(UsTzS>IV*6BerJ|jsyaP;2Hq!t9vgtb$EgxxnJ8bgxYUaB zTAJb03A$!~uhG8wth8in;r$^%1 zwEYj`)PFC8_DSg=q*1_coZubI8HGvbCxc7JKsHhcuS(?em%x>IXOc^KBKufr^xzV&G-re8dw{!3F=>o)6WpQkUL5F3Jz%>E7+6VG> z^U(o#20kG$!!sIUKS6FZoubgAz6VN}h%B-PugM&*BM=}s=hqx)yZ}P-t{=@Xf$UBq zU-1+odq|r_8Gr$ffFF{*fZp(!5QdMLFA)aGEF>zl5=)PV5qSad%$<*d4L1D@1cY6@0MPrt8BUoaJ;WeHgr~z~ z!Q#O3@WD*INP-0zCe-yDj#89>ud^}!x=lkikr`q8t{cyefUWELlp7bPG^bPlTc5_e zVY8?dH3|j0`a3_1bjI_oaz8A70*e7gbCkeu~Q zm}-+~N>@iGnk8BmrCKC?)kK z6L;u%A#-X*2~hJ<%7jh4pn4Z)dEQc1uKuYe%!O@Ld+NqBOGrSvGT2y7PnJ`rc37iE>zk9%y`ZkH;9r zw`Z4gTRN&$eRYbrlQ~x;T~Wf#i4iOWU91_y{KSJ|t)eeQ5GbKO?VX!a*Egn?%&BC&S_c(-gGi)a-W}A8mW(S?xsQ1jG56fx->#t` z-DJhq{e27fTq&A^VX26nh+n&G9<*6BeXR6^fY4 zc(7oxj|Ino;9EaclHL)> z3sG8Utrc;2EgW6BU63zG@}{~sEV3|@>Cr<>)8hET>>IPZtda*K@Y(ln6AV8KUYtYe znrFBWLSNw$p2`lhz!jMvb#a4euiTOI0f;EWQK(%y85e@P2q9GsuTo~-S)n6fn3icM zZ>ul@xtJXy#v#Wxi$$TdqZD}d>`|gpP{0Wq9WBdOu|ZUdTm$NlEJ_8i97FFhI#5C` zl;|Lo(F@ifgv_#DcZnLTbB(%iGple17x1h)Z0g#}Zq!!XlO?sQ?z~cly6%DM{FsV$z0E zkp#MtOeAYRokXOJaFslii7CnrGDct@uFgrX&!an^ejvn=cec2Zx5_E)jOFz)CIRqT zdDy%cK_qSm$xGv0$RQOv-?T}AN`0MoTuBb0ueUBjl;TOmu49RHkwh~>0`zq#bE41$ zCHHm`yGV}peB=~9NFqok@@p(@ANtRnWj##8BMi1P>iN^*a8oJ1loFy90%Mk5@ zZ#uvJdhq3o^zv!30_{l*TR{7jY?|b&KLYKKY@b*1RJS>!;00OHuO>01w`h-EibS*$ zDm(8M$&Oo~ov+E%&E}PV{q;c8v;!FXT>Ur#3U-~jIYcQm4(|NWI|4O}=wOOc$lP>< zXXBSIStlrZT+fn-7BOSr2}b_`p-;GO3T#qU#Ji_W-O%3ge1`z!u#RKgnH&7XiD3KX zOHKbX$0edp@lgOk!M$pt*vNwaNZW!s))YW4g?J4VrHlf~-~iNo<8=VCG712T13+ow zyXr7k6W#I@=3+QBZfd#W2i!uq=07u4muHQPXYvhe;CPM_I7Uh%D@Jz}Mx;w9^wghA zd$=U|`i7mHX7_@&=w}1Ga$OZaG|p+n-@i4}{T)3k_J0@z>+SVb&x-wD@0xmk|2Ld& zZ@>RP$wT*lo;*2C7I7r@`tp{|)A|v0oocEHqAEJkC#kX?up?BNm~IG(IL@sXJiLJ? zboScq9|nQC{dc|r-?B*0!sHG^PgOB^Bzi9GPzF}3sP0*AZ{Dl~^6dF-3 zuT_YDWY)4`{mUy1+i-yu>)$X9tFZoiJ;&Ow|EGB9`oE$pxe&ZfE(Q^1N_c|s?4ETC zSdvWLGG@Wal_+*lX(PAt5*UsV_=;3`0lvzv(;U5&LPGX3FWh9MOR54F`DFnHi2zla z(0={(K$h-&!y@-6CuC~Gqf!7mb~%I&P}U$nvM9FO&Oyp>py^KOpP;Q#>p9 zzYI?Ii2UC)or3&llDB*Q{}j(s`wwAic?%FVkW!ksmKWYCtUmmFXC1STq_kG0afO>H zn2ADSP;EkKWWL$LwjwG}-(O`T64$zT0LC1zOrxLRG^mFqd82wbUn77jMcU$$O(mMk zkW@osDtOf6sbDFLO9^73=-&D`jgkcqxuK}=N_$mh8DN=^iy}eu#-A%wvutwOqV9Rc zTsaK9plc3ZAs7Hk!(G>0)sVNzFyx!;=O;Zk_HpDLm&bg`xEFva2An+YZZSmtA{s@E z&kLm71lbb0YVOTSxgn#HIPxkcaW5o1+Oul^moaO%5CB%}|CZe=p8x2kVej|1Da;KTBNM(DE{dKPWb>0H4G+>?b&;!VibBT6V9m`a;S!$BDx(wn24(~Hq^-xFvZ*N{!Pa=*ZBeZ8(u$|R5`>9Tbo3ImT1{{- zw^_iRGQA1J-=jrVu_cD^FzcO|j6&}?LN5#aYGqHv$tka&bKI0L@6ZBQbm2ezCT$sb z9>9OAi`WYJkKfz5i~`?XY$^pVm;VgiG3=uK&*?dP`R^$nYX5sxvhiK0^DYBhPN2N0 z#W}ysTTg=@)f@LX9mN!0ORhG>3pGz^fqkjfbcv+K9*yFR_UIyZ8L!7U7Z z>)8~AdKpLFwPH$G+F7M+jnQsJc~*nq&XwU>%bmgo11zm4B{Ro%Mh4-Lzr zTIJ9$tIKD?Dy^A)!AIbqExrS^{-t)eDP*(+@M{5g6Tlp0ZCL{X^A{j%tJx-5vy>D? z3CUaKnIy2fmIl%&qYGXuja1tEDr7PQy|$J6;K#$#hYVvseicOSUG0aq>w5_(C~@%+ zykzO4q%%4%uEZwry@Z(p>mjM_pa&PlIo*Q2$y>E}-|H)B&8?5s>RS0th2ja?GLySx z1c%@`lak2r9F{s7C6(3M%F?GG>WaL6hzUVZYhh6xq?2EqkrEs^l49tWBctjX6=qn; z^p-=Z;E0B)z%CE{D)iKWDB-AlY>KD~Z+&bxARTr0Xhbwhg)+I6KIRFf2$7PCd|B8e zCHe}h&}s|i^kXq;b+|UArn>rD(9zNnT8n~~LfSR$lxQg@m$2*qyqFRerdAGdYUPlP zHnp7jPYIT?YFo?I(`YL8(#}Tnv+wt|{oc0U+nREw{oc0U+y2OV+mmi>IXmNTZF5{< z|C4v!9?}2ba;%d5Pq%t|``=SM)c$vk+$i*5vQRI95|%0q`9TCdo;^J+gf*`<`6<^V zbBDp~u$ku=Pf-%W;4Dm0GNQrZl~dr_W5#l|7H9)yMd~1T(UV7ks)(oSk7~}J)$8#z ztb02PLZ})iL7j^ZHHT((q{m?e+sQD@;=wP)j101fhTbaTIgdk{S0;aWQ;FU@4x8as zjC!}mu!*Y82TjyyhFUT3*czybs?AXoHCCYZYUT%Cb|Y{K)A)B?*}%oSbQW)4ifV`&i?=1W?G>S6Jqof1xoeoI&)dv8wBrER_~vP>WUh&?tWpR_gpy%Y&=r zzq$M9@jnbx?-k>JIL7|||C2nW`~R0&cy^u*l%|*4G#UWig{qwaQWbrD8LdJevXjZTK|1E&V=*zsyj1 z1LIaA!lGzO=u?i~vSt5gQ(soDf68?q_5P=6>qYs$XFL1#|0GYz{v*=cZfNh3X5D2M zKtn7dZi3p&0Y^UmCBoc;#?Z%h;Lbk|Qoz0~BgtA3)MdeyHmq`%!&KiPx*O}|Z^X8S*6TGxhRz$*E_S3LhQ4c*?y z|9X-~k^fcwdTl)*?@Ca%-Q`QP8N?NOL(W7{sXvI_xwLhb6p6z+Ov3GRtyCBj3XPO( zHkG!XMuE3>tbnXq|C!Um<~qQN^>16IQS|?_oc;aZCwVrA|98!4V%HIXa}F}R$X9bI zs`I5Kza-4aCvrCBjDA&&B_BXg>BR5IguJT=g3AE!kQe<T`Y{xK3eVW&k!>)|?Crj1N;Buf}o-hy}-=HtnT<*)` z_m!4iU6{R!K!3H%ZXbCso3(j%v3}}|NEeD!r>CI(zr&y&?0>>H7ZS4O$*WO?-_||V#wNmAV$)GXwPzyW< zRX#~%B3t7i8p5CjzAAaL{#i`%zsa*){%4-@9p&ak=T^B0(NH5;CI6d7G5?3<*!%lG zPx3JNUx@x`B(k~{F3UvWfk^u%mT(97ArA|LGAn*f`nRz^N8#$+Z>3u^6<$E~_i==+ zuk#H!j$^_PnEH|RB+L5FP599Bs0ads6Y)ugd;G$)MDZFGd0~tAwq<0aPW0P}0RmhqHpW|4zlK832I zGQSLShZgcMg;Q<|w9;gTTA($JW?^~>(@6`oH1e8e+HJWroJP|YXw4PeI0lEyhRiFk z0b$KohH2^QsyoG~K2Tc;r)I#GA6~VJJfQ->rsq`+PpitU&ce!e*P9IykfP~q)CG|I zQW@TMC7im!TpDh+G#ea3=NoW}Qj|;yPp3E4SnlWCIqCnG-l@)xOBor>U17&j!lT*7!9YJ$ zsFPDG>x&$Z7Qv$>J9Aibkk)i9tPJnFY%M6keYaQ(b$|cXa?pS4vx)rAg^k7s0;~Lg zdOfEo|9ADh{Qo46Jpapy2)>70SP++K&`*q#r3Zn_Bx176dCGhF{lK46V?rxuFce?U z$j5eq;t2a`lq|rnzaA|qn8Gpm_16}Ic{vLL7WAoLjm+1HWie{dM(!-}(*=>Y(E|;T zl+40o`~jon2z1m@m07G}2_Ms7PP4jt3HYnWzGN!=YA4}G=a?=CO(lwT6G7N zRW}DJ$3)cOLwWZCd^M*7S?>E?MTh5VC#y|EJeZ4sq);KqNS*AnIf_|VYM`jaNt8xz z6dZw@lgk5`jIl~5^`J>fdU(ZRZB=(k11(LXk^%X1D^y#&rCI$^W@I`+0&!C_$m?hhs4I(@eNIEGU7%57S6FKw)O{ zHBNV`E$&aTL#!?9v5l}Ik;59&B7-3vPBws$SKJElnmDlJHm{s>0+;OHMIJf=X4fH` zK#Hb(Z_~gXT1a`7nK$Dq5q59Y`=dRL_`isIw~6tu0snXGlKgL&d;k9@c_jarffTnj z{>iY4m8L)OwaV}(zO69(<%=~j`sHinO@3?J`~Yxa42OQ;r@nBQf}SV5q%?5x`sVid z^xfIT!5a2KB^c!&(K;xpXIHjCbvz#5GDrv*h8~Mh(HZ(-2T$nVnoIw|0YWkG!;v5Q z>0&j~J2uih;kJNx|KPx46lPsaFW zQ@p0lSBCjkf?3xu;HseDwI-fLlt)+ z0Z!61z743?-)&4!69;-<=O4#O?B+kRFI3i5?}Lo|0I^PX(rMh0-)Y0ux5tX38$@@$ zkcZsBN1@F4GfRS_TsEKLRSh?RG2*Mebi<;)y)n-2I{aTWyp^-mE?jL$Vd}ei_%zQT zbr>sLa0nt729pS<@@?_j3m}bEwL_lU+Zd*k+gq+{kRMcGsJTM$UuMEspa1V%|2NGF z{a@en|0j9M{C`{hU)>7I`oHAF75cyUwnG2U7i*&b=WA@K|F5CcEBo9ZQK^?Cu`8us z9goLX>Q{K(NMsuO+_3GcO?Kv&9hABmU(87bt&(Gl=!_`FA(h-k>S5*`N6McP1iklR zusEWb>bCaGY2b^qbbkLh_K*MeXU+Xz&hQTHKSs|g#{V&U`}luP^VHdY)Ra$8Y5&Qx zKdqrYR@;A6jdu6;pDHouk?lX(*sOiyPpakhcm1*=jryFWtSWVsgUNL?d%gB$zoKPg z`&)mqAM?k$>Q~t5AN|7L#@g$e{C|Dtp9c1S%Pi`Drfu%;e>};v)c=PO?~WXQDi@tb z58t?fZwtHLUS8brX|(?5aoD+~i6tK+{-dFr#rO}p(=+$$|0$k2`H!a}eM-@frXy9P zzID=^evzptTTzTcmf3XU#HbkvP%WUy#_s(Djb|{~Di5m)q@uxtMiR$74uz~yfeHKc z#t(R;>;G1B_x>q7jrl)c6P;T|v%A#)jb1VTx9N2E`M;jzspJ3RIuM&}AT|LgLs%44 z>cGb-h(?vF^#Ke$S`${>E+U+i*`G)L>ca)enX6U)NL*ri42_?+{e%j??Csk6KHf60 zkLWAjbugd(Ui15U*605_kN;rxoFf0Xy4}70|0GZ8{^z#GzZG0EJN@M!s}6tprxjR(xx-S@ z$P$$&@hkdP5Bntm&y|2-|L?E!R%N+1I4t&YCxh=)48BtsePff+ucy)|0ne+@6Kr>e zQ9_sd;qr1Z#P~i+JT@{YoWDt;Df3leavV<*3RY+4EZAfPk5`Z{`$H&R52~L|X3%Kk z2~3dJmIcKyGGy4-`ir6kn@4V%q@|?fe?jCMQL~A^11TH$a}*+sFOz6U8_Khhqi zXywryD%O|(b{_vjcMP-S|Gkg@`!vrZ#Q!Mjj@n~o2mMNAH%&dezpC@>{&;zDd;H<% z?GcNpUf5Qeu-s_CNbO)No$D(l#Sx=z1f4PtM$wg+WO z$@S~Yo0GS>8K!Q4wdNC>nosg}qero& z*bQwdcC{^~+{xS5Kc1X_IDLJ3@%rY|`>XG-Z_h42+9h%-!!L~epWhDEaO|AI*fk!N z)x`YR=9!(?W>D%XGRXZ{|8KI=Jl?Zh{^PO#H@x>Ro>l%IJ*!*H|7=@({qIShrTJfB zA^R%~gcJTd81FRqt4K0Y2p_;%?r0VSB0tD#8?;uu)9?<)qIL#KDOJib+s1Q)$G4aW|>EL;jGrD%_}_He|TN0&DhQ?p$ijKaj4c^AGh7mZ@Zy8YWq=VZnQYh z;$rl1nnHI%l+#m0{`&QAAqh5I z|03SjKS-#?Nsjsta z?R9fm9H9a}rIE^iUov79D3k}TqELetinCs7O=K`6Ls^7JQ~Fc{_{gWO}uU$oAxn-kKN zOd+TNm08~W2koz-A?Z9z&Y0A^X@ z8K6>|IVM3`%q5|x(94Lv%vl~^07{VmOKGxHwm5ht>{@rTAxc7&BJ3t!3moQg%B=eh z(UGWZ+i<3b<#n>cG*0VgusAK#${CriIT_Pt^DtdD1=B4?zrOw2fnTG!@|YJmZN>B- zlDE^`3&~1XjaN0rmSM@UAhWV;5iMyDS2cE6>Tgk5sPIXuWP@29&Ip-8!9}MU6NtL^ z{_YGQCG$orO&}Wice2kJH4!Z;iDoHH>z5{rIP$|3w-nb`tb9<@%H5+OJ%|;je@&ZF z=9xF6&V1>Va=9gE4bzQK=hV|yxo0ll%!+Swqf@{C<+z`+E2Uy;)1VZtQ*ymDP*Ove zs{)__n#4E@tf>Hzm3gA$jF12goR-F9w7$xZb_F|8d1?j|yD&f}NTg2$pp@UFz~0pV zF9@!!G+-%?3Bzvr4=$oPl&c!c)b%Sg_sN2-*SQKUnll#_!|%~&gDRQ^b2 zL3VJ&XJB42{A|Xu)@g3)ib5@gqH~#`424yoP4eVTfz*0A$0Fh=pE%=u0{fg9PP!5>INkSx>Og? zlfDI1_o`4P_l^q$=-=6^Aa zz5mzKJZta&;y~pwc6?4{OLu)$J=|u;FRGbq?e+(%GWuI>`MLJXySVzb7E)1y!E={t zn~GJO2C-9^rZPMH@F;gm#cS>6bc+3Pc(~NJj8kNd1fUMXwr14=D=%(}Voxl5U$#M( zM2s&ow&3&J__pIDN+UN4@>6jLT5oS|F0ZA*bh*7$3_D9$gt0q8WSk~x8sjPp<7&}l zBSY!)C}EPSAh*^@FvBTI&MsSr;5iFdB|aYVeU#Wu|D+*_#B8M!uWfvC0N0_o;HEDk?8)Q^oO`N`+T29E;$VPB zEs1OSsaiD|b=|-S6W(?_VtGbcnZnDwKwDK|IZ);jR|%SZsvDJRI8BD6mZL~_ze}7a zkh9Bmy=Y6_j%UNb$CHaFC2GXt*z*WK6eLmiH8;A;K`d+BkKe$lA1qY*&A-c^_f!;L zK61Ql5WxLKwWSy@- zws-(k2_e@;Rw0vXD#qtI6)JO^#6{#$yExfanSF@utrWSCe>^;tofNN>E{Ipko?mTk zs9F%rQ6NOM`{`lbXR-kvaxN7hH;s~`D&EFE)vS{IXUrq5E+*h-I>RX{^_MbOGUu$Ru+7i$#+Uq@pFI&) z)$+NUIs^uF=+==3%j>$x%VKsch=AV{+mrdf2Oh^LF<~9*#Dgb4c&v;vFH=GMxTQ=X z$fj4Bq5j_an*6=o1nPQ<}WBWDepPsHW+V`$QAc-rsS2NS*ol{(>al zt8f}&`;XAON)XXwPQ~nBB^}eCaIZZ^%O5di>kZC2(2|bPSMkI2yxcwj*2lB!{rfN zeZLwC<9_+jq1HT-HwWVQF4OdeL5$P%W}Sh~rr!abB8b1E_uDDo=#=Bq9K6}UOwVp> zpA{{2*|7NWiL;$OkyQdDN6o2&23bE0PwL)Lov2WQ>ipkVF??=?+~1-0gM`nkNSlKrLUUCU>?K7p^>wV`%`&VG^Ck*%H27ufSM$v{6V{ zCSAjtTX^1!c{bd1Ona2|OnHxsX*8a#^SBc2aCUtB_2%sBjquG=D2Pr4cme2ecdD(w$Yi#<*xQb6nR~TokP{(NG>%{V!RnbG<=4C9=q4O4aKlDu8 z+VyJqDVZ#*G=14FQc}|?K^K|M4^2;_X0zMj2#P_Jqp5^n9XkE0r29)nXJgwEZXk|D zggIj|vWj+D(o$je_vCBx_oM?l-ENn2+Q!M}9~l8(-S_W7HC9Z&PHDuJgl~Z9n?qw# zupJtcAe0=$JrVqFI{X{jii!9DXnI9+oGi-x@&;pJ5O2`74q}cskfMD-zQ2#`)DNG} z{b|DgTc-cnng6>#o>b~TKh*!cpO3o#$uZg>z{u(G97>g!tvR0K5K;s%kx8r8Ig0$3 zKNgMF9A5X}We%_3$BcBY)`UJqD7#3rt!6bVxtj8y6<9D>uQD$28w~DmXe)dU)D81a zjLOam=V*PTZ?YT_l+e=qzpJZ^>Wi39n@$=RBM0U(2;vTI&=#b|GSpAJ#uL7{sRSJj zJGRXV-tS^Y<&5r{DZ#XwPnE{(zPPz+IW-NAa&bffP5^#)Q9dQL^H%P7mxq4wqv_XP zCg{`q0gnrpTzmQgZQ3+3wa zZ~NHq`L6CFUBS3Gm1@uN*8_bft29kEl81<$y&B^7ARK1o}{L5c9#jwCraSpU_eVd@w2IUv&D&zV0{?ZTnryYkiZs&{!W-14X!3$z1;JmU@TQmyLPdYu zX46q7`|MhGz55Nx$dY$hKZDYDKVQ32r#?uS?LT|de;MS^#savD{`V^OzkYxCkpJgi zKDzuTXLr1d6GCAU zB6DQAo7n?({j+}drvG9eeUAJuqv_O^|NFh(ga609d^nwY_AZ06#xf7(NarGb3tM?F zdD01s<|-iaAHCGQDC{T|&DG-vOd`25HLd_ToVLHxE!=1uxKg7#uvGgIsU`0YujDC2}|L->|F&K0{zl7@h<`j=aRSe#?|jLfW=T zYW<2F7qf?ax3v5iU9QZfyw6Fz;*r zw8h%XAUQ)cu%f{vChj(s4$POzyzJa--Gs4kbXlPyiZdu)+wUX-c@niP&gh|(9ohEg z+gzR*(TYoFJBXu{b1hqeHc*Y?$iGX;G)Gy?{pJ}`#_FlPS}_t-TnG<+P!lt$WM%6X36hFuu&Rq-gahWjpCNAE7Kxx2xhR)-nY> ztvr5jrV;W3hG>;01bN`{r&p*kSVAF1^L5MtyC7f51}@m$ny^|5AlSedN5Jm$@z>zjVO-_bA!L@_vt!@|2cTAYfEruY;hIL=kuMX%s@q ze|yXS1krV?>c6}1|E425|8u`Ldbt0)mycu1@|D&+zmLBKKcRdf&Ow}pFqSM(I!Y+j zL1udt&m`p~;M?QU5y9H$D!wuRT36?5nl4a+a(42vl+Zy@90PwJ3E*sHG<%rT5+pVXU#VfVL};b!miud+ej zx&3!A><#Vuul@e?!Teny-GJ4z|zgp0a^&oVv)6% z%7{#b6HJnn&n+LAyJu$)E=-E`G}{|fE&Dw5%&Rb>8&fKNs?4VNd9R7oWXrgO@0&{v z@ZQrH!&!9}E8W`QYvxdU8FbVYjya7noH=K)eABr}osZ4gbv9`_({P`y>+fm5sW0Dm zZ)7(zv(*cdlHwX1<|SGy$<=W~Oc?7yeAV_8hLnS4e~g`>|}A|+t$#VKl_ z??@Gb+F!>38yAB5@&U{Y2oWkm?5Pqw;7fC0)o1h{#*^lmR>Gxnw0?bZH z%n7r_S{qdWY;+BFRaxa7tVu4gOFT1r*kfspg_RC?<#MXbR64W5$)Xjr(t&^3j7p7g z4>HUUs*qtdYXzV>5-b}Vt5}2v*(Xmnc9P!evnFRx;k@6utM+wQ`QxRmZ}m4x5qC67v4!^BJE<9(0Ohv_KKy zNzE|bGED)!qu_Rl5?!9f^6FTltj1-jc>6-U9cX|nw`&eL*H3S3$ULX31l_USsP}jq z#&LRksX#m6;o-ML<^_jvtTT`}dc^4%VsMJ`F zez)9c3Xvq=RE0=2!5Z8;F|w$Tr*SfpZw?)6$pPw??wpba_7t-|o`0R1Y>9#FXTX|C zU?rN>o(65V#9)s-G1#>!2A{es2ELtO2t8I+9RaGMG}i47Ddg}rmKC38rLVAO|CeG9 z!8J`+km3-=@s{^;aen#c<+JNI-#vf%^v%_?*S|c!cvfZC7ce`IA_v0_*Mz1k?_*B; zyicQT0#`WnK382o&C{%|Z_jhpx#w}&ySqV+L}vuP!6@>K_(=-@c8=A(AVh2co`LU) zgbBijMKR^R;T!wm$=>fZ=+7Ffxe01}bPlmNpE=&Bl;a}5ibd;e3Tl%=S)D;kGg2+A zCGx%&B{<6pS%=^;xWP&EoZA%2Y%pdU9n|AW-02h0?+r$bS{5|Y2}MsOTa5aN5cxe+ zL@FyL`dKaF@@adVv)0(|q=qHOC?NWXk|YWpn?zRg{MHMU`dRadk|iB9vin&@* z9%>iZM85;&?uu7gj4pq<=r~aY9m?H(JJ}|z?hh}#A1`-+Tc(6wLb^0Fdi>_1lZX5-_wuQ& z|4)|)%;Gfw$v`&05-}R{H0Qsp(siOU1@O;w2IvxUBVoQy4rXYc<|pd2~7`6%tr4sa}sr%NDq{Ttt?hkAE`0=1C(_33pd;kDm!G(liFW+6%H|CZwg?#Z;x9RLzHJNQ&m_(w>F6bQ3aB@tR9re8%7Js5} znSyW54SPzM<~a%}TXCJ72EjM~`Tl*i?gxw__IQ)2;#}Y37!~`Dm(WeAs0ZSBMFw_Z z!kc#hul5@*)7u1eUxV@FH^X2zfn-Ms_ctQR*AEcN{krIuaz&A(W(K6#ENPB~8*s{$h z>A=U2qV`6%3Is(G#WaY@=wXe)k98Hw$B*^+@94M~9oqv!3>70e(~XdyeTn4;6i0rO zB?7KIBn9SY=IZ)vohF_1E|k%yU1Hbh)ivt}MmaA2n5<{!L-|7qpwhyD{ey7p`!tjP zWI#B|8^r=5bi?$=n^BUQ#Ay z$0S^6E4pTskM(9y9-}nj`}Z{h#x4zA`uXzB-GaOeXf7gQo5OPiqgP41eVwM1iI`+dC|Vg5r1A<=-Cm{% zdj(Vk%d5$o*U!$MzIpZX#ecnd{p!`VIgU=h<94l+0_6?bs=F{)~~uK&IZalLI*#Eo}%BX0dBm-T}pc_qO+sl4uT z`7|~PN;cd>#oQ#CGpu11l8@wg)i>P_*4R!)bH~oMAXsxyWqUG5O6O7}@gf-t@qEiW zJQg6B(ucex(c8cUp!1Z**LVs8+NQj0S!YdD_nOT-B=HbL-=S@(F4s} zV{@8JyIPKZU*jA_pyL`I5qZk^HElWvE0_`W27p?|G<7xY@DI||N^J?nf;_4=*N|WF zs>x!QT?>7?Du}E+-Z77eF;h5^^U#Lo5E&mChtDyY2KT7Lt~{1<(Jjb++k^E5B^$*xsyBl2p=ogj zl9X%YxC@G(N=j_d;qo0P`PKIda8mrPhu)jL?4jIfr$t^!~%2>^PUP94rfh91xgI$I~trwptU59j@&X61H!Zq>u+XEo- ze~9az>wJw~o?n5hi}M%HfJ##n0q$a*%u_K)*0O3wXEfjd7@jKSLv``e;i)LOuV%$L z`$KUv!kg+IJtd&RF|z#0W6^h;{~xut`~L~;ht2GNSsJy-0JO{g*Y6GO{6FL2gZ=Mb zKEnQYaJ}T|QG_`UGhMsJ{udnVWdO|5NYDRc$c=@SPL$x~N74SR)@)Jrt*)l1tl;X4xL8Vs-tw@uIzofPJq0+#! z{~7r$u1yNbrB2MNILvrRPlFtZn0leGGo_M|J}1wGcaQVnO3$BiFuJ_;sQT21t1#>d zDn{u>7T~-=TT;`_2e3}?@8AOlA3;KroB(oMoTEBw+^U!?3De< zJhD}w6`j{HLr(w{0g{eqS|2XuQy!Hp29K4dUx9JRwYFVMt3s#C-SBg^$YF$>yJ0P! zd3HnfY0KSE1@tMqp$hE}+YMDz%H7~Vv+-`Iz-YM}igTosG3(?Tk6Isl1InkJc>~lR zc;F2@^wVx4*y5<`0CufxSYbak+{e1+_izpK_Bo2UiUEDR!P&sSPoz_lvB1IIuVAe? zxDNAjA)Sw#FQ*I4e#doB6P0b9lE0QRWZBQ&^8a~^ArXR{_Vv^CrX-C}QE2Pq#{>QQ zr$dKxt`PIHtN#9Us5H&eI9+V7vK+zaB25U*A(k$5-iLS5Z;bLXS&sI#A?!b)CG3CZ zr>Xrfr_FPK?}-2CPe+ydzx}~O{jYoZ@Ed?j9)DaI{8XJA!{E1vxsP9wXnBQ-Oa`%; z-oYLIX4M`le4ovdK_<)3WE{4Ppsr!(yrsd(D~$yVkq2BRqLIIex4TVm`9$d$^p3rK zoHJEh1kk7(Xe}kjdlhC}j6)kNAH}00NZg(v)3H*!wSHeZCFp_Ok1HN^W@o8cGMRF`WM5q83fX77(@HIKo9syCDMWhIGcCUq6ND+rM5JS}9 zlvhR~4&2a1vOJ|}n40DZ?jD7H*PeEMyuQBda384Z?^mt|*B89KxI&b_o`LI&%gR+} z`II4EMW`A+?+0qIUW*C){@!)|8`6J%qu7)I?27-JOb0goAB-RB|K7_-(0{(HK=@MQ zGy!qCz~O#WU*0hn@pf5`S1{kIy0}u;wuya31(6Q|`Fc^~T!*Q$Zgk4-WNHSzN1Xv_ z?@68CY%KXkRUwKYAtkz^S&7?Yag!~dirb^TM$}PdF)Ta|51ohj5ue@bZ6@j(a;j65 z<&n&RH+d=9A^Y11Ula?glRwd@!d>_^w{8 zl87FNocY(IYZxM|AFG2`98l}SVs-Wt_P~v2XGv-H1EOag*Q(jAl{ArY2l1~r9W}B{ z#L!jT^nCzGxI|3gDM4^#y%4;!&Bs8)>?#d!>PJyKrN)|T;)$cTVh*@CBM0DodFN=F zL(g`@b!{aDmHP(3_$i9vwz$U9mXRIfz|jcQPpbmYM9y`Nu9rC?%QTLvuY(C!;XlCB#*)WaAZisv85$-?lhW|H{|8yU<{iVPi^50*Zil->CW_K0sO9(Zfg92cA zBCN~E1Cc$|KuN>eh^yA4u7e$yAQ}u6Z6q3~Z%v_y0pw{07u;Aa8rr|^fa)WzHe-Lk zyZEkA%+`Nxxe1Mk5q~}^xf?biE#f1LrBO1*CZv^=q{dsW2GyO!4;F7)o~z2HVb8rA zNA+pT;`}Y|zNtRlwM;b&^>71mH=j2Azo`Le2mc?9r*{3{!D#YO|MOlx-2Sth|Lr}EN+csy{;Rpt=W$jbS_9lF(vP$m?BY9MjEKF42 zVM1}T;Dp{JbI0F;^Y|8S3CMCZM>&8AFq`9fkw}XmT2%kA(R@4o%e(?yN3`rXr04n`2>us( zfmhhR)pK@IGAuUK+ z5f@wRVyywc%R?f)pH7Oop2oJi+QvrbB>->FGOSYjE|m$}vuFEToYuak1d? zWO7B#7YF2JN&y5L7~=?3P7`t3Mb)C~|iNSZ*)kkLs|MNYfgv_wEvWzG?a zB$$@$Kg>}?#HgZKmZJ?$*TPRKO>fp2=xq8O&=Ck&<0Bai%RzEL9YseQ0S_y(E*3x1DH)l5el_p4rTxQ0Ar2o zAljXBKGF+NDvEBTHz=o&9U&f&@N&HZW&Ecgdj z_U3xiV8QD=mUB^DxBecV9Up(aIs1C^f4<&yWiMyLVQ<1s?)Cwb|Nl%-F0w&Lq|LMH zdFv^pa0UqiYW*vtT<39;64DII|4m4|N+a|{rb)ebtg{&6BujJ32$_XCr)3;dKS8U7 z>x0=G+&`mPXhGsXk>6tx;>qXOu?OyEmRMii)t0TL0}1iq9uSbgT`0&$pAiWmBEQPu z?`w4M-dW~ELMqntvLHy0H4-5p79?snnAeg>6reP!u`jS-oyVZVcO?VSXhXK>gYEqL z=!czLM?ZTU+LoPp26pEihUqGc5k+QSe;~@N9)_a*{x??0=RgLTt7-j_wyPc?l(eb7C{Ss?e zxXV_o6N+PyE#6>~BN%N#_h;Z7xAtd2{6BsK-KDrb5DWV8<9~uE1tdl&0|UUmB&g#` z*Zq9{GNqR}A}FDM8Y=tce%jOj{SAP-?0>^irT)`+@(}-VFP|^V{%0_T)+RuUIqb7dF8C%zxS9a~S_L7P`y+ClS~en*6g4tfTWCraKS16=-(n4ZynaZfzJW=FHi| zH~xCd;LdTXUR#(4OW3-~sQo$~4F`tSST8=*>yFNMTN@4c#occ{`~$|a)09|C6Ys{5 zxDQ01Ezz2E_g1;P3ERV-rl~mE$XZ&}T);9NRB_ZAfNE$~vzMn`Px~6z?xr`NiH+@v z&)B8U(Dr${b(`D1I1<`;Tpl~zXFckFMvL72ewylkynQ3@kKOVA{ocgZ|9XQ5|L=SG zd|CP*-(8=g`f&hGtxtgdqZB^g`={%CC72y*Uo?Bpm6o%z*l?%Uu_lB6TM*PcQw}-U zIt9*butUkJLTjT|Il8Ps<)-^k>b zxOw`gUGm>#GN|PL>pkRux}Oh^|KH%%nTP?wF=EvG$%;)&xI||n7>sAKJ9v%gI!^!u zB%M=`q!Bt-*-^{7AqS3{8`|DsZ;^ljDAFk1plt_qzJK+qQ|3o{%yZ;*zB_;2VgLSj zM`lR!Ns*o&y1ax2nxi~N(bIK~lf{*&f`OC8^F@*tKReN^%E=6 zCbtMLmh=qt4LWVD;}Yi4C#@p`@Ojr!^uS(Gp(*<>qn-))8s#dqru*--mNl#Q2@6-O z89VG9&=IHQv#empEbNAU2P$xl_o)Yj?MF2N4WJe%q{5u|erW<#ykS6ffmt|+|2u3kZsYW2+pho?h4&KSQ*nR zXYo+e=leZSiC8Y8omUy%YLj+oH!VbNm}SAudWP}@QA7fq9v3g2iD=7mf-BuQb91?i z8CMs@#zLF`*#P&I0HAm{sPSgE} z8ltB=kTf)2cz1$^cBFU78TYOK?XCZFN6qHC|NpZ`{=Z4z_W$k=dV>f3|2{tZ>Hj)y zpi2a@oGC-Xc^61hQaJ!}$MF9;;ISxu$L%IxT8qg&YtwCoIr!yFHwpl{} z%pM93So&(K3>ZPttLDgEzChu^YQ=u}0BCx}Q{)#d%Oo&ooOxJ1aX_`21Dm{Z*1(!D z=5fS$TNlIRPo83tmQKscEf=M{JreJtNYB#5o9K0R-W!$c6{zyv zYOiLem6n>u>sZ1PPR$Z(jXviJ%I*I&4R25mxZ^)~jTV^Dd@HXH0cXtMafGrQg^;4? z46F$P<|2ur5PBV4oDhm&bXc9uGMYuI#4(%ht#WR%4uktfCy!Ax)q7G6{pkHN$#jZ zHlf*K7oLVbT90Z0^Mw!dKYC^N`|N%G2~Bez;MSY~?2`Y7ql)}L>OJKDzL!sP`CsSX zS7K8DUY_2?i`A~-1yxE0tYyw}s{wi6YcwS3mGlf@FrF~&=c#M7roo>f$VkQe!aG!wA-#dTrbQ~524(00N{Kd2Ge}8{vK?7E@ zJq4|F>A>&0@`Wy+2cE1FNIA~*@i?@5cY^i}*f3tGV*8>SpwEixS``4QLbH3^{f48@ zLQQ#h!DyKby8WE9Rqb1jzEa7~)yh2)JEo%U)%T9Pm#Wr_8;mtohyI3y??+Hcjej>Y z>dEr$Du`4hr_g3VniS*gOp1*$i{N)d4;B`4F5Fsk8 z)Q{i42fFE5=7A9jUk;Bz#zh;}wc6%UD->Q_0rW^>c;mkgD5?G?(O5E|G^T)E6lwX0S;C6`;Fk9m|VpJ)E;SImRIQR%|gmY|5yF6TpY81)K{`ej!Qr@7~ZTi&ily0 zw*k4$4!#X$@aEv#fUelzX^s~M-~RsxUx8m>&g0>pKYd0Hf-Fz}i9&i1;0VEE(L7K8 zc@S(!m`3RM-+_R-&i}=a=P!SF_TtqK!793oKI+f^WYQa1`d@!EeYpR*pU+p|VhNK4 ziqpkkX8B(a4i5eTxo^S~DQ$I6g8nENbpHC6WBAvDufF;U{AN7($73apEHGWJXIu`U z`5MVR1+$EAtPJMpSbwu01c3qR5Ii3A27_*|-yMt&4_IFeJ9c6ZzLlZHAQCsmB1Sm| zNt$$5@SkZ89{=`Le|j?63mr_z8j)kx{_ya?H|D-?%>CA5?pb5*>ti0OF@KNWu@Q%9 zo}-Y06($tk@bX;TJpjfrzusDBiyTG>-~<37PZ^m?X?zWdzLWUGlbc;W1dc% zjd?n)8M8;2?X?zWdzLWUGlbc_$1KJxf8@sa$NZ;5IS0+i?_}yHzdfID+iNY{_AI{L zGlbjTsYQP0_#KGT1=qU7-6b31q~Q=Jbwl*9)n041+Oybd&tR*)c1DBAsNtALbz}B$ z)n03^+OwEQ&)}-PVaqW$Gn7n5enUym$3c2+Iml@+m|A0&9E7ot?%>qLI2D6rA_6=D zIZDzEn+Fb^;#rK2WaN$V+!Zr1Xh_%wUc$!EcFqKQ(0V2eUdkZpGto`~ne-bnu)ddp zF$8^MZppMygTdGu^F$wW%TwNKxX!&P*F*M!Jw9zVpX1ZI`E&~e>_O}K99i=@*5|XG zKrn771daVd5JS*6=9U7%X)qXCV;*T^ZfW%xPnzwa@uZGcxCH?Ap!Jvs)|iL-m`@xA z7?l?wnu+v_jChJvePX=(p;C@_STkO?G{7FT9&g_o@4z|Ueb=}uABm|b^se!wnWb+$ z@ml&A^1k_KDJh%=gPt`XeSJRKNebg(!!Zx*#_X09*n_rX?w?v?)+L30JInpJ-%KJL z_q`G!L(ntk{(crL*O*VtG51fMW0o6P2}UGcArRp?&ud0`YJRZJ<8KH*^{No0%Dw9y z&WUe0`^}j(9Eu3-4ufGZwT5(}56OEOQLdX@P`-Q(S^co#Jt2R1m zcIZYYb%)L;MC~d0x&~UjlmYmn1sX6w<^Yqn+>`3BiaYATMRy*)>*2HH$K z98GJ)!@e#m8NX|YjVp+)(hUMIj?24oP-J!F-cHvS7q11j4NU+eZUXpLWIifjUEKn|g0=WpL z@h-unnT|i2OmvOM0yb*6aYv_hz?#XGqtUPiSVIMVG?>-_Ylzvvz)Y@{LBIJfj8I0n zpBdYBi)EOL+p_dF@a}n^c-U_x9u|k&QW5&Pi0C*&ceu0eWLA6vDi19RZuYxFul46HsH|szKH;pjY-WjOV{L!~``!b_w{XjKo{(|c9PvaXMWR9_g*nc|?RMP8I+sfS`PXLoElMX9VuWJ88RkQ*-f7%*E?h zE*T5#!!@Dls=P-O8G#s^kRu_1T)u{cY3e0RQ_u2E+b-YKT)t`j@+ntzzHN1Xbm5Hk z6U@L8CQ&RGRI(I42a{%^-*Dm;{idD`Fm1a5CZ>1L)UyE!@}%qI)eC6TcTLC+K+j{7 z&i;u)O60UOJlTFni-|{`nzWUtCZ;?!G36^Zd z&E>~!x%}AV@?(R`YqzO|6i-r4K83|+g;q0^1Fc|to~E>@ck3I2n~{&(GV-y>$j1gF z-}lOGFl{EO45nU5W$a<(5Unh}M;NexkOGyQQ}rav~B{@7spj>+JWa#6$!ZonA87(+sk;QQQ!fWR^(l&4$J z=SIv!Go~;&@!D<29;QET%k)R~JoKFNpiVAMC{Kzb?I!5*mkY7{?A!LoOLJoMiJ;pI z5jhYU+!s&XI-GiF`7(`m%*S~YspXeu2VR&25&*%A6h_~{7$zag!8w~3Is9fK z;J|Mw9r_%bhOHf&hL&T~PC2GPO9YY-j!+?|Fk-JSTGQ)`eX`XKkb za2hmp%^dh$GlxDOr(tU!r=jKJG}L{Z^g${YwNjk{NtBAx@qK=}nXnNhB+Z10R0{ze zOqz*BgNavh9s0bYhOND#hL%^FvZaeUY+YU{q zE@OsT3em%$Kd@$JsLhVU=l@dVZ|Xh^W1JBLGMG~^I07(&8NZug1c>YI>`SQfFLumwbuIoT@wnj zJl)_30h!EG3_e`0(g@5U7T0NTP16kJD=f-1i1j&M4piLB z(`zkq_e_zyr-|J4n7BpWUOSOj+9mp?8Sjfocx zx8T}qE4W(uuX?56T91ZXoNS%^s%J0CWIr_Aa!~8sOjc^9UMUALG<@2GFF#Vt^hm`% z9htZc_rt|UN7|DS6OF-sXt+5|>(oM4W}#lmY3kANk+M$-!Rp()q_-QFDMQ({Tg8Jm z*i0?HCm?C4l+HaWkPY4-z`gcuV+BE!@Ze4nqn+L+Jakj@-9J5Tq@SIhdepP2kL^xd zv)!r1cBeMmb$B_sRJ7A(_s^%k>*uMDolje{^Qpzor#3t9d%`nragG*im`4C58?b>n z;dRZ08?4i1M0DlDzSZ&NZ}u$g^#feV1Cgw6MC{)$moKHiAQ6RXZV`ym?C~wvA~)qQWV>S$<~VcP$EO~7XWCZY znVRy>)RK1`izY5AHd$hO?)dO^2}aYlg3;6zjHZ@g!wZ8 z9+)I4<>5jvFri|H^Y9b#RUBhRjj}uq5g{^g8K;)axTkUOw3&OrsqhXkvohnPHdtER#EZ#n=8thI+%b4>&sSNVZn%dN{|kXA z5ev(Xh%9EvU53dvq3|7+tJlce@6_k)H}#0x)3%~Ed(jdc47s7|;KHdKPXaFt*vs`y zD`&wb`iCDcUV|0RbGfwRM!_?u;}iR~RFc+coy9n0TSrkMRjrYS;#m@%Z~A;Dim~CpHismnB}YrY>FQO!PGBgYfrXqd648cHhdYZJ8c3hFiw{X{s1zk!(mD zGr|M|f+G~NL5THe`t&TG_b)2cC<5VY;XB=mYlu1I6yH#F7x-9av z2>v?9G2)KS2u3_uyx`7!GMZ6>@z9wYBVQ-yyMb_guCXrkR2< zu2C?2vR*4uZ(^~Hy!H*Fm70TWIaTFWjxw!PUSC2x{1dIDjx{X>i%N6K#$JRE-<*&xq}^pI-6g~{v4J;B=yB@H zaxAfQkG!pmg?P1R41H+oGd*w4PB})32rXTgu<-ajZI*fD)R%ZfBIq4;`vpI>2klvK zGef{Slab^w=H>;%pG%fW;W=PnNY^lqw``N3NK8pH!HCEE{n2I09zLJxB?kw8ThCCQAd1Ktc>C8U{h&Vydfnbz-t?))ZVnDUfY)Vt=nsH<_k94r zpq!}>;KRX(uJ-w0{Kx*{5T6(Eb9@|pnhp+l*;Pyc1V5s91zyN$5#gj|-RkQfpI?EC zAJ1Q3gXdS^<*RG()3fuJ*WmgU`0g2a{_^Vj{KboBPr=jYub*99zxXfSi6 z-0OE=Whm*gY4T?Y)T$@{4 zdK3Sfu}T;HU!r)`m4=7AU;_2@e>xdWEA^kJ!w33*FCRw3gkv(JEL~BO|KLE|*O-7T z$19lQcq@uRGa}3-&@JEpFVC-}12a3`!NHH|E!v>`2;3qWZY$ctIF|IE0A7(E=8@=C z^b~;Si6Hw$X)p!>uebuIR|`|V)MAeUoN&q@%Q;J;$Vn#O*K7pb=s(+*e2Kllk)dhf zicDaF%CrjHw3;q(D7b=}nGfJ^h*9_JZN{j(nmzWHFuUutzDne~1`jy+pee3p-3x8MV~;x$sY047_fu1mlY5ku&#tAkm3fF zFhqoilHdV&PWM3Y`!p9uOq|Tqqk@N0@EhA|Q5s6l$rx4|l0Z|`IV(!nd6yGjgBEus z=3O~q$6sj(AG&8H5O%u=d;qgFWi#=14r7AYHhLyadg~;qj=$U&IFVKPB5xNP*Cyq0 z^;>|F4bIbqpVtk{G3%4a;(cXze8YOdzrch+j>Ug(fBOgPfHC3{psX8=A_3|a$1z(Z zq3P08TI`C=B28o3FqQbBh>NI9FQr!PO<@@2m4#weq)-tb_W%}{`VPmdOdLZ&5t;BS zHX8&#U<&e5f}Cx69s-$D3oP|B@`6qgnllI=z}rrTP2p>J%ONOe zdqVmS5;Pe(;E4xal(07=8*~7EU7`fcQo7U@4vK=WM|_@hi4a3X7BhR@v zQM(e?p;gqLy~BjZamfo)x$x{4dj_tR&H&K6jNg!9u4~MA7G1(NvO4exyv5O*oWQp= zlqtZ;B1eSmaTZ|$WMj?DY!fA4H!||u(G3%A^ptmFEMNc*@*CF2#B`^AFNXLu!_N3xjo~|gw@f~cH0+hB@3gIG77edG+OUw%b za5*;ZOq1)Jbr`J9Q71_`^HA?o z@vs2Hcl@PP7@iq$FPAR^|8Roh(%Iy-2J#GvUza#s z@=d1p7JE~vbTi2+O@+|JaYqdklwCbfzUFhg^;Cuq)F(p2;=P8Oug zfN##ymTH|rcG_f$j|#eOqSKr(aEG&IG=ZIsJ;{N@^p1$w=f{-^WDfFCDk&&o5GAsq zwX@y8f;B;TBCOsv6}!lpL{Bk{iF9X3Sg&%ttg9<2pFZYig_o@8!b9*XiB$nCm6Z)( z0#K5!7fTxv+c%>UwWR#O#MJi?;u;u~y1;#j1JDsaR>ZK!~ zRwT_e4`bfxe2x=Lw~kZr6wPtM6e`suOcTP(e^HRHx$)w+-*PnnM```ODb8SkQ%<3e z!!!v|M#(V=mnd4tI9YVjMwpR~nFhK@x>*`^lQcrdU#Y&jFp0V_p}4DlkwiMqaDtxm zt?1cZqDk%MDuD#qI*u>X7>AZR`+WW~rI$iGtIYYi=t7(b1_5Legatj3DcLg0mS!r@bjU9nJdl!8{tEL4+pZ zXg=um;dpjB?TyCM;b1fj;R%}cC(-OAjAqlY9vj{}!zg#iD6cjs&lwxz`W9=UR70h6 zm8XIOS<{q+Fcu>z7WOY{3;&gox+nq={FvtWU+mqOX+7Xvz9`|8nq}=K(JeRrjbZ_7 zw^?+J)V*WuZW`HG=dO@^AL{vYks z&8DYO)bCGwv)OQT0?}|3PSA98Iv$1LDLffh=~WdgwU3yr##ENttt1;gCWkvVROvV8 z*#Z|z3N7=@Yeo_-&@vtxux+Oqw^d6i%L>jq+mDr3GAYy>HEz$@S44Y-?XLM=PJbl8kM81K{#2`F8~$v()+ z!Ut7!Ux)`gMo#lIj#0j2Dr;Ihr7f_XhARqK{HZ9;Q_zuW7>wvElxPdt4JEKh(#`|VROtzzFvGu_< zHzHVPiyTG>6t6Me{b|uRIbsqqj+BbPf>4KM{dBo4p*!{Cxy(p%on#VUW6c*$jkiB48n=SY?)!YcJ2FAvSMc{cYyUwv2jmug&> z-!%Ifu6V5RSv@^3A6!DjFsvzN+N6*~h?r`*lAW{P#KX>6hi44!9Ci5S>zsA^osa)G z>JS9;aEVB41DwcJqTXQ^!MDw@8idBz(v`Be^9ddK2KNj8vsF|)`I_DVejhU zbr$>N1e9#J4~l%>-R2!dc>?3-2}SuFhN!Cb{Y;Q_vcWPg7E;O`M7Y_XiEQ%RV+ABo zj)ClK-@+W70q$Kh+h!u+_RR??Hi5z;hvzP(lPieq0WJxT5)fg&;C3y3kQn`td?Ems zg#(fzX#zz?uULPJIGw>bn6KlQ5rsk>sbP~Sp*Tm}%b)dwlTvJu&@hq2w|ZFgX8Uvq z6OgJVY6PM>YjKY$QRk4^QRZ2@J?p1Gmom1jNrn=dWAW=TqTw-XNkA8@V3skoo?o)o zIU@2^_MFq$Pd~dbin_A#AwKa(TyhdNn4%RFGr%?}f@BLa9Ns9UdCr4h)kP{( zqK^PxWob@fLOmx_xi;+7@Y$=fG1{r*mkrzM_$!E$ZxozBM>SxNq|Wy}eutu;a1_Oe z(LLf&0SktiDhU=Q1?2)O_O5)@-9;mPyqHZJ*1U>nK{h(!65^ygg9L{iPD8kGn9c=u z@&$SIOLK_k_(p%is5_?-84Qu4H*ihU6{I-ij!YL^m?T`9Ec9(*!{<&L8Z;iPmt`o4 z1Z3fs&pR!9A%(j~@uqmFae}o9ZZ}0`gqIYnW#VCl=5XSt7G4i9xu5GfB`$E{~YVnWPjjHlacs{`v&;gZ`-7+ovPty5yt9il>U5 zue_Id>mm$a(g{q&J!peodEn&Uz4F$3_bR`XDV}S@5WTH%nNr@$MJEN3l7T5iS2=h@ z%4rpcm75kQ8BCpxe`88e8S*Yc%rH_5R=%Dy5p2h_S2_~z@LLBn_=yQ7{B0rOiFS%= zi%-@3f4T=C% zKKok-`ZTU?iINXrzql&6Z!rbmrF1F1C|{~_=|Z$*1V-i>QPD|?_!wQ++AZ`pyEuPC zLxagNG2PqA-fFzVyWVK+cdNf%A{zpiPNb(JMfnORVuPl6g!0{v__E$w?XaYeec43$ z9OUcdh-ar4f%HX-BOZ{KESOk>*>Y3W58ra4=NQjXxD9OwoR4oSVqMu%EiT)K)@6{Y z=jag>)nlzTMfEaJHVW3cON$Oo!yG?LFcD&|FfDLFjvY#H%bja}e*NN#HC+>=IqtCm zJpE2gf^sgby~!*+7yb8`1|aV(=6QSzx1@4mXSq1qx`qk6!PTXDaaV`cPAXTHeEU*$ zWjXGRqv2@SL(w$sN2B2!Mg5a#7WMnn>1;Yd;cPMwhto;FKb(c5el#3Ka4_tJquv0H zPR8S12q_Ins;9+N?$ANZ<}ON90U98s-q1jzTg0{DJ?SNhv=7-r!R zjwiE0*gqY^(QFi=aX6XIXT5OHJDm?tdc(D_TY?gK4@P%dJK zS1z&i`J7v^Zeb#$+j;Jx1gIAQuj+hMO0CjjSUkV{<-*kSG+O0AXrAUFs;DKxOOHQO zP8>Y9B8Seq{gnv~iHLjP5|T1t=1PwCbja_HDjuzJ^uKb!%J3JJF49sBF-3*IxH@@z z{1=AWn{@t$F3}tD;$Pn$6*fAWf^WLt$h$70L!Ygwxt?0!h%*aN&9m#locXqC|}vOpbnEBSMQ2X=j4& z8k=kf_*%VuA!P9>-*sThrfMC;Y+zMc}d4^&vk=0%)?1W2PQft3@$Z z%7F3kIi90HU0gaw;Gh2W%y%GvmO5&fCjV5aKDhe+)}Ul>1Gxv8%m4vd&$`?gf)k<+ zKw&S5$|GImOk-*hPgv%`uzKU4Z9;X`U!}mjdF8JEtSl9KB>(*J@(5&`@Ccw)Mz>FK zekAqUqtZX=s7(CE_=vb!apSpynKJnK_|r4_IGyuwTjlb$Dnit1q5gTOr#>h#QB@|i z+KRT_70jwKzQ+8@d6aW5!YmZo+l|5JCa!$bbmb!NvoXXj^Xv)@+Mi-W=;OJ^l?Vg? z2G#3KFSeIhjbCJctUaIDMt7uwbRWx9)AGVoM~&ZyMrgCw1}R9ASXqfl8$`ZR)x!N4 z`GSxlv}qB0RNF)KuHg?1J91*`K5(6m=e$Waxbw8}4GrTpU*ETCh;RLPI1Y-kJ6q?3 zqtNJ-6rB)6FSQ~Djx%|#?EPF=(JLN^i~4Yx-X`E}>y*K|=S?2zJ&OnJ@ zu~8)spXER}y8E)vg@*8#a6B}0KKm)r`Z5nou|e+q$Os9wk)SD4Uby866J8)Sho4fe z)k;V1>2%878%m~F_%v{st5ox4lD+NdN0^8-bL9KZ4cd0jIx23kbJWR1tnO;t<#|ny zSKDs!^y5D)HZ8jqaO)*N3za{C5M_;l4Bk?5oUr5Doxa^V) zz}qYQFC=jMj^iSPV)7Qu5#*`37iuXH_ao$Oq}kVjVC8Z>e~e``ywvfJ7=9&yx7Q3n5-ZTmz|>y zuR)@}$A9>lpj>{}%MkE(Wwe#)0i=)v3Olv-m&E{b3S(a?A1+XS)Q_QZt&{InZ)!@Q zb(gy`e%B0i5);eeY7y!j9-)gIk>6`!R+`Fd6IYtTXcp!u5)M7~d-vzWRCZeH%~3Y1 zbLg;uwe#uFx^nw-*u6Ax=_p^_-L0#uYBq-cDCh^hA|1mB4d84rA4a1->WyXtG>ZBs z{XuVhG8;^0z4>fD>YdIe;}D$=$Ajo3oc2fa`EWQ7CzI2Y$!@F)SB@N~{K(fi8q1dH z40$E7OZL=S%5HZbV>gB5hI3tU)_KrR!LYU8W4u8LBBaYSJb>d&*vD4 zx|D3KNolRCCXq3wD^Tt(gu9oa2)q?*bH)Q!-^#iV0{SwIBcfob06j^dEvT+>*jLD% z>x)Y^e??(lF@3xlPfVJmR2t-p`?$*56dTw#L$6T;@jjcgfONOJvjAJ!o@Ix7?ay+g z{zN9m`d(s5z7{s0LN1oiYUa%}uw$_N1I-r(9rJ3QiB2pSXG!ZD}i@Q3k zc2X532Z5Fwu0QRg-boZjQ9qi5z0=uzemXi0htm*^=A-F&GCM`6*B=h%C(+4hGVGt8 zOy&>{2E*}W03D9O7D7sn%xBQMZ<{8=4xWG(AUJ2Ik05hxzZ z``s!c0l-NZuT}gdoTVG2D(fq948yRv)#T-iYD6(i>LZ5u`}e47=ZK{1JglS=;#sjs z=j?qa%+{T=&ZyVxtvW{?VRq}BbxwZ3osUNy>2s^K?3?Yzy`OOBqhTvieJY1t0**x% zF5-#D5~#{#peXlgmephl1p_GF1w~E^bwym6<{}{pO+l7s>sZhm*}jMzl}wWJK+$6W zzLWV#gzc2_FgGm)72`}O3G;16h4D~w)+2G%&Tk=kye0RQ*kFQXAU{mDvozX@&ebYv zE(tP)>>S6Eht}ksefz${b1Gcsc!OiKK+i}BW4;5WVe6=)=YwJ^TTLu=)XCKQQSq9( zdVQUy^!vijtTI>Y6@962t5@Hy;mxSA|1>QD{s;6(-JwTux=euUzP<^o~)9~ zVw^T8oP7^hIL3~UY9`*{49wMYz9GwtZsGdn?axmy-v&S^vFrz_ z&Svm70T5hYToxOFJzXGLo>ZRoi=CgJU%%i_`MK6^Na_YfVZK0g*Ul|#5ozr$yMf3y zWYA+i0ldgL6$OG+ia7p+Ysha)fNyz}jLNky^<#a1De@$Jx=LQBDb3c6?c0n4=8M3C z`K9Qk4ZPTOT^Y(JID%PDe@?#&C!LYM8tK)Dba*26stfL z3nNI>be0Iql$S?9RPJZrCDB5Wv`S$ya}w65{g(q?O_*Y_?SrwaSEeuq4^$XY1G~HkH0F?f*k&%GN2XHt{2GX zp=-*7+%5~LRKocx%gQ_DFQz{84bgi8vbQ2H%59D*MM-cEWAFBBM(@oj_&kXi??Ygj z-tIrV@^C6WJ8~sRe#>-8DM)+|<9G(co9pyNx*)HTXL+9HZ|`?v(pZWfRkf>-g?Ysj zz2&EtJ>d{}iIWnlyriaSmd5E~dzCQ-{GzD1QbkXdXYsw!rbdgJJ3eJ%-W2#Q;qbd< z5g2u^PN~yByD=HMzWy(h2+0iNpFRB$g5eUN2=heUYmr7=g@W>W&m0@!md4|guZxsP zjs&Wn0B0-V_?ey&{H>NV8z&Lo;AjnFrqWEpA1e=dqJN)8SV4nBaFDfkH!gFG_oyG|mN zXq{1*v+l0X2i{}JwN#IcA@bXG{gD%!KYHCBJ`bOV&%@_aKmRuX0RR84L$t;K`Ue1X CcU4aS literal 0 HcmV?d00001 diff --git a/incubator/weblate/0.0.1/helm-values.md b/incubator/weblate/0.0.1/helm-values.md new file mode 100644 index 00000000000..e0a809760be --- /dev/null +++ b/incubator/weblate/0.0.1/helm-values.md @@ -0,0 +1,75 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.POSTGRES_DATABASE | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | +| env.POSTGRES_PORT | int | `5432` | | +| env.POSTGRES_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| env.REDIS_DB | string | `"0"` | | +| env.REDIS_PORT | int | `6379` | | +| env.TZ | string | `"UTC"` | | +| env.WEBLATE_TIME_ZONE | string | `"{{ .Values.env.TZ }}"` | | +| envFrom[0].configMapRef.name | string | `"weblate-env"` | | +| envValueFrom.POSTGRES_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.POSTGRES_HOST.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.POSTGRES_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | +| envValueFrom.POSTGRES_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.key | string | `"plainhost"` | | +| envValueFrom.REDIS_HOST.secretKeyRef.name | string | `"rediscreds"` | | +| envValueFrom.REDIS_PASSWORD.secretKeyRef.key | string | `"redis-password"` | | +| envValueFrom.REDIS_PASSWORD.secretKeyRef.name | string | `"rediscreds"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/weblate"` | | +| image.tag | string | `"v4.10.1@sha256:bc517880487a9a766a3ce4ddfe429ed37ad4605d0097e28b0dd16eafdacd12b2"` | | +| persistence.cache.enabled | bool | `true` | | +| persistence.cache.mountPath | string | `"/app/cache"` | | +| persistence.cache.type | string | `"emptyDir"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/app/data"` | | +| podSecurityContext.fsGroup | int | `1000` | | +| podSecurityContext.runAsGroup | int | `1000` | | +| podSecurityContext.runAsUser | int | `1000` | | +| postgresql.enabled | bool | `true` | | +| postgresql.existingSecret | string | `"dbcreds"` | | +| postgresql.postgresqlDatabase | string | `"weblate"` | | +| postgresql.postgresqlUsername | string | `"weblate"` | | +| probes.liveness.path | string | `"/healthz"` | | +| probes.readiness.path | string | `"/healthz"` | | +| probes.startup.path | string | `"/healthz"` | | +| redis.enabled | bool | `true` | | +| redis.existingSecret | string | `"rediscreds"` | | +| redis.redisUsername | string | `"default"` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| service.main.ports.main.port | int | `10158` | | +| service.main.ports.main.targetPort | int | `8080` | | +| weblate.auth.azure | object | `{}` | | +| weblate.auth.azuretenant | object | `{}` | | +| weblate.auth.bitbucket | object | `{}` | | +| weblate.auth.facebook | object | `{}` | | +| weblate.auth.github | object | `{}` | | +| weblate.auth.gitlab | object | `{}` | | +| weblate.auth.google | object | `{}` | | +| weblate.auth.keycloak | object | `{}` | | +| weblate.auth.ldap | object | `{}` | | +| weblate.auth.linux | object | `{}` | | +| weblate.auth.saml | object | `{}` | | +| weblate.auth.slack | object | `{}` | | +| weblate.email | object | `{}` | | +| weblate.errorreport | object | `{}` | | +| weblate.general.WEBLATE_DEBUG | string | `"false"` | | +| weblate.general.WEBLATE_SITE_DOMAIN | string | `"weblate.example.com"` | | +| weblate.general.WEBLATE_SITE_TITLE | string | `"My Project's Weblate"` | | +| weblate.localization | object | `{}` | | +| weblate.machinetranslate | object | `{}` | | +| weblate.siteintegration | object | `{}` | | + +All Rights Reserved - The TrueCharts Project diff --git a/incubator/weblate/0.0.1/ix_values.yaml b/incubator/weblate/0.0.1/ix_values.yaml new file mode 100644 index 00000000000..2edeb93a452 --- /dev/null +++ b/incubator/weblate/0.0.1/ix_values.yaml @@ -0,0 +1,248 @@ +image: + repository: tccr.io/truecharts/weblate + tag: v4.10.1@sha256:bc517880487a9a766a3ce4ddfe429ed37ad4605d0097e28b0dd16eafdacd12b2 + pullPolicy: IfNotPresent + +securityContext: + readOnlyRootFilesystem: false + +podSecurityContext: + runAsUser: 1000 + runAsGroup: 1000 + fsGroup: 1000 + +env: + TZ: UTC + WEBLATE_TIME_ZONE: "{{ .Values.env.TZ }}" + POSTGRES_USER: "{{ .Values.postgresql.postgresqlUsername }}" + POSTGRES_DATABASE: "{{ .Values.postgresql.postgresqlDatabase }}" + POSTGRES_PORT: 5432 + REDIS_PORT: 6379 + REDIS_DB: "0" + +weblate: + general: + WEBLATE_SITE_TITLE: "My Project's Weblate" + WEBLATE_SITE_DOMAIN: "weblate.example.com" + # WEBLATE_ADMIN_NAME: "" + # WEBLATE_ADMIN_EMAIL: "" + # This sets the password on EVERY app startup + # WEBLATE_ADMIN_PASSWORD: "" + # WEBLATE_AUTO_UPDATE: "" + # WEBLATE_SERVER_EMAIL: "" + # WEBLATE_DEFAULT_FROM_EMAIL: "" + # WEBLATE_CONTACT_FORM: "" + # WEBLATE_REGISTRATION_OPEN: "" + # WEBLATE_REGISTRATION_ALLOW_BACKENDS: "" + # WEBLATE_REQUIRE_LOGIN: "" + # WEBLATE_LOGIN_REQUIRED_URLS_EXCEPTIONS: "" + # WEBLATE_ADD_LOGIN_REQUIRED_URLS_EXCEPTIONS: "" + # WEBLATE_REMOVE_LOGIN_REQUIRED_URLS_EXCEPTIONS: "" + # WEBLATE_DEFAULT_ACCESS_CONTROL: "" + # WEBLATE_DEFAULT_RESTRICTED_COMPONENT: "" + # WEBLATE_DEFAULT_TRANSLATION_PROPAGATION: "" + # WEBLATE_DEFAULT_COMMITER_EMAIL: "" + # WEBLATE_DEFAULT_COMMITER_NAME: "" + # WEBLATE_DEFAULT_SHARED_TM: "" + # WEBLATE_GPG_IDENTITY: "" + # WEBLATE_DEFAULT_AUTO_WATCH: "" + # WEBLATE_GITHUB_USERNAME: "" + # WEBLATE_GITHUB_TOKEN: "" + # WEBLATE_GITLAB_USERNAME: "" + # WEBLATE_GITLAB_TOKEN: "" + # WEBLATE_CSP_SCRIPT_SRC: "" + # WEBLATE_CSP_IMG_SRC: "" + # WEBLATE_CSP_CONNECT_SRC: "" + # WEBLATE_CSP_STYLE_SRC: "" + # WEBLATE_CSP_FONT_SRC: "" + # WEBLATE_WEBSITE_REQUIRED: "" + # WEBLATE_SIMPLIFY_LANGUAGES: "" + # WEBLATE_DATABASE_BACKUP: "" + # WEBLATE_URL_PREFIX: "" + # WEBLATE_SILENCED_SYSTEM_CHECKS: "" + # WEBLATE_HIDE_VERSION: "" + # WEBLATE_BASIC_LANGUAGES: "" + # WEBLATE_ENABLE_AVATARS: "" + # WEBLATE_LIMIT_TRANSLATION_LENGTH_BY_SOURCE_LENGTH: "" + # WEBLATE_ALLOWED_HOSTS: "" + # WEBLATE_ENABLE_HTTPS: "" + # WEBLATE_IP_PROXY_HEADER: "" + # WEBLATE_SECURE_PROXY_SSL_HEADER: "" + # WEBLATE_LICENSE_FILTER: "" + # WEBLATE_LICENSE_REQUIRED: "" + # WEBLATE_RATELIMIT_ATTEMPTS: "" + # WEBLATE_RATELIMIT_LOCKOUT: "" + # WEBLATE_RATELIMIT_WINDOW: "" + WEBLATE_DEBUG: "false" + # WEBLATE_LOGLEVEL: "" + # WEBLATE_GOOGLE_ANALYTICS_ID: "" + # WEBLATE_PAGURE_USERNAME: "" + # WEBLATE_PAGURE_TOKEN: "" + # WEBLATE_AKISMET_API_KEY: "" + # WEBLATE_SSH_EXTRA_ARGS: "" + # WEBLATE_BORG_EXTRA_ARGS: "" + machinetranslate: {} + # WEBLATE_MT_APERTIUM_APY: "" + # WEBLATE_MT_AWS_REGION: "" + # WEBLATE_MT_AWS_ACCESS_KEY_ID: "" + # WEBLATE_MT_AWS_SECRET_ACCESS_KEY: "" + # WEBLATE_MT_DEEPL_KEY: "" + # WEBLATE_MT_DEEPL_API_URL: "" + # WEBLATE_MT_LIBRETRANSLATE_KEY: "" + # WEBLATE_MT_LIBRETRANSLATE_API_URL: "" + # WEBLATE_MT_GOOGLE_KEY: "" + # WEBLATE_MT_GOOGLE_CREDENTIALS: "" + # WEBLATE_MT_GOOGLE_PROJECT: "" + # WEBLATE_MT_GOOGLE_LOCATION: "" + # WEBLATE_MT_MICROSOFT_COGNITIVE_KEY: "" + # WEBLATE_MT_MICROSOFT_ENDPOINT_URL: "" + # WEBLATE_MT_MICROSOFT_REGION: "" + # WEBLATE_MT_MICROSOFT_BASE_URL: "" + # WEBLATE_MT_MODERNMT_KEY: "" + # WEBLATE_MT_MYMEMORY_ENABLED: "" + # WEBLATE_MT_GLOSBE_ENABLED: "" + # WEBLATE_MT_MICROSOFT_TERMINOLOGY_ENABLED: "" + # WEBLATE_MT_SAP_BASE_URL: "" + # WEBLATE_MT_SAP_SANDBOX_APIKEY: "" + # WEBLATE_MT_SAP_USERNAME: "" + # WEBLATE_MT_SAP_PASSWORD: "" + # WEBLATE_MT_SAP_USE_MT: "" + auth: + ldap: {} + # WEBLATE_AUTH_LDAP_SERVER_URI: "" + # WEBLATE_AUTH_LDAP_USER_DN_TEMPLATE: "" + # WEBLATE_AUTH_LDAP_USER_ATTR_MAP: "" + # WEBLATE_AUTH_LDAP_BIND_DN: "" + # WEBLATE_AUTH_LDAP_BIND_PASSWORD: "" + # WEBLATE_AUTH_LDAP_CONNECTION_OPTION_REFERRALS: "" + # WEBLATE_AUTH_LDAP_USER_SEARCH: "" + # WEBLATE_AUTH_LDAP_USER_SEARCH_FILTER: "" + # WEBLATE_AUTH_LDAP_USER_SEARCH_UNION: "" + # WEBLATE_AUTH_LDAP_USER_SEARCH_UNION_DELIMITER: "" + github: {} + # WEBLATE_SOCIAL_AUTH_GITHUB_KEY: "" + # WEBLATE_SOCIAL_AUTH_GITHUB_SECRET: "" + # WEBLATE_SOCIAL_AUTH_GITHUB_ORG_KEY: "" + # WEBLATE_SOCIAL_AUTH_GITHUB_ORG_SECRET: "" + # WEBLATE_SOCIAL_AUTH_GITHUB_ORG_NAME: "" + # WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_KEY: "" + # WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_SECRET: "" + # WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_ID: "" + bitbucket: {} + # WEBLATE_SOCIAL_AUTH_BITBUCKET_KEY: "" + # WEBLATE_SOCIAL_AUTH_BITBUCKET_SECRET: "" + facebook: {} + # WEBLATE_SOCIAL_AUTH_FACEBOOK_KEY: "" + # WEBLATE_SOCIAL_AUTH_FACEBOOK_SECRET: "" + google: {} + # WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_KEY: "" + # WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET: "" + # WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_DOMAINS: "" + # WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_EMAILS: "" + gitlab: {} + # WEBLATE_SOCIAL_AUTH_GITLAB_KEY: "" + # WEBLATE_SOCIAL_AUTH_GITLAB_SECRET: "" + # WEBLATE_SOCIAL_AUTH_GITLAB_API_URL: "" + azure: {} + # WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_KEY: "" + # WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_SECRET: "" + azuretenant: {} + # WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY: "" + # WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET: "" + # WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID: "" + keycloak: {} + # WEBLATE_SOCIAL_AUTH_KEYCLOAK_KEY: "" + # WEBLATE_SOCIAL_AUTH_KEYCLOAK_SECRET: "" + # WEBLATE_SOCIAL_AUTH_KEYCLOAK_PUBLIC_KEY: "" + # WEBLATE_SOCIAL_AUTH_KEYCLOAK_ALGORITHM: "" + # WEBLATE_SOCIAL_AUTH_KEYCLOAK_AUTHORIZATION_URL: "" + # WEBLATE_SOCIAL_AUTH_KEYCLOAK_ACCESS_TOKEN_URL: "" + linux: {} + # WEBLATE_SOCIAL_AUTH_FEDORA: "" + # WEBLATE_SOCIAL_AUTH_OPENSUSE: "" + # WEBLATE_SOCIAL_AUTH_UBUNTU: "" + slack: {} + # WEBLATE_SOCIAL_AUTH_SLACK_KEY: "" + # SOCIAL_AUTH_SLACK_SECRET: "" + saml: {} + # WEBLATE_SAML_IDP_ENTITY_ID: "" + # WEBLATE_SAML_IDP_URL: "" + # WEBLATE_SAML_IDP_X509CERT: "" + email: {} + # WEBLATE_EMAIL_PORT: "" + # WEBLATE_EMAIL_HOST: "" + # WEBLATE_EMAIL_HOST_USER: "" + # WEBLATE_EMAIL_HOST_PASSWORD: "" + # WEBLATE_EMAIL_USE_SSL: "" + # WEBLATE_EMAIL_USE_TLS: "" + # WEBLATE_EMAIL_BACKEND: "" + siteintegration: {} + # WEBLATE_GET_HELP_URL: "" + # WEBLATE_STATUS_URL: "" + # WEBLATE_LEGAL_URL: "" + # WEBLATE_PRIVACY_URL: "" + errorreport: {} + # ROLLBAR_KEY: "" + # ROLLBAR_ENVIRONMENT: "" + # SENTRY_DSN: "" + # SENTRY_ENVIRONMENT: "" + localization: {} + # WEBLATE_LOCALIZE_CDN_URL: "" + # WEBLATE_LOCALIZE_CDN_PATH: "" + +envFrom: + - configMapRef: + name: weblate-env + +envValueFrom: + POSTGRES_PASSWORD: + secretKeyRef: + name: dbcreds + key: postgresql-password + POSTGRES_HOST: + secretKeyRef: + name: dbcreds + key: plainhost + REDIS_HOST: + secretKeyRef: + name: rediscreds + key: plainhost + REDIS_PASSWORD: + secretKeyRef: + name: rediscreds + key: redis-password + +probes: + liveness: + path: "/healthz" + readiness: + path: "/healthz" + startup: + path: "/healthz" + +service: + main: + ports: + main: + port: 10158 + targetPort: 8080 + +persistence: + config: + enabled: true + mountPath: "/app/data" + cache: + enabled: true + type: emptyDir + mountPath: "/app/cache" + +redis: + enabled: true + existingSecret: "rediscreds" + redisUsername: default + +postgresql: + enabled: true + existingSecret: "dbcreds" + postgresqlUsername: weblate + postgresqlDatabase: weblate diff --git a/incubator/weblate/0.0.1/questions.yaml b/incubator/weblate/0.0.1/questions.yaml new file mode 100644 index 00000000000..f4eaa70e6a6 --- /dev/null +++ b/incubator/weblate/0.0.1/questions.yaml @@ -0,0 +1,3523 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + web_portal: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: TZ + label: "Timezone" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + - variable: UMASK + label: "UMASK" + description: "Sets the UMASK env var for LinuxServer.io (compatible) containers" + schema: + type: string + default: "002" + - variable: weblate + group: "Container Configuration" + label: "Weblate Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: general + label: "General Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: WEBLATE_SITE_DOMAIN + label: "WEBLATE_SITE_DOMAIN" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + required: true + default: "" + - variable: WEBLATE_SITE_TITLE + label: "WEBLATE_SITE_TITLE (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_ADMIN_NAME + label: "WEBLATE_ADMIN_NAME (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_ADMIN_EMAIL + label: "WEBLATE_ADMIN_EMAIL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_ADMIN_PASSWORD + label: "WEBLATE_ADMIN_PASSWORD (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_ENABLE_HTTPS + label: "WEBLATE_ENABLE_HTTPS" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_IP_PROXY_HEADER + label: "WEBLATE_IP_PROXY_HEADER (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_SECURE_PROXY_SSL_HEADER + label: "WEBLATE_SECURE_PROXY_SSL_HEADER (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_AUTO_UPDATE + label: "WEBLATE_AUTO_UPDATE (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + enum: + - value: "" + description: "none" + - value: "remote" + description: "remote" + - value: "full" + description: "full" + - variable: WEBLATE_SERVER_EMAIL + label: "WEBLATE_SERVER_EMAIL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_SERVER_EMAIL + label: "WEBLATE_SERVER_EMAIL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_DEFAULT_FROM_EMAIL + label: "WEBLATE_DEFAULT_FROM_EMAIL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_CONTACT_FORM + label: "WEBLATE_CONTACT_FORM (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "reply-to" + description: "reply-to" + - value: "from" + description: "from" + - variable: WEBLATE_ALLOWED_HOSTS + label: "WEBLATE_ALLOWED_HOSTS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_REGISTRATION_OPEN + label: "WEBLATE_REGISTRATION_OPEN" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: true + - variable: WEBLATE_REGISTRATION_ALLOW_BACKENDS + label: "WEBLATE_REGISTRATION_ALLOW_BACKENDS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_REQUIRE_LOGIN + label: "WEBLATE_REQUIRE_LOGIN" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_LOGIN_REQUIRED_URLS_EXCEPTIONS + label: "WEBLATE_LOGIN_REQUIRED_URLS_EXCEPTIONS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_ADD_LOGIN_REQUIRED_URLS_EXCEPTIONS + label: "WEBLATE_ADD_LOGIN_REQUIRED_URLS_EXCEPTIONS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_REMOVE_LOGIN_REQUIRED_URLS_EXCEPTIONS + label: "WEBLATE_REMOVE_LOGIN_REQUIRED_URLS_EXCEPTIONS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_GOOGLE_ANALYTICS_ID + label: "WEBLATE_GOOGLE_ANALYTICS_ID (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_GITHUB_USERNAME + label: "WEBLATE_GITHUB_USERNAME (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_GITHUB_TOKEN + label: "WEBLATE_GITHUB_TOKEN (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_GITLAB_USERNAME + label: "WEBLATE_GITLAB_USERNAME (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_GITLAB_TOKEN + label: "WEBLATE_GITLAB_TOKEN (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_PAGURE_USERNAME + label: "WEBLATE_PAGURE_USERNAME (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_PAGURE_TOKEN + label: "WEBLATE_PAGURE_TOKEN (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SIMPLIFY_LANGUAGES + label: "WEBLATE_SIMPLIFY_LANGUAGES" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: true + - variable: WEBLATE_DEFAULT_ACCESS_CONTROL + label: "WEBLATE_DEFAULT_ACCESS_CONTROL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_DEFAULT_RESTRICTED_COMPONENT + label: "WEBLATE_DEFAULT_RESTRICTED_COMPONENT" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_DEFAULT_TRANSLATION_PROPAGATION + label: "WEBLATE_DEFAULT_TRANSLATION_PROPAGATION" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: true + - variable: WEBLATE_DEFAULT_COMMITER_EMAIL + label: "WEBLATE_DEFAULT_COMMITER_EMAIL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_DEFAULT_COMMITER_NAME + label: "WEBLATE_DEFAULT_COMMITER_NAME (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_DEFAULT_SHARED_TM + label: "WEBLATE_DEFAULT_SHARED_TM" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: true + - variable: WEBLATE_AKISMET_API_KEY + label: "WEBLATE_AKISMET_API_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_GPG_IDENTITY + label: "WEBLATE_GPG_IDENTITY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_URL_PREFIX + label: "WEBLATE_URL_PREFIX (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_SILENCED_SYSTEM_CHECKS + label: "WEBLATE_SILENCED_SYSTEM_CHECKS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_CSP_SCRIPT_SRC + label: "WEBLATE_CSP_SCRIPT_SRC (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_CSP_IMG_SRC + label: "WEBLATE_CSP_IMG_SRC (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_CSP_CONNECT_SRC + label: "WEBLATE_CSP_CONNECT_SRC (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_CSP_STYLE_SRC + label: "WEBLATE_CSP_STYLE_SRC (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_CSP_FONT_SRC + label: "WEBLATE_CSP_FONT_SRC (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_LICENSE_FILTER + label: "WEBLATE_LICENSE_FILTER (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_LICENSE_REQUIRED + label: "WEBLATE_LICENSE_REQUIRED" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_WEBSITE_REQUIRED + label: "WEBLATE_WEBSITE_REQUIRED" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: true + - variable: WEBLATE_HIDE_VERSION + label: "WEBLATE_HIDE_VERSION" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: true + - variable: WEBLATE_BASIC_LANGUAGES + label: "WEBLATE_BASIC_LANGUAGES (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_DEFAULT_AUTO_WATCH + label: "WEBLATE_DEFAULT_AUTO_WATCH" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: true + - variable: WEBLATE_RATELIMIT_ATTEMPTS + label: "WEBLATE_RATELIMIT_ATTEMPTS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_RATELIMIT_LOCKOUT + label: "WEBLATE_RATELIMIT_LOCKOUT (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_RATELIMIT_WINDOW + label: "WEBLATE_RATELIMIT_WINDOW (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_ENABLE_AVATARS + label: "WEBLATE_ENABLE_AVATARS" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: true + - variable: WEBLATE_LIMIT_TRANSLATION_LENGTH_BY_SOURCE_LENGTH + label: "WEBLATE_LIMIT_TRANSLATION_LENGTH_BY_SOURCE_LENGTH" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: true + - variable: WEBLATE_SSH_EXTRA_ARGS + label: "WEBLATE_SSH_EXTRA_ARGS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_BORG_EXTRA_ARGS + label: "WEBLATE_BORG_EXTRA_ARGS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_DATABASE_BACKUP + label: "WEBLATE_DATABASE_BACKUP (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "plain" + enum: + - value: "plain" + description: "plain" + - value: "compressed" + description: "compressed" + - value: "none" + description: "none" + - variable: WEBLATE_DEBUG + label: "WEBLATE_DEBUG" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_LOGLEVEL + label: "WEBLATE_LOGLEVEL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: machinetranslate + label: "Machine Translation Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Show Machine Translation Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_MT_APERTIUM_APY + label: "WEBLATE_MT_APERTIUM_APY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_AWS_REGION + label: "WEBLATE_MT_AWS_REGION (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_AWS_ACCESS_KEY_ID + label: "WEBLATE_MT_AWS_ACCESS_KEY_ID (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_MT_AWS_SECRET_ACCESS_KEY + label: "WEBLATE_MT_AWS_SECRET_ACCESS_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_MT_DEEPL_KEY + label: "WEBLATE_MT_DEEPL_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_MT_DEEPL_API_URL + label: "WEBLATE_MT_DEEPL_API_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_LIBRETRANSLATE_KEY + label: "WEBLATE_MT_LIBRETRANSLATE_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_MT_LIBRETRANSLATE_API_URL + label: "WEBLATE_MT_LIBRETRANSLATE_API_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_GOOGLE_KEY + label: "WEBLATE_MT_GOOGLE_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_MT_GOOGLE_CREDENTIALS + label: "WEBLATE_MT_GOOGLE_CREDENTIALS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_GOOGLE_PROJECT + label: "WEBLATE_MT_GOOGLE_PROJECT (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_GOOGLE_LOCATION + label: "WEBLATE_MT_GOOGLE_LOCATION (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_MICROSOFT_COGNITIVE_KEY + label: "WEBLATE_MT_MICROSOFT_COGNITIVE_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_MT_MICROSOFT_ENDPOINT_URL + label: "WEBLATE_MT_MICROSOFT_ENDPOINT_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_MICROSOFT_REGION + label: "WEBLATE_MT_MICROSOFT_REGION (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_MICROSOFT_BASE_URL + label: "WEBLATE_MT_MICROSOFT_BASE_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_MODERNMT_KEY + label: "WEBLATE_MT_MODERNMT_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_MT_MYMEMORY_ENABLED + label: "WEBLATE_MT_MYMEMORY_ENABLED" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_MT_GLOSBE_ENABLED + label: "WEBLATE_MT_GLOSBE_ENABLED" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_MT_MICROSOFT_TERMINOLOGY_ENABLED + label: "WEBLATE_MT_MICROSOFT_TERMINOLOGY_ENABLED" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_MT_SAP_BASE_URL + label: "WEBLATE_MT_SAP_BASE_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_SAP_SANDBOX_APIKEY + label: "WEBLATE_MT_SAP_SANDBOX_APIKEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_MT_SAP_USERNAME + label: "WEBLATE_MT_SAP_USERNAME (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_MT_SAP_PASSWORD + label: "WEBLATE_MT_SAP_PASSWORD (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_MT_SAP_USE_MT + label: "WEBLATE_MT_SAP_USE_MT" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: auth + label: "Authentication Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Show Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enabledldap + label: "Show LDAP Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_AUTH_LDAP_SERVER_URI + label: "WEBLATE_AUTH_LDAP_SERVER_URI (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_AUTH_LDAP_USER_DN_TEMPLATE + label: "WEBLATE_AUTH_LDAP_USER_DN_TEMPLATE (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_AUTH_LDAP_USER_ATTR_MAP + label: "WEBLATE_AUTH_LDAP_USER_ATTR_MAP (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_AUTH_LDAP_BIND_DN + label: "WEBLATE_AUTH_LDAP_BIND_DN (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_AUTH_LDAP_BIND_PASSWORD + label: "WEBLATE_AUTH_LDAP_BIND_PASSWORD (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_AUTH_LDAP_CONNECTION_OPTION_REFERRALS + label: "WEBLATE_AUTH_LDAP_CONNECTION_OPTION_REFERRALS" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_AUTH_LDAP_USER_SEARCH + label: "WEBLATE_AUTH_LDAP_USER_SEARCH (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_AUTH_LDAP_USER_SEARCH_FILTER + label: "WEBLATE_AUTH_LDAP_USER_SEARCH_FILTER (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_AUTH_LDAP_USER_SEARCH_UNION + label: "WEBLATE_AUTH_LDAP_USER_SEARCH_UNION (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_AUTH_LDAP_USER_SEARCH_UNION_DELIMITER + label: "WEBLATE_AUTH_LDAP_USER_SEARCH_UNION_DELIMITER (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: enabledgithub + label: "Show Github Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_GITHUB_KEY + label: "WEBLATE_SOCIAL_AUTH_GITHUB_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GITHUB_SECRET + label: "WEBLATE_SOCIAL_AUTH_GITHUB_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GITHUB_ORG_KEY + label: "WEBLATE_SOCIAL_AUTH_GITHUB_ORG_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GITHUB_ORG_SECRET + label: "WEBLATE_SOCIAL_AUTH_GITHUB_ORG_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GITHUB_ORG_NAME + label: "WEBLATE_SOCIAL_AUTH_GITHUB_ORG_NAME (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_KEY + label: "WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_SECRET + label: "WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_ID + label: "WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_ID (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: enabledbitbucket + label: "Show Bitbucket Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_BITBUCKET_KEY + label: "WEBLATE_SOCIAL_AUTH_BITBUCKET_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_BITBUCKET_SECRET + label: "WEBLATE_SOCIAL_AUTH_BITBUCKET_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: enabledfacebook + label: "Show Facebook Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_FACEBOOK_KEY + label: "WEBLATE_SOCIAL_AUTH_FACEBOOK_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_FACEBOOK_SECRET + label: "WEBLATE_SOCIAL_AUTH_FACEBOOK_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: enabledgoogle + label: "Show Google Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_KEY + label: "WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET + label: "WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_DOMAINS + label: "WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_DOMAINS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_EMAILS + label: "WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_EMAILS (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: enabledgitlab + label: "Show Gitlab Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_GITLAB_KEY + label: "WEBLATE_SOCIAL_AUTH_GITLAB_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GITLAB_SECRET + label: "WEBLATE_SOCIAL_AUTH_GITLAB_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_GITLAB_API_URL + label: "WEBLATE_SOCIAL_AUTH_GITLAB_API_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: enabledazure + label: "Show Azure AD Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_KEY + label: "WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_SECRET + label: "WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: enabledazuretenant + label: "Show Azure AD with Tenant Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY + label: "WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET + label: "WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID + label: "WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: enabledkeycloak + label: "Show Keycloak Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_KEYCLOAK_KEY + label: "WEBLATE_SOCIAL_AUTH_KEYCLOAK_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_KEYCLOAK_SECRET + label: "WEBLATE_SOCIAL_AUTH_KEYCLOAK_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_KEYCLOAK_PUBLIC_KEY + label: "WEBLATE_SOCIAL_AUTH_KEYCLOAK_PUBLIC_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SOCIAL_AUTH_KEYCLOAK_ALGORITHM + label: "WEBLATE_SOCIAL_AUTH_KEYCLOAK_ALGORITHM (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_SOCIAL_AUTH_KEYCLOAK_AUTHORIZATION_URL + label: "WEBLATE_SOCIAL_AUTH_KEYCLOAK_AUTHORIZATION_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_SOCIAL_AUTH_KEYCLOAK_ACCESS_TOKEN_URL + label: "WEBLATE_SOCIAL_AUTH_KEYCLOAK_ACCESS_TOKEN_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: enabledlinux + label: "Show Linux Vendors Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_FEDORA + label: "WEBLATE_SOCIAL_AUTH_FEDORA" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_SOCIAL_AUTH_OPENSUSE + label: "WEBLATE_SOCIAL_AUTH_OPENSUSE)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_SOCIAL_AUTH_UBUNTU + label: "WEBLATE_SOCIAL_AUTH_UBUNTU" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: enabledslack + label: "Show Slack Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SOCIAL_AUTH_SLACK_KEY + label: "WEBLATE_SOCIAL_AUTH_SLACK_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: SOCIAL_AUTH_SLACK_SECRET + label: "SOCIAL_AUTH_SLACK_SECRET (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: enabledsaml + label: "Show SAML Authentication Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_SAML_IDP_ENTITY_ID + label: "WEBLATE_SAML_IDP_ENTITY_ID (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_SAML_IDP_URL + label: "WEBLATE_SAML_IDP_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_SAML_IDP_X509CERT + label: "WEBLATE_SAML_IDP_X509CERT (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: email + label: "Email Server Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Show Email Server Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_EMAIL_HOST + label: "WEBLATE_EMAIL_HOST (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_EMAIL_PORT + label: "WEBLATE_EMAIL_PORT (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_EMAIL_HOST_USER + label: "WEBLATE_EMAIL_HOST_USER (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_EMAIL_HOST_PASSWORD + label: "WEBLATE_EMAIL_HOST_PASSWORD (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: WEBLATE_EMAIL_USE_SSL + label: "WEBLATE_EMAIL_USE_SSL" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_EMAIL_USE_TLS + label: "WEBLATE_EMAIL_USE_TLS" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: boolean + default: false + - variable: WEBLATE_EMAIL_BACKEND + label: "WEBLATE_EMAIL_BACKEND (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: siteintegration + label: "Site Integration Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Show Site Integration Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_GET_HELP_URL + label: "WEBLATE_GET_HELP_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_STATUS_URL + label: "WEBLATE_STATUS_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_LEGAL_URL + label: "WEBLATE_LEGAL_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_PRIVACY_URL + label: "WEBLATE_PRIVACY_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: errorreporting + label: "Error Reporting Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Show Error Reporting Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: ROLLBAR_KEY + label: "ROLLBAR_KEY (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + private: true + default: "" + - variable: ROLLBAR_ENVIRONMENT + label: "ROLLBAR_ENVIRONMENT (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: SENTRY_DSN + label: "SENTRY_DSN (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: SENTRY_ENVIRONMENT + label: "SENTRY_ENVIRONMENT (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: localization + label: "Localization CDN Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Show Localization CDN Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: WEBLATE_LOCALIZE_CDN_URL + label: "WEBLATE_LOCALIZE_CDN_URL (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + - variable: WEBLATE_LOCALIZE_CDN_PATH + label: "WEBLATE_LOCALIZE_CDN_PATH (Leave empty for default)" + description: "Visit https://docs.weblate.org/en/ on section Environment Variables for more info" + schema: + type: string + default: "" + + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 10158 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8080 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 1000 + - variable: runAsGroup + label: "runAsGroup" + description: The groupID this App of the user running the application" + schema: + type: int + default: 1000 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 1000 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + + - variable: autoscaling + group: "Advanced" + label: "(Advanced) Horizontal Pod Autoscaler" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: target + label: "Target" + description: "deployment name, defaults to main deployment" + schema: + type: string + default: "" + - variable: minReplicas + label: "Minimum Replicas" + schema: + type: int + default: 1 + - variable: maxReplicas + label: "Maximum Replicas" + schema: + type: int + default: 5 + - variable: targetCPUUtilizationPercentage + label: "Target CPU Utilization Percentage" + schema: + type: int + default: 80 + - variable: targetMemoryUtilizationPercentage + label: "Target Memory Utilization Percentage" + schema: + type: int + default: 80 + - variable: networkPolicy + group: "Advanced" + label: "(Advanced) Network Policy" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: policyType + label: "Policy Type" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ingress" + description: "Ingress" + - value: "egress" + description: "Egress" + - value: "ingress-egress" + description: "Ingress and Egress" + - variable: egress + label: "Egress" + schema: + type: list + default: [] + items: + - variable: egressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: to + label: "To" + schema: + type: list + default: [] + items: + - variable: toEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + - variable: ingress + label: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: from + label: "From" + schema: + type: list + default: [] + items: + - variable: fromEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ipBlock + label: "ipBlock" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cidr + label: "cidr" + schema: + type: string + default: "" + - variable: except + label: "except" + schema: + type: list + default: [] + items: + - variable: exceptint + label: "" + schema: + type: int + - variable: namespaceSelector + label: "namespaceSelector" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: podSelector + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: matchExpressions + label: "matchExpressions" + schema: + type: list + default: [] + items: + - variable: expressionEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: key + label: "Key" + schema: + type: string + - variable: operator + label: "operator" + schema: + type: string + default: "TCP" + enum: + - value: "In" + description: "In" + - value: "NotIn" + description: "NotIn" + - value: "Exists " + description: "Exists " + - value: "DoesNotExist " + description: "DoesNotExist " + - variable: values + label: "values" + schema: + type: list + default: [] + items: + - variable: value + label: "" + schema: + type: string + - variable: ports + label: "Ports" + schema: + type: list + default: [] + items: + - variable: portsEntry + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "port" + schema: + type: int + - variable: endPort + label: "port" + schema: + type: int + - variable: protocol + label: "Protocol" + schema: + type: string + default: "TCP" + enum: + - value: "TCP" + description: "TCP" + - value: "UDP" + description: "UDP" + - value: "SCTP" + description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/incubator/weblate/0.0.1/security.md b/incubator/weblate/0.0.1/security.md new file mode 100644 index 00000000000..5166e4e7797 --- /dev/null +++ b/incubator/weblate/0.0.1/security.md @@ -0,0 +1,1202 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: weblate/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-redis' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-redis' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-redis' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-weblate' of Deployment 'RELEASE-NAME-weblate' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-weblate' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-weblate' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-weblate' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-weblate' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-weblate' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:d4e2ab2f3d41e04b2e4d1812058b26b0fbf409b65ce9352d8c714ff33fc66986 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/redis:v6.2.6@sha256:52275ab8ef5bc70fd994e48bb6e66368dc312f176127390194c077aed424d2b7 + tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c + tccr.io/truecharts/postgresql:v14.1.0@sha256:d4e2ab2f3d41e04b2e4d1812058b26b0fbf409b65ce9352d8c714ff33fc66986 + tccr.io/truecharts/weblate:v4.10.1@sha256:bc517880487a9a766a3ce4ddfe429ed37ad4605d0097e28b0dd16eafdacd12b2 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:d4e2ab2f3d41e04b2e4d1812058b26b0fbf409b65ce9352d8c714ff33fc66986 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libssl1.1 | CVE-2021-4160 | UNKNOWN | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| openssl | CVE-2021-4160 | UNKNOWN | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:52275ab8ef5bc70fd994e48bb6e66368dc312f176127390194c077aed424d2b7 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libssl1.1 | CVE-2021-4160 | UNKNOWN | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| openssl | CVE-2021-4160 | UNKNOWN | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| +| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| + + +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:d4e2ab2f3d41e04b2e4d1812058b26b0fbf409b65ce9352d8c714ff33fc66986 (debian 10.11) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bash | CVE-2019-18276 | LOW | 5.0-4 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| bsdutils | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.30-3 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| fdisk | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| gcc-8-base | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| gcc-8-base | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| gpgv | CVE-2019-14855 | LOW | 2.2.12-1+deb10u1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855
https://dev.gnupg.org/T4755
https://eprint.iacr.org/2020/014.pdf
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
https://rwc.iacr.org/2020/slides/Leurent.pdf
https://ubuntu.com/security/notices/USN-4516-1
https://usn.ubuntu.com/4516-1/
| +| libapt-pkg5.0 | CVE-2011-3374 | LOW | 1.8.2.3 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-bin | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-bin | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-bin | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-l10n | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-l10n | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc-l10n | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-l10n | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc-l10n | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| libc6 | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| libc6 | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| libc6 | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.4-5+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2019-13627 | MEDIUM | 1.8.4-5+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html
http://www.openwall.com/lists/oss-security/2019/10/02/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627
https://dev.gnupg.org/T4683
https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
https://linux.oracle.com/cve/CVE-2019-13627.html
https://linux.oracle.com/errata/ELSA-2020-4482.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html
https://minerva.crocs.fi.muni.cz/
https://security-tracker.debian.org/tracker/CVE-2019-13627
https://security.gentoo.org/glsa/202003-32
https://ubuntu.com/security/notices/USN-4236-1
https://ubuntu.com/security/notices/USN-4236-2
https://ubuntu.com/security/notices/USN-4236-3
https://usn.ubuntu.com/4236-1/
https://usn.ubuntu.com/4236-2/
https://usn.ubuntu.com/4236-3/
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.4-5+deb10u1 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgmp10 | CVE-2021-43618 | HIGH | 2:6.1.2+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.6.7-4+deb10u7 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libidn2-0 | CVE-2019-12290 | HIGH | 2.0.5-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5
https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de
https://gitlab.com/libidn/libidn2/merge_requests/71
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/
https://security.gentoo.org/glsa/202003-63
https://ubuntu.com/security/notices/USN-4168-1
https://usn.ubuntu.com/4168-1/
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.17-3+deb10u3 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.17-3+deb10u3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.47+dfsg-3+deb10u6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libncurses6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnghttp2-14 | CVE-2020-11080 | HIGH | 1.36.0-2+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
https://linux.oracle.com/cve/CVE-2020-11080.html
https://linux.oracle.com/errata/ELSA-2020-5765.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/
https://www.debian.org/security/2020/dsa-4696
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libpcre3 | CVE-2020-14155 | MEDIUM | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-12 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-12 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libseccomp2 | CVE-2019-9893 | LOW | 2.3.3-4 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html
http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html
https://access.redhat.com/errata/RHSA-2019:3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893
https://github.com/seccomp/libseccomp/issues/139
https://linux.oracle.com/cve/CVE-2019-9893.html
https://linux.oracle.com/errata/ELSA-2019-3624.html
https://seclists.org/oss-sec/2019/q1/179
https://security.gentoo.org/glsa/201904-18
https://ubuntu.com/security/notices/USN-4001-1
https://ubuntu.com/security/notices/USN-4001-2
https://usn.ubuntu.com/4001-1/
https://usn.ubuntu.com/4001-2/
https://www.openwall.com/lists/oss-security/2019/03/15/1
| +| libsepol1 | CVE-2021-36084 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 2.8-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libsqlite3-0 | CVE-2019-19603 | HIGH | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
| +| libsqlite3-0 | CVE-2019-19645 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2019-19924 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-13631 | MEDIUM | 3.27.2-3+deb10u1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| +| libsqlite3-0 | CVE-2019-19244 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
| +| libsqlite3-0 | CVE-2020-11656 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200416-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.sqlite.org/src/info/d09f8c3621d5f7f8
https://www3.sqlite.org/cgi/src/info/b64674919f673602
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.27.2-3+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssh2-1 | CVE-2019-13115 | HIGH | 1.8.0-2.1 | |
Expand...https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&amp;utm_medium=RSS
| +| libssh2-1 | CVE-2019-17498 | LOW | 1.8.0-2.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html
https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94
https://linux.oracle.com/cve/CVE-2019-17498.html
https://linux.oracle.com/errata/ELSA-2020-3915.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libssl1.1 | CVE-2021-4160 | UNKNOWN | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| libstdc++6 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| +| libstdc++6 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| +| libsystemd0 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 241-7~deb10u8 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2019-20386 | LOW | 241-7~deb10u8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| +| libudev1 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libudev1 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
| +| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| libxml2 | CVE-2017-16932 | HIGH | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://xmlsoft.org/news.html
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
| +| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.4+dfsg1-7+deb10u2 | |
Expand...http://www.securityfocus.com/bid/94347
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.32-2.2~deb10u1 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| locales | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2022-23218 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| locales | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-1752 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2021-3326 | HIGH | 2.28-10 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
| +| locales | CVE-2021-3999 | HIGH | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2019-25013 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| +| locales | CVE-2020-10029 | MEDIUM | 2.28-10 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
https://linux.oracle.com/cve/CVE-2020-10029.html
https://linux.oracle.com/errata/ELSA-2021-0348.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200327-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25487
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2020-27618 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2021-3998 | MEDIUM | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.28-10 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| locales | CVE-2016-10228 | LOW | 2.28-10 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| +| locales | CVE-2018-20796 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.28-10 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.28-10 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-19126 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126
https://linux.oracle.com/cve/CVE-2019-19126.html
https://linux.oracle.com/errata/ELSA-2020-3861.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/
https://sourceware.org/bugzilla/show_bug.cgi?id=25204
https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| +| locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| +| locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1d-0+deb10u7 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| openssl | CVE-2021-4160 | UNKNOWN | 1.1.1d-0+deb10u7 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| passwd | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
https://ubuntu.com/security/notices/USN-5254-1
| +| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | |
Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
| +| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
| +| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + + +#### Container: tccr.io/truecharts/weblate:v4.10.1@sha256:bc517880487a9a766a3ce4ddfe429ed37ad4605d0097e28b0dd16eafdacd12b2 (debian 11.2) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bsdutils | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| bsdutils | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| git | CVE-2018-1000021 | LOW | 1:2.30.2-1 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| git-man | CVE-2018-1000021 | LOW | 1:2.30.2-1 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| git-svn | CVE-2018-1000021 | LOW | 1:2.30.2-1 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libarchive13 | CVE-2021-23177 | MEDIUM | 3.4.3-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177
| +| libarchive13 | CVE-2021-31566 | MEDIUM | 3.4.3-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566
| +| libarchive13 | CVE-2021-36976 | MEDIUM | 3.4.3-2 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml
| +| libblkid1 | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libblkid1 | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libbpf0 | CVE-2021-45940 | MEDIUM | 0.3-2 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45940
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1562.yaml
| +| libbpf0 | CVE-2021-45941 | MEDIUM | 0.3-2 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45941
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1576.yaml
| +| libc-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-bin | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc-dev-bin | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-dev-bin | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc-dev-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-dev-bin | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-dev-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc-dev-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-dev-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-dev-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-dev-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-dev-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc-dev-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6 | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6 | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6 | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6-dev | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| +| libc6-dev | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6-dev | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libc6-dev | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6-dev | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6-dev | CVE-2010-4756 | LOW | 2.31-13+deb11u2 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
| +| libc6-dev | CVE-2018-20796 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/107160
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6-dev | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109167
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6-dev | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 | |
Expand...http://www.securityfocus.com/bid/109162
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6-dev | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6-dev | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;utm_medium=RSS
| +| libc6-dev | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libcairo-gobject2 | CVE-2017-7475 | LOW | 1.16.0-5 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo-gobject2 | CVE-2018-18064 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-gobject2 | CVE-2019-6461 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo-gobject2 | CVE-2019-6462 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2017-7475 | LOW | 1.16.0-5 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo2 | CVE-2018-18064 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6461 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6462 | LOW | 1.16.0-5 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcurl3-gnutls | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl3-gnutls | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl3-gnutls | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libexpat1 | CVE-2022-22822 | CRITICAL | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| +| libexpat1 | CVE-2022-22823 | CRITICAL | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| +| libexpat1 | CVE-2022-22824 | CRITICAL | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| +| libexpat1 | CVE-2022-23852 | CRITICAL | 2.2.10-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
| +| libexpat1 | CVE-2021-45960 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://security.netapp.com/advisory/ntap-20220121-0004/
| +| libexpat1 | CVE-2021-46143 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://security.netapp.com/advisory/ntap-20220121-0006/
| +| libexpat1 | CVE-2022-22825 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| +| libexpat1 | CVE-2022-22826 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| +| libexpat1 | CVE-2022-22827 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| +| libexpat1 | CVE-2022-23990 | MEDIUM | 2.2.10-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
| +| libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgd3 | CVE-2021-40145 | HIGH | 2.3.0-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145
https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af
https://github.com/libgd/libgd/issues/700
https://github.com/libgd/libgd/pull/713
https://ubuntu.com/security/notices/USN-5068-1
| +| libgd3 | CVE-2021-38115 | MEDIUM | 2.3.0-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115
https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032
https://github.com/libgd/libgd/issues/697
https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032
https://ubuntu.com/security/notices/USN-5068-1
| +| libgd3 | CVE-2021-40812 | MEDIUM | 2.3.0-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812
https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9
https://github.com/libgd/libgd/issues/750#issuecomment-914872385
https://github.com/libgd/libgd/issues/757
| +| libgif7 | CVE-2018-11489 | HIGH | 5.1.9-2 | |
Expand...http://www.securityfocus.com/bid/104341
https://github.com/pts/sam2p/issues/37
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libgif7 | CVE-2020-23922 | HIGH | 5.1.9-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://sourceforge.net/p/giflib/bugs/151/
| +| libglib2.0-0 | CVE-2012-0039 | LOW | 2.66.8-1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://bugzilla.redhat.com/show_bug.cgi?id=772720
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
| +| libldap-common | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
| +| libldap-common | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libldap-common | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
| +| libmariadb3 | CVE-2021-35604 | MEDIUM | 1:10.5.12-0+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libmount1 | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libmount1 | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libnginx-mod-http-geoip | CVE-2021-3618 | HIGH | 1.18.0-6.1 | |
Expand...https://alpaca-attack.com/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html
https://marc.info/?l=sendmail-announce&m=159394546814125&w=2
https://security.appspot.com/vsftpd/Changelog.txt
| +| libnginx-mod-http-geoip | CVE-2020-36309 | MEDIUM | 1.18.0-6.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
https://github.com/openresty/lua-nginx-module/pull/1654
https://news.ycombinator.com/item?id=26712562
https://security.netapp.com/advisory/ntap-20210507-0005/
| +| libnginx-mod-http-geoip | CVE-2009-4487 | LOW | 1.18.0-6.1 | |
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://www.securityfocus.com/bid/37711
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
| +| libnginx-mod-http-geoip | CVE-2013-0337 | LOW | 1.18.0-6.1 | |
Expand...http://secunia.com/advisories/55181
http://security.gentoo.org/glsa/glsa-201310-04.xml
http://www.openwall.com/lists/oss-security/2013/02/21/15
http://www.openwall.com/lists/oss-security/2013/02/22/1
http://www.openwall.com/lists/oss-security/2013/02/24/1
| +| libnginx-mod-http-image-filter | CVE-2021-3618 | HIGH | 1.18.0-6.1 | |
Expand...https://alpaca-attack.com/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html
https://marc.info/?l=sendmail-announce&m=159394546814125&w=2
https://security.appspot.com/vsftpd/Changelog.txt
| +| libnginx-mod-http-image-filter | CVE-2020-36309 | MEDIUM | 1.18.0-6.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
https://github.com/openresty/lua-nginx-module/pull/1654
https://news.ycombinator.com/item?id=26712562
https://security.netapp.com/advisory/ntap-20210507-0005/
| +| libnginx-mod-http-image-filter | CVE-2009-4487 | LOW | 1.18.0-6.1 | |
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://www.securityfocus.com/bid/37711
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
| +| libnginx-mod-http-image-filter | CVE-2013-0337 | LOW | 1.18.0-6.1 | |
Expand...http://secunia.com/advisories/55181
http://security.gentoo.org/glsa/glsa-201310-04.xml
http://www.openwall.com/lists/oss-security/2013/02/21/15
http://www.openwall.com/lists/oss-security/2013/02/22/1
http://www.openwall.com/lists/oss-security/2013/02/24/1
| +| libnginx-mod-http-xslt-filter | CVE-2021-3618 | HIGH | 1.18.0-6.1 | |
Expand...https://alpaca-attack.com/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html
https://marc.info/?l=sendmail-announce&m=159394546814125&w=2
https://security.appspot.com/vsftpd/Changelog.txt
| +| libnginx-mod-http-xslt-filter | CVE-2020-36309 | MEDIUM | 1.18.0-6.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
https://github.com/openresty/lua-nginx-module/pull/1654
https://news.ycombinator.com/item?id=26712562
https://security.netapp.com/advisory/ntap-20210507-0005/
| +| libnginx-mod-http-xslt-filter | CVE-2009-4487 | LOW | 1.18.0-6.1 | |
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://www.securityfocus.com/bid/37711
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
| +| libnginx-mod-http-xslt-filter | CVE-2013-0337 | LOW | 1.18.0-6.1 | |
Expand...http://secunia.com/advisories/55181
http://security.gentoo.org/glsa/glsa-201310-04.xml
http://www.openwall.com/lists/oss-security/2013/02/21/15
http://www.openwall.com/lists/oss-security/2013/02/22/1
http://www.openwall.com/lists/oss-security/2013/02/24/1
| +| libnginx-mod-mail | CVE-2021-3618 | HIGH | 1.18.0-6.1 | |
Expand...https://alpaca-attack.com/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html
https://marc.info/?l=sendmail-announce&m=159394546814125&w=2
https://security.appspot.com/vsftpd/Changelog.txt
| +| libnginx-mod-mail | CVE-2020-36309 | MEDIUM | 1.18.0-6.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
https://github.com/openresty/lua-nginx-module/pull/1654
https://news.ycombinator.com/item?id=26712562
https://security.netapp.com/advisory/ntap-20210507-0005/
| +| libnginx-mod-mail | CVE-2009-4487 | LOW | 1.18.0-6.1 | |
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://www.securityfocus.com/bid/37711
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
| +| libnginx-mod-mail | CVE-2013-0337 | LOW | 1.18.0-6.1 | |
Expand...http://secunia.com/advisories/55181
http://security.gentoo.org/glsa/glsa-201310-04.xml
http://www.openwall.com/lists/oss-security/2013/02/21/15
http://www.openwall.com/lists/oss-security/2013/02/22/1
http://www.openwall.com/lists/oss-security/2013/02/24/1
| +| libnginx-mod-stream | CVE-2021-3618 | HIGH | 1.18.0-6.1 | |
Expand...https://alpaca-attack.com/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html
https://marc.info/?l=sendmail-announce&m=159394546814125&w=2
https://security.appspot.com/vsftpd/Changelog.txt
| +| libnginx-mod-stream | CVE-2020-36309 | MEDIUM | 1.18.0-6.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
https://github.com/openresty/lua-nginx-module/pull/1654
https://news.ycombinator.com/item?id=26712562
https://security.netapp.com/advisory/ntap-20210507-0005/
| +| libnginx-mod-stream | CVE-2009-4487 | LOW | 1.18.0-6.1 | |
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://www.securityfocus.com/bid/37711
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
| +| libnginx-mod-stream | CVE-2013-0337 | LOW | 1.18.0-6.1 | |
Expand...http://secunia.com/advisories/55181
http://security.gentoo.org/glsa/glsa-201310-04.xml
http://www.openwall.com/lists/oss-security/2013/02/21/15
http://www.openwall.com/lists/oss-security/2013/02/22/1
http://www.openwall.com/lists/oss-security/2013/02/24/1
| +| libnginx-mod-stream-geoip | CVE-2021-3618 | HIGH | 1.18.0-6.1 | |
Expand...https://alpaca-attack.com/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html
https://marc.info/?l=sendmail-announce&m=159394546814125&w=2
https://security.appspot.com/vsftpd/Changelog.txt
| +| libnginx-mod-stream-geoip | CVE-2020-36309 | MEDIUM | 1.18.0-6.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
https://github.com/openresty/lua-nginx-module/pull/1654
https://news.ycombinator.com/item?id=26712562
https://security.netapp.com/advisory/ntap-20210507-0005/
| +| libnginx-mod-stream-geoip | CVE-2009-4487 | LOW | 1.18.0-6.1 | |
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://www.securityfocus.com/bid/37711
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
| +| libnginx-mod-stream-geoip | CVE-2013-0337 | LOW | 1.18.0-6.1 | |
Expand...http://secunia.com/advisories/55181
http://security.gentoo.org/glsa/glsa-201310-04.xml
http://www.openwall.com/lists/oss-security/2013/02/21/15
http://www.openwall.com/lists/oss-security/2013/02/22/1
http://www.openwall.com/lists/oss-security/2013/02/24/1
| +| libopenjp2-7 | CVE-2021-3575 | HIGH | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
| +| libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7 | CVE-2016-10505 | LOW | 2.4.0-3 | |
Expand...https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-10506 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/100573
https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
https://github.com/uclouvain/openjpeg/issues/731
https://github.com/uclouvain/openjpeg/issues/732
https://github.com/uclouvain/openjpeg/issues/777
https://github.com/uclouvain/openjpeg/issues/778
https://github.com/uclouvain/openjpeg/issues/779
https://github.com/uclouvain/openjpeg/issues/780
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9113 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93980
https://github.com/uclouvain/openjpeg/issues/856
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9114 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93979
https://github.com/uclouvain/openjpeg/issues/857
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9115 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93977
https://github.com/uclouvain/openjpeg/issues/858
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9116 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93975
https://github.com/uclouvain/openjpeg/issues/859
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9117 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/93783
https://github.com/uclouvain/openjpeg/issues/860
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9580 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2016-9581 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/94822
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://security.gentoo.org/glsa/201710-26
| +| libopenjp2-7 | CVE-2017-17479 | LOW | 2.4.0-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479
https://github.com/uclouvain/openjpeg/issues/1044
| +| libopenjp2-7 | CVE-2018-16375 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105266
https://github.com/uclouvain/openjpeg/issues/1126
| +| libopenjp2-7 | CVE-2018-16376 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/105262
https://github.com/uclouvain/openjpeg/issues/1127
| +| libopenjp2-7 | CVE-2018-20846 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/108921
https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
| +| libopenjp2-7 | CVE-2019-6988 | LOW | 2.4.0-3 | |
Expand...http://www.securityfocus.com/bid/106785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| +| libperl5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| libperl5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| libpng16-16 | CVE-2021-4214 | MEDIUM | 1.6.37-3 | |
Expand...
| +| libpng16-16 | CVE-2019-6129 | LOW | 1.6.37-3 | |
Expand...https://github.com/glennrp/libpng/issues/269
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| +| libsmartcols1 | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libsmartcols1 | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libssl1.1 | CVE-2021-4160 | UNKNOWN | 1.1.1k-1+deb11u1 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| libsystemd0 | CVE-2021-3997 | MEDIUM | 247.3-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtesseract4 | CVE-2021-36081 | HIGH | 4.1.1-2.1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29698
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/tesseract-ocr/OSV-2021-211.yaml
https://github.com/tesseract-ocr/tesseract/commit/e6f15621c2ab2ecbfabf656942d8ef66f03b2d55
| +| libtiff5 | CVE-2022-22844 | MEDIUM | 4.2.0-1 | |
Expand...https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
| +| libtiff5 | CVE-2014-8130 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
| +| libtiff5 | CVE-2017-16232 | LOW | 4.2.0-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
| +| libtiff5 | CVE-2017-17973 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769
http://www.securityfocus.com/bid/102331
https://bugzilla.novell.com/show_bug.cgi?id=1074318
https://bugzilla.redhat.com/show_bug.cgi?id=1530912
| +| libtiff5 | CVE-2017-5563 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664
http://www.securityfocus.com/bid/95705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
https://security.gentoo.org/glsa/201709-27
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2017-9117 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| +| libtiff5 | CVE-2018-10126 | LOW | 4.2.0-1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| libudev1 | CVE-2021-3997 | MEDIUM | 247.3-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-6 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-6 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libuuid1 | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libuuid1 | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2.1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3
http://www.securityfocus.com/bid/93928
https://bugzilla.redhat.com/show_bug.cgi?id=1389338
https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
https://security.gentoo.org/glsa/201701-61
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| libxtables12 | CVE-2012-2663 | LOW | 1.8.7-1 | |
Expand...http://www.spinics.net/lists/netfilter-devel/msg21248.html
https://bugzilla.redhat.com/show_bug.cgi?id=826702
| +| linux-libc-dev | CVE-2013-7445 | HIGH | 5.10.84-1 | |
Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2019-19378 | HIGH | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19449 | HIGH | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2019-19814 | HIGH | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-12362 | HIGH | 5.10.84-1 | |
Expand...https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-26556 | HIGH | 5.10.84-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.kb.cert.org/vuls/id/799380
| +| linux-libc-dev | CVE-2020-26557 | HIGH | 5.10.84-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26559 | HIGH | 5.10.84-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2020-26560 | HIGH | 5.10.84-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
| +| linux-libc-dev | CVE-2021-3864 | HIGH | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-39685 | HIGH | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=36dfdf11af49d3c009c711fb16f5c6e7a274505d
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=6eea4ace62fa6414432692ee44f0c0a3d541d97a
https://github.com/szymonh/inspector-gadget
https://gitlab.com/postmarketOS/pmaports/-/issues/1346
https://www.openwall.com/lists/oss-security/2021/12/15/4
| +| linux-libc-dev | CVE-2021-44733 | HIGH | 5.10.84-1 | 5.10.92-1 |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2030747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c
https://github.com/pjlantz/optee-qemu/blob/main/README.md
https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/
https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander@linaro.org/
https://security.netapp.com/advisory/ntap-20220114-0003/
| +| linux-libc-dev | CVE-2021-45469 | HIGH | 5.10.84-1 | 5.10.92-1 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/25/1
https://bugzilla.kernel.org/show_bug.cgi?id=215235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&id=5598b24efaf4892741c798b425d543e4bed357a1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/
https://security.netapp.com/advisory/ntap-20220114-0003/
https://www.debian.org/security/2022/dsa-5050
| +| linux-libc-dev | CVE-2022-0185 | HIGH | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de29310e8aa03fcbdb41fc92c521756
https://github.com/Crusaders-of-Rust/CVE-2022-0185
https://linux.oracle.com/cve/CVE-2022-0185.html
https://linux.oracle.com/errata/ELSA-2022-9029.html
https://ubuntu.com/security/notices/USN-5240-1
https://www.openwall.com/lists/oss-security/2022/01/18/7
https://www.willsroot.io/2022/01/cve-2022-0185.html
| +| linux-libc-dev | CVE-2022-0330 | HIGH | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c
https://www.openwall.com/lists/oss-security/2022/01/25/12
| +| linux-libc-dev | CVE-2022-22942 | HIGH | 5.10.84-1 | |
Expand...
| +| linux-libc-dev | CVE-2022-23222 | HIGH | 5.10.84-1 | 5.10.92-1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/14/1
http://www.openwall.com/lists/oss-security/2022/01/18/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
https://www.debian.org/security/2022/dsa-5050
https://www.openwall.com/lists/oss-security/2022/01/13/1
| +| linux-libc-dev | CVE-2019-15213 | MEDIUM | 5.10.84-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-15794 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4209-1
https://usn.ubuntu.com/usn/usn-4208-1
https://usn.ubuntu.com/usn/usn-4209-1
| +| linux-libc-dev | CVE-2019-16089 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089
https://linux.oracle.com/cve/CVE-2019-16089.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
https://lore.kernel.org/patchwork/patch/1106884/
https://lore.kernel.org/patchwork/patch/1126650/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://support.f5.com/csp/article/K03814795?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4425-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4425-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
| +| linux-libc-dev | CVE-2019-20794 | MEDIUM | 5.10.84-1 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1
https://github.com/sargun/fuse-example
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
| +| linux-libc-dev | CVE-2020-12363 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | MEDIUM | 5.10.84-1 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-15802 | MEDIUM | 5.10.84-1 | |
Expand...https://arxiv.org/abs/2009.11776
https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
https://hexhive.epfl.ch/BLURtooth/
https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
https://www.kb.cert.org/vuls/id/589825
https://www.kb.cert.org/vuls/id/589825/
| +| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| linux-libc-dev | CVE-2020-26555 | MEDIUM | 5.10.84-1 | |
Expand...https://kb.cert.org/vuls/id/799380
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
| +| linux-libc-dev | CVE-2021-22600 | MEDIUM | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
| +| linux-libc-dev | CVE-2021-28711 | MEDIUM | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://www.debian.org/security/2022/dsa-5050
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| linux-libc-dev | CVE-2021-28712 | MEDIUM | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://www.debian.org/security/2022/dsa-5050
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| linux-libc-dev | CVE-2021-28713 | MEDIUM | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://www.debian.org/security/2022/dsa-5050
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
| +| linux-libc-dev | CVE-2021-28714 | MEDIUM | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
https://www.debian.org/security/2022/dsa-5050
https://xenbits.xen.org/xsa/advisory-392.html
https://xenbits.xenproject.org/xsa/advisory-392.txt
| +| linux-libc-dev | CVE-2021-28715 | MEDIUM | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
https://www.debian.org/security/2022/dsa-5050
https://xenbits.xen.org/xsa/advisory-392.html
https://xenbits.xenproject.org/xsa/advisory-392.txt
| +| linux-libc-dev | CVE-2021-3669 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2021-3759 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759
https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5135-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
| +| linux-libc-dev | CVE-2021-3847 | MEDIUM | 5.10.84-1 | |
Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
| +| linux-libc-dev | CVE-2021-4037 | MEDIUM | 5.10.84-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
| +| linux-libc-dev | CVE-2021-4095 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4095
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=55749769fe608fa3f4a075e42e89d237c8e3763https://seclists.org/oss-sec/2021/q4/157
https://lore.kernel.org/kvm/CAFcO6XOmoS7EacN_n6v4Txk7xL7iqRa2gABg3F7E3Naf5uG94g@mail.gmail.com/
https://patchwork.kernel.org/project/kvm/patch/20211121125451.9489-12-dwmw2@infradead.org/
| +| linux-libc-dev | CVE-2021-4148 | MEDIUM | 5.10.84-1 | |
Expand...https://lkml.org/lkml/2021/9/12/323
https://lkml.org/lkml/2021/9/17/1037
| +| linux-libc-dev | CVE-2021-4149 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149
https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
https://lkml.org/lkml/2021/10/18/885
https://lkml.org/lkml/2021/9/13/2565
| +| linux-libc-dev | CVE-2021-4150 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150
https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7)
https://lkml.org/lkml/2021/10/18/485
https://lkml.org/lkml/2021/9/6/781
| +| linux-libc-dev | CVE-2021-4155 | MEDIUM | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79
https://linux.oracle.com/cve/CVE-2021-4155.html
https://linux.oracle.com/errata/ELSA-2022-9014.html
https://www.openwall.com/lists/oss-security/2022/01/10/1
| +| linux-libc-dev | CVE-2021-4197 | MEDIUM | 5.10.84-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2035652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
| +| linux-libc-dev | CVE-2021-4204 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83
https://ubuntu.com/security/notices/USN-5217-1
https://ubuntu.com/security/notices/USN-5218-1
https://ubuntu.com/security/notices/USN-5219-1
| +| linux-libc-dev | CVE-2021-43976 | MEDIUM | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
| +| linux-libc-dev | CVE-2021-45095 | MEDIUM | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/
https://www.debian.org/security/2022/dsa-5050
| +| linux-libc-dev | CVE-2021-45480 | MEDIUM | 5.10.84-1 | 5.10.92-1 |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
https://git.kernel.org/linus/5f9562ebe710c307adc5f666bf1a2162ee7977c0
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f9562ebe710c307adc5f666bf1a2162ee7977c0
https://github.com/torvalds/linux/commit/5f9562ebe710c307adc5f666bf1a2162ee7977c0
https://www.debian.org/security/2022/dsa-5050
| +| linux-libc-dev | CVE-2022-0382 | MEDIUM | 5.10.84-1 | |
Expand...
| +| linux-libc-dev | CVE-2004-0230 | LOW | 5.10.84-1 | |
Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
http://kb.juniper.net/JSA10638
http://marc.info/?l=bugtraq&m=108302060014745&w=2
http://marc.info/?l=bugtraq&m=108506952116653&w=2
http://secunia.com/advisories/11440
http://secunia.com/advisories/11458
http://secunia.com/advisories/22341
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
http://www.kb.cert.org/vuls/id/415294
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.osvdb.org/4030
http://www.securityfocus.com/archive/1/449179/100/0/threaded
http://www.securityfocus.com/bid/10183
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://www.us-cert.gov/cas/techalerts/TA04-111A.html
http://www.vupen.com/english/advisories/2006/3983
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
https://kc.mcafee.com/corporate/index?page=content&id=SB10053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
| +| linux-libc-dev | CVE-2005-3660 | LOW | 5.10.84-1 | |
Expand...http://secunia.com/advisories/18205
http://securityreason.com/securityalert/291
http://securitytracker.com/id?1015402
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
http://www.securityfocus.com/bid/16041
http://www.vupen.com/english/advisories/2005/3076
https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
| +| linux-libc-dev | CVE-2007-3719 | LOW | 5.10.84-1 | |
Expand...http://osvdb.org/37127
http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
| +| linux-libc-dev | CVE-2008-2544 | LOW | 5.10.84-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
| +| linux-libc-dev | CVE-2008-4609 | LOW | 5.10.84-1 | |
Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.html
http://insecure.org/stf/tcp-dos-attack-explained.html
http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
http://marc.info/?l=bugtraq&m=125856010926699&w=2
http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.outpost24.com/news/news-2008-10-02.html
http://www.us-cert.gov/cas/techalerts/TA09-251A.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
| +| linux-libc-dev | CVE-2010-4563 | LOW | 5.10.84-1 | |
Expand...http://seclists.org/dailydave/2011/q2/25
http://seclists.org/fulldisclosure/2011/Apr/254
| +| linux-libc-dev | CVE-2010-5321 | LOW | 5.10.84-1 | |
Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
http://www.openwall.com/lists/oss-security/2015/02/08/4
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
https://bugzilla.kernel.org/show_bug.cgi?id=120571
https://bugzilla.redhat.com/show_bug.cgi?id=620629
| +| linux-libc-dev | CVE-2011-4915 | LOW | 5.10.84-1 | |
Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
http://www.openwall.com/lists/oss-security/2011/11/07/9
https://lkml.org/lkml/2011/11/7/340
https://seclists.org/oss-sec/2011/q4/571
https://security-tracker.debian.org/tracker/CVE-2011-4915
https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
| +| linux-libc-dev | CVE-2011-4917 | LOW | 5.10.84-1 | |
Expand...
| +| linux-libc-dev | CVE-2012-4542 | LOW | 5.10.84-1 | |
Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
| +| linux-libc-dev | CVE-2014-9892 | LOW | 5.10.84-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
| +| linux-libc-dev | CVE-2014-9900 | LOW | 5.10.84-1 | |
Expand...http://source.android.com/security/bulletin/2016-08-01.html
http://www.securityfocus.com/bid/92222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
| +| linux-libc-dev | CVE-2015-2877 | LOW | 5.10.84-1 | |
Expand...http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
| +| linux-libc-dev | CVE-2016-10723 | LOW | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
| +| linux-libc-dev | CVE-2016-8660 | LOW | 5.10.84-1 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2017-0630 | LOW | 5.10.84-1 | |
Expand...http://www.securityfocus.com/bid/98213
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
| +| linux-libc-dev | CVE-2017-13693 | LOW | 5.10.84-1 | |
Expand...http://www.securityfocus.com/bid/100502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2017-13694 | LOW | 5.10.84-1 | |
Expand...http://www.securityfocus.com/bid/100500
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://patchwork.kernel.org/patch/9806085/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 5.10.84-1 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 5.10.84-1 | |
Expand...http://www.securityfocus.com/bid/104593
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-17977 | LOW | 5.10.84-1 | |
Expand...http://www.securityfocus.com/bid/105539
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2019-11191 | LOW | 5.10.84-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://www.openwall.com/lists/oss-security/2019/04/18/5
http://www.openwall.com/lists/oss-security/2019/05/22/7
http://www.securityfocus.com/bid/107887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
https://ubuntu.com/security/notices/USN-4006-1
https://ubuntu.com/security/notices/USN-4006-2
https://ubuntu.com/security/notices/USN-4007-1
https://ubuntu.com/security/notices/USN-4007-2
https://ubuntu.com/security/notices/USN-4008-1
https://ubuntu.com/security/notices/USN-4008-3
https://usn.ubuntu.com/4006-1/
https://usn.ubuntu.com/4006-2/
https://usn.ubuntu.com/4007-1/
https://usn.ubuntu.com/4007-2/
https://usn.ubuntu.com/4008-1/
https://usn.ubuntu.com/4008-3/
https://www.openwall.com/lists/oss-security/2019/04/03/4
https://www.openwall.com/lists/oss-security/2019/04/03/4/1
| +| linux-libc-dev | CVE-2019-12378 | LOW | 5.10.84-1 | |
Expand...http://www.securityfocus.com/bid/108475
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
https://linux.oracle.com/cve/CVE-2019-12378.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/229
| +| linux-libc-dev | CVE-2019-12379 | LOW | 5.10.84-1 | |
Expand...http://www.securityfocus.com/bid/108478
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
| +| linux-libc-dev | CVE-2019-12380 | LOW | 5.10.84-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
| +| linux-libc-dev | CVE-2019-12381 | LOW | 5.10.84-1 | |
Expand...http://www.securityfocus.com/bid/108473
https://bugzilla.redhat.com/show_bug.cgi?id=1715501
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
https://linux.oracle.com/cve/CVE-2019-12381.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/25/230
| +| linux-libc-dev | CVE-2019-12382 | LOW | 5.10.84-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108474
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://linux.oracle.com/cve/CVE-2019-12382.html
https://linux.oracle.com/errata/ELSA-2020-1016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://lkml.org/lkml/2019/5/24/843
https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
| +| linux-libc-dev | CVE-2019-12455 | LOW | 5.10.84-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://security.netapp.com/advisory/ntap-20190710-0002/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
| +| linux-libc-dev | CVE-2019-12456 | LOW | 5.10.84-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
https://bugzilla.redhat.com/show_bug.cgi?id=1717182
https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://lkml.org/lkml/2019/5/29/1164
https://support.f5.com/csp/article/K84310302
https://support.f5.com/csp/article/K84310302?utm_source=f5support&amp;utm_medium=RSS
| +| linux-libc-dev | CVE-2019-16229 | LOW | 5.10.84-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16230 | LOW | 5.10.84-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-16231 | LOW | 5.10.84-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
https://linux.oracle.com/cve/CVE-2019-16231.html
https://linux.oracle.com/errata/ELSA-2020-5533.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4225-1
https://ubuntu.com/security/notices/USN-4225-2
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4225-1/
https://usn.ubuntu.com/4225-2/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
| +| linux-libc-dev | CVE-2019-16232 | LOW | 5.10.84-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
https://linux.oracle.com/cve/CVE-2019-16232.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
| +| linux-libc-dev | CVE-2019-16233 | LOW | 5.10.84-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
https://linux.oracle.com/cve/CVE-2019-16233.html
https://linux.oracle.com/errata/ELSA-2020-5508.html
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-16234 | LOW | 5.10.84-1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
| +| linux-libc-dev | CVE-2019-19070 | LOW | 5.10.84-1 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294
https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-35501 | LOW | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-26934 | LOW | 5.10.84-1 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 5.10.84-1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2021-4135 | LOW | 5.10.84-1 | 5.10.92-1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
https://git.kernel.org/linus/481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 (5.16-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=481221775d53
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mariadb-common | CVE-2021-35604 | MEDIUM | 1:10.5.12-0+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| mount | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| mount | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
| +| nginx | CVE-2021-3618 | HIGH | 1.18.0-6.1 | |
Expand...https://alpaca-attack.com/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html
https://marc.info/?l=sendmail-announce&m=159394546814125&w=2
https://security.appspot.com/vsftpd/Changelog.txt
| +| nginx | CVE-2020-36309 | MEDIUM | 1.18.0-6.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
https://github.com/openresty/lua-nginx-module/pull/1654
https://news.ycombinator.com/item?id=26712562
https://security.netapp.com/advisory/ntap-20210507-0005/
| +| nginx | CVE-2009-4487 | LOW | 1.18.0-6.1 | |
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://www.securityfocus.com/bid/37711
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
| +| nginx | CVE-2013-0337 | LOW | 1.18.0-6.1 | |
Expand...http://secunia.com/advisories/55181
http://security.gentoo.org/glsa/glsa-201310-04.xml
http://www.openwall.com/lists/oss-security/2013/02/21/15
http://www.openwall.com/lists/oss-security/2013/02/22/1
http://www.openwall.com/lists/oss-security/2013/02/24/1
| +| nginx-common | CVE-2021-3618 | HIGH | 1.18.0-6.1 | |
Expand...https://alpaca-attack.com/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html
https://marc.info/?l=sendmail-announce&m=159394546814125&w=2
https://security.appspot.com/vsftpd/Changelog.txt
| +| nginx-common | CVE-2020-36309 | MEDIUM | 1.18.0-6.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
https://github.com/openresty/lua-nginx-module/pull/1654
https://news.ycombinator.com/item?id=26712562
https://security.netapp.com/advisory/ntap-20210507-0005/
| +| nginx-common | CVE-2009-4487 | LOW | 1.18.0-6.1 | |
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://www.securityfocus.com/bid/37711
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
| +| nginx-common | CVE-2013-0337 | LOW | 1.18.0-6.1 | |
Expand...http://secunia.com/advisories/55181
http://security.gentoo.org/glsa/glsa-201310-04.xml
http://www.openwall.com/lists/oss-security/2013/02/21/15
http://www.openwall.com/lists/oss-security/2013/02/22/1
http://www.openwall.com/lists/oss-security/2013/02/24/1
| +| nginx-core | CVE-2021-3618 | HIGH | 1.18.0-6.1 | |
Expand...https://alpaca-attack.com/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
https://lists.exim.org/lurker/message/20210609.200324.f0e073ed.el.html
https://marc.info/?l=sendmail-announce&m=159394546814125&w=2
https://security.appspot.com/vsftpd/Changelog.txt
| +| nginx-core | CVE-2020-36309 | MEDIUM | 1.18.0-6.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
https://github.com/openresty/lua-nginx-module/pull/1654
https://news.ycombinator.com/item?id=26712562
https://security.netapp.com/advisory/ntap-20210507-0005/
| +| nginx-core | CVE-2009-4487 | LOW | 1.18.0-6.1 | |
Expand...http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://www.securityfocus.com/bid/37711
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
| +| nginx-core | CVE-2013-0337 | LOW | 1.18.0-6.1 | |
Expand...http://secunia.com/advisories/55181
http://security.gentoo.org/glsa/glsa-201310-04.xml
http://www.openwall.com/lists/oss-security/2013/02/21/15
http://www.openwall.com/lists/oss-security/2013/02/22/1
http://www.openwall.com/lists/oss-security/2013/02/24/1
| +| openssh-client | CVE-2021-41617 | HIGH | 1:8.4p1-5 | |
Expand...https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2021-9575.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
| +| openssh-client | CVE-2007-2243 | LOW | 1:8.4p1-5 | |
Expand...http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html
http://securityreason.com/securityalert/2631
http://www.osvdb.org/34600
http://www.securityfocus.com/bid/23601
https://exchange.xforce.ibmcloud.com/vulnerabilities/33794
https://security.netapp.com/advisory/ntap-20191107-0003/
| +| openssh-client | CVE-2007-2768 | LOW | 1:8.4p1-5 | |
Expand...http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html
http://www.osvdb.org/34601
https://security.netapp.com/advisory/ntap-20191107-0002/
| +| openssh-client | CVE-2008-3234 | LOW | 1:8.4p1-5 | |
Expand...http://www.securityfocus.com/bid/30276
https://exchange.xforce.ibmcloud.com/vulnerabilities/44037
https://www.exploit-db.com/exploits/6094
| +| openssh-client | CVE-2016-20012 | LOW | 1:8.4p1-5 | |
Expand...https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265
https://github.com/openssh/openssh-portable/pull/270
https://rushter.com/blog/public-ssh-keys/
https://security.netapp.com/advisory/ntap-20211014-0005/
https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak
| +| openssh-client | CVE-2018-15919 | LOW | 1:8.4p1-5 | |
Expand...http://seclists.org/oss-sec/2018/q3/180
http://www.securityfocus.com/bid/105163
https://security.netapp.com/advisory/ntap-20181221-0001/
| +| openssh-client | CVE-2019-6110 | LOW | 1:8.4p1-5 | |
Expand...https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c
https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
https://security.gentoo.org/glsa/201903-16
https://security.netapp.com/advisory/ntap-20190213-0001/
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://www.exploit-db.com/exploits/46193/
| +| openssh-client | CVE-2020-14145 | LOW | 1:8.4p1-5 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| +| openssh-client | CVE-2020-15778 | LOW | 1:8.4p1-5 | |
Expand...https://access.redhat.com/articles/5284081
https://github.com/cpandya2909/CVE-2020-15778
https://github.com/cpandya2909/CVE-2020-15778/
https://news.ycombinator.com/item?id=25005567
https://security.netapp.com/advisory/ntap-20200731-0007/
https://www.openssh.com/security.html
| +| openssl | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| openssl | CVE-2021-4160 | UNKNOWN | 1.1.1k-1+deb11u1 | |
Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://www.openssl.org/news/secadv/20220128.txt
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| patch | CVE-2010-4651 | LOW | 2.7.6-7 | |
Expand...http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html
http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html
http://openwall.com/lists/oss-security/2011/01/05/10
http://openwall.com/lists/oss-security/2011/01/06/19
http://openwall.com/lists/oss-security/2011/01/06/20
http://openwall.com/lists/oss-security/2011/01/06/21
http://secunia.com/advisories/43663
http://secunia.com/advisories/43677
http://support.apple.com/kb/HT4723
http://www.securityfocus.com/bid/46768
http://www.vupen.com/english/advisories/2011/0600
https://bugzilla.redhat.com/show_bug.cgi?id=667529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651
https://ubuntu.com/security/notices/USN-2651-1
| +| patch | CVE-2018-6951 | LOW | 2.7.6-7 | |
Expand...http://www.securityfocus.com/bid/103044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
https://savannah.gnu.org/bugs/index.php?53132
https://security.gentoo.org/glsa/201904-17
https://ubuntu.com/security/notices/USN-3624-1
https://usn.ubuntu.com/3624-1/
| +| patch | CVE-2018-6952 | LOW | 2.7.6-7 | |
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
| +| patch | CVE-2021-45261 | LOW | 2.7.6-7 | |
Expand...https://savannah.gnu.org/bugs/?61685
| +| perl | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| perl-modules-5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-modules-5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| tesseract-ocr | CVE-2021-36081 | HIGH | 4.1.1-2.1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29698
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/tesseract-ocr/OSV-2021-211.yaml
https://github.com/tesseract-ocr/tesseract/commit/e6f15621c2ab2ecbfabf656942d8ef66f03b2d55
| +| unzip | CVE-2021-4217 | LOW | 6.0-26 | |
Expand...
| +| util-linux | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| util-linux | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| + +**python-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| Django | CVE-2021-45115 | HIGH | 4.0 | 4.0.1, 3.2.11, 2.2.26 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45115
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-53qw-q765-4fww
https://groups.google.com/forum/#!forum/django-announce
https://nvd.nist.gov/vuln/detail/CVE-2021-45115
https://security.netapp.com/advisory/ntap-20220121-0005/
https://ubuntu.com/security/notices/USN-5204-1
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
| +| Django | CVE-2021-45116 | HIGH | 4.0 | 4.0.1, 3.2.11, 2.2.26 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45116
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-8c5j-9r9f-c6w8
https://groups.google.com/forum/#!forum/django-announce
https://nvd.nist.gov/vuln/detail/CVE-2021-45116
https://security.netapp.com/advisory/ntap-20220121-0005/
https://ubuntu.com/security/notices/USN-5204-1
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
| +| Django | CVE-2021-45452 | MEDIUM | 4.0 | 4.0.1, 3.2.11, 2.2.26 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45452
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-jrh2-hc4r-7jwx
https://groups.google.com/forum/#!forum/django-announce
https://nvd.nist.gov/vuln/detail/CVE-2021-45452
https://security.netapp.com/advisory/ntap-20220121-0005/
https://ubuntu.com/security/notices/USN-5204-1
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
| +| Pillow | CVE-2022-22815 | CRITICAL | 8.4.0 | 9.0.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22815
https://github.com/advisories/GHSA-pw3c-h7wp-cvhx
https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22815
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
https://www.debian.org/security/2022/dsa-5053
| +| Pillow | CVE-2022-22816 | CRITICAL | 8.4.0 | 9.0.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816
https://github.com/advisories/GHSA-xrcv-f9gm-v42c
https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22816
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
https://www.debian.org/security/2022/dsa-5053
| +| Pillow | CVE-2022-22817 | CRITICAL | 8.4.0 | 9.0.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817
https://github.com/advisories/GHSA-8vj2-vxx3-667w
https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22817
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
https://www.debian.org/security/2022/dsa-5053
| +| celery | CVE-2021-23727 | HIGH | 5.2.1 | 5.2.2 |
Expand...https://github.com/advisories/GHSA-q4xr-rc97-m4xx
https://github.com/celery/celery/blob/master/Changelog.rst%23522
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/
https://nvd.nist.gov/vuln/detail/CVE-2021-23727
https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953
| + diff --git a/incubator/weblate/0.0.1/templates/_configmap.tpl b/incubator/weblate/0.0.1/templates/_configmap.tpl new file mode 100644 index 00000000000..6af34fd504f --- /dev/null +++ b/incubator/weblate/0.0.1/templates/_configmap.tpl @@ -0,0 +1,472 @@ +{{/* Define the configmap */}} +{{- define "weblate.configmap" -}} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: weblate-env +data: + {{/* General */}} + {{- if .Values.weblate.general.WEBLATE_SITE_DOMAIN }} + WEBLATE_SITE_DOMAIN: {{ .Values.weblate.general.WEBLATE_SITE_DOMAIN | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_SITE_TITLE }} + WEBLATE_SITE_TITLE: {{ .Values.weblate.general.WEBLATE_SITE_TITLE | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_ADMIN_NAME }} + WEBLATE_ADMIN_NAME: {{ .Values.weblate.general.WEBLATE_ADMIN_NAME | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_ADMIN_EMAIL }} + WEBLATE_ADMIN_EMAIL: {{ .Values.weblate.general.WEBLATE_ADMIN_EMAIL | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_ADMIN_PASSWORD }} + WEBLATE_ADMIN_PASSWORD: {{ .Values.weblate.general.WEBLATE_ADMIN_PASSWORD | quote }} + {{- end }} + {{- if .Values.weblate.WEBLATE_AUTO_UPDATE }} + WEBLATE_AUTO_UPDATE: {{ .Values.weblate.WEBLATE_AUTO_UPDATE | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_SERVER_EMAIL }} + WEBLATE_SERVER_EMAIL: {{ .Values.weblate.general.WEBLATE_SERVER_EMAIL | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DEFAULT_FROM_EMAIL }} + WEBLATE_DEFAULT_FROM_EMAIL: {{ .Values.weblate.general.WEBLATE_DEFAULT_FROM_EMAIL | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_CONTACT_FORM }} + WEBLATE_CONTACT_FORM: {{ .Values.weblate.general.WEBLATE_CONTACT_FORM | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_ALLOWED_HOSTS }} + WEBLATE_ALLOWED_HOSTS: {{ .Values.weblate.general.WEBLATE_ALLOWED_HOSTS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_REGISTRATION_OPEN }} + WEBLATE_REGISTRATION_OPEN: {{ .Values.weblate.general.WEBLATE_REGISTRATION_OPEN | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_REGISTRATION_ALLOW_BACKENDS }} + WEBLATE_REGISTRATION_ALLOW_BACKENDS: {{ .Values.weblate.general.WEBLATE_REGISTRATION_ALLOW_BACKENDS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_ENABLE_HTTPS }} + WEBLATE_ENABLE_HTTPS: {{ .Values.weblate.general.WEBLATE_ENABLE_HTTPS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_IP_PROXY_HEADER }} + WEBLATE_IP_PROXY_HEADER: {{ .Values.weblate.general.WEBLATE_IP_PROXY_HEADER | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_SECURE_PROXY_SSL_HEADER }} + WEBLATE_SECURE_PROXY_SSL_HEADER: {{ .Values.weblate.general.WEBLATE_SECURE_PROXY_SSL_HEADER | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_REQUIRE_LOGIN }} + WEBLATE_REQUIRE_LOGIN: {{ .Values.weblate.general.WEBLATE_REQUIRE_LOGIN | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_LOGIN_REQUIRED_URLS_EXCEPTIONS }} + WEBLATE_LOGIN_REQUIRED_URLS_EXCEPTIONS: {{ .Values.weblate.general.WEBLATE_LOGIN_REQUIRED_URLS_EXCEPTIONS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_ADD_LOGIN_REQUIRED_URLS_EXCEPTIONS }} + WEBLATE_ADD_LOGIN_REQUIRED_URLS_EXCEPTIONS: {{ .Values.weblate.general.WEBLATE_ADD_LOGIN_REQUIRED_URLS_EXCEPTIONS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_REMOVE_LOGIN_REQUIRED_URLS_EXCEPTIONS }} + WEBLATE_REMOVE_LOGIN_REQUIRED_URLS_EXCEPTIONS: {{ .Values.weblate.general.WEBLATE_REMOVE_LOGIN_REQUIRED_URLS_EXCEPTIONS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_GOOGLE_ANALYTICS_ID }} + WEBLATE_GOOGLE_ANALYTICS_ID: {{ .Values.weblate.general.WEBLATE_GOOGLE_ANALYTICS_ID | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_GITHUB_USERNAME }} + WEBLATE_GITHUB_USERNAME: {{ .Values.weblate.general.WEBLATE_GITHUB_USERNAME | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_GITHUB_TOKEN }} + WEBLATE_GITHUB_TOKEN: {{ .Values.weblate.general.WEBLATE_GITHUB_TOKEN | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_GITLAB_USERNAME }} + WEBLATE_GITLAB_USERNAME: {{ .Values.weblate.general.WEBLATE_GITLAB_USERNAME | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_GITLAB_TOKEN }} + WEBLATE_GITLAB_TOKEN: {{ .Values.weblate.general.WEBLATE_GITLAB_TOKEN | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_PAGURE_USERNAME }} + WEBLATE_PAGURE_USERNAME: {{ .Values.weblate.general.WEBLATE_PAGURE_USERNAME | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_PAGURE_TOKEN }} + WEBLATE_PAGURE_TOKEN: {{ .Values.weblate.general.WEBLATE_PAGURE_TOKEN | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_SIMPLIFY_LANGUAGES }} + WEBLATE_SIMPLIFY_LANGUAGES: {{ .Values.weblate.general.WEBLATE_SIMPLIFY_LANGUAGES | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DEFAULT_ACCESS_CONTROL }} + WEBLATE_DEFAULT_ACCESS_CONTROL: {{ .Values.weblate.general.WEBLATE_DEFAULT_ACCESS_CONTROL | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DEFAULT_RESTRICTED_COMPONENT }} + WEBLATE_DEFAULT_RESTRICTED_COMPONENT: {{ .Values.weblate.general.WEBLATE_DEFAULT_RESTRICTED_COMPONENT | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DEFAULT_TRANSLATION_PROPAGATION }} + WEBLATE_DEFAULT_TRANSLATION_PROPAGATION: {{ .Values.weblate.general.WEBLATE_DEFAULT_TRANSLATION_PROPAGATION | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DEFAULT_COMMITER_EMAIL }} + WEBLATE_DEFAULT_COMMITER_EMAIL: {{ .Values.weblate.general.WEBLATE_DEFAULT_COMMITER_EMAIL | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DEFAULT_COMMITER_NAME }} + WEBLATE_DEFAULT_COMMITER_NAME: {{ .Values.weblate.general.WEBLATE_DEFAULT_COMMITER_NAME | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DEFAULT_SHARED_TM }} + WEBLATE_DEFAULT_SHARED_TM: {{ .Values.weblate.general.WEBLATE_DEFAULT_SHARED_TM | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_AKISMET_API_KEY }} + WEBLATE_AKISMET_API_KEY: {{ .Values.weblate.general.WEBLATE_AKISMET_API_KEY | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_GPG_IDENTITY }} + WEBLATE_GPG_IDENTITY: {{ .Values.weblate.general.WEBLATE_GPG_IDENTITY | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_URL_PREFIX }} + WEBLATE_URL_PREFIX: {{ .Values.weblate.general.WEBLATE_URL_PREFIX | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_SILENCED_SYSTEM_CHECKS }} + WEBLATE_SILENCED_SYSTEM_CHECKS: {{ .Values.weblate.general.WEBLATE_SILENCED_SYSTEM_CHECKS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_CSP_SCRIPT_SRC }} + WEBLATE_CSP_SCRIPT_SRC: {{ .Values.weblate.general.WEBLATE_CSP_SCRIPT_SRC | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_CSP_IMG_SRC }} + WEBLATE_CSP_IMG_SRC: {{ .Values.weblate.general.WEBLATE_CSP_IMG_SRC | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_CSP_CONNECT_SRC }} + WEBLATE_CSP_CONNECT_SRC: {{ .Values.weblate.general.WEBLATE_CSP_CONNECT_SRC | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_CSP_STYLE_SRC }} + WEBLATE_CSP_STYLE_SRC: {{ .Values.weblate.general.WEBLATE_CSP_STYLE_SRC | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_CSP_FONT_SRC }} + WEBLATE_CSP_FONT_SRC: {{ .Values.weblate.general.WEBLATE_CSP_FONT_SRC | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_LICENSE_FILTER }} + WEBLATE_LICENSE_FILTER: {{ .Values.weblate.general.WEBLATE_LICENSE_FILTER | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_LICENSE_REQUIRED }} + WEBLATE_LICENSE_REQUIRED: {{ .Values.weblate.general.WEBLATE_LICENSE_REQUIRED | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_WEBSITE_REQUIRED }} + WEBLATE_WEBSITE_REQUIRED: {{ .Values.weblate.general.WEBLATE_WEBSITE_REQUIRED | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_HIDE_VERSION }} + WEBLATE_HIDE_VERSION: {{ .Values.weblate.general.WEBLATE_HIDE_VERSION | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_BASIC_LANGUAGES }} + WEBLATE_BASIC_LANGUAGES: {{ .Values.weblate.general.WEBLATE_BASIC_LANGUAGES | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DEFAULT_AUTO_WATCH }} + WEBLATE_DEFAULT_AUTO_WATCH: {{ .Values.weblate.general.WEBLATE_DEFAULT_AUTO_WATCH | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_RATELIMIT_ATTEMPTS }} + WEBLATE_RATELIMIT_ATTEMPTS: {{ .Values.weblate.general.WEBLATE_RATELIMIT_ATTEMPTS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_RATELIMIT_LOCKOUT }} + WEBLATE_RATELIMIT_LOCKOUT: {{ .Values.weblate.general.WEBLATE_RATELIMIT_LOCKOUT | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_RATELIMIT_WINDOW }} + WEBLATE_RATELIMIT_WINDOW: {{ .Values.weblate.general.WEBLATE_RATELIMIT_WINDOW | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_ENABLE_AVATARS }} + WEBLATE_ENABLE_AVATARS: {{ .Values.weblate.general.WEBLATE_ENABLE_AVATARS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_LIMIT_TRANSLATION_LENGTH_BY_SOURCE_LENGTH }} + WEBLATE_LIMIT_TRANSLATION_LENGTH_BY_SOURCE_LENGTH: {{ .Values.weblate.general.WEBLATE_LIMIT_TRANSLATION_LENGTH_BY_SOURCE_LENGTH | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_SSH_EXTRA_ARGS }} + WEBLATE_SSH_EXTRA_ARGS: {{ .Values.weblate.general.WEBLATE_SSH_EXTRA_ARGS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_BORG_EXTRA_ARGS }} + WEBLATE_BORG_EXTRA_ARGS: {{ .Values.weblate.general.WEBLATE_BORG_EXTRA_ARGS | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DATABASE_BACKUP }} + WEBLATE_DATABASE_BACKUP: {{ .Values.weblate.general.WEBLATE_DATABASE_BACKUP | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_DEBUG }} + WEBLATE_DEBUG: {{ .Values.weblate.general.WEBLATE_DEBUG | quote }} + {{- end }} + {{- if .Values.weblate.general.WEBLATE_LOGLEVEL }} + WEBLATE_LOGLEVEL: {{ .Values.weblate.general.WEBLATE_LOGLEVEL | quote }} + {{- end }} + {{/* Machine Translation */}} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_APERTIUM_APY }} + WEBLATE_MT_APERTIUM_APY: {{ .Values.weblate.machinetranslate.WEBLATE_MT_APERTIUM_APY | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_AWS_REGION }} + WEBLATE_MT_AWS_REGION: {{ .Values.weblate.machinetranslate.WEBLATE_MT_AWS_REGION | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_AWS_ACCESS_KEY_ID }} + WEBLATE_MT_AWS_ACCESS_KEY_ID: {{ .Values.weblate.machinetranslate.WEBLATE_MT_AWS_ACCESS_KEY_ID | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_AWS_SECRET_ACCESS_KEY }} + WEBLATE_MT_AWS_SECRET_ACCESS_KEY: {{ .Values.weblate.machinetranslate.WEBLATE_MT_AWS_SECRET_ACCESS_KEY | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_DEEPL_KEY }} + WEBLATE_MT_DEEPL_KEY: {{ .Values.weblate.machinetranslate.WEBLATE_MT_DEEPL_KEY | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_DEEPL_API_URL }} + WEBLATE_MT_DEEPL_API_URL: {{ .Values.weblate.machinetranslate.WEBLATE_MT_DEEPL_API_URL | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_LIBRETRANSLATE_KEY }} + WEBLATE_MT_LIBRETRANSLATE_KEY: {{ .Values.weblate.machinetranslate.WEBLATE_MT_LIBRETRANSLATE_KEY | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_LIBRETRANSLATE_API_URL }} + WEBLATE_MT_LIBRETRANSLATE_API_URL: {{ .Values.weblate.machinetranslate.WEBLATE_MT_LIBRETRANSLATE_API_URL | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_GOOGLE_KEY }} + WEBLATE_MT_GOOGLE_KEY: {{ .Values.weblate.machinetranslate.WEBLATE_MT_GOOGLE_KEY | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_GOOGLE_CREDENTIALS }} + WEBLATE_MT_GOOGLE_CREDENTIALS: {{ .Values.weblate.machinetranslate.WEBLATE_MT_GOOGLE_CREDENTIALS | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_GOOGLE_PROJECT }} + WEBLATE_MT_GOOGLE_PROJECT: {{ .Values.weblate.machinetranslate.WEBLATE_MT_GOOGLE_PROJECT | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_GOOGLE_LOCATION }} + WEBLATE_MT_GOOGLE_LOCATION: {{ .Values.weblate.machinetranslate.WEBLATE_MT_GOOGLE_LOCATION | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_COGNITIVE_KEY }} + WEBLATE_MT_MICROSOFT_COGNITIVE_KEY: {{ .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_COGNITIVE_KEY | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_ENDPOINT_URL }} + WEBLATE_MT_MICROSOFT_ENDPOINT_URL: {{ .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_ENDPOINT_URL | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_REGION }} + WEBLATE_MT_MICROSOFT_REGION: {{ .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_REGION | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_BASE_URL }} + WEBLATE_MT_MICROSOFT_BASE_URL: {{ .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_BASE_URL | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_MODERNMT_KEY }} + WEBLATE_MT_MODERNMT_KEY: {{ .Values.weblate.machinetranslate.WEBLATE_MT_MODERNMT_KEY | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_MYMEMORY_ENABLED }} + WEBLATE_MT_MYMEMORY_ENABLED: {{ .Values.weblate.machinetranslate.WEBLATE_MT_MYMEMORY_ENABLED | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_GLOSBE_ENABLED }} + WEBLATE_MT_GLOSBE_ENABLED: {{ .Values.weblate.machinetranslate.WEBLATE_MT_GLOSBE_ENABLED | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_TERMINOLOGY_ENABLED }} + WEBLATE_MT_MICROSOFT_TERMINOLOGY_ENABLED: {{ .Values.weblate.machinetranslate.WEBLATE_MT_MICROSOFT_TERMINOLOGY_ENABLED | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_SAP_BASE_URL }} + WEBLATE_MT_SAP_BASE_URL: {{ .Values.weblate.machinetranslate.WEBLATE_MT_SAP_BASE_URL | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_SAP_SANDBOX_APIKEY }} + WEBLATE_MT_SAP_SANDBOX_APIKEY: {{ .Values.weblate.machinetranslate.WEBLATE_MT_SAP_SANDBOX_APIKEY | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_SAP_USERNAME }} + WEBLATE_MT_SAP_USERNAME: {{ .Values.weblate.machinetranslate.WEBLATE_MT_SAP_USERNAME | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_SAP_PASSWORD }} + WEBLATE_MT_SAP_PASSWORD: {{ .Values.weblate.machinetranslate.WEBLATE_MT_SAP_PASSWORD | quote }} + {{- end }} + {{- if .Values.weblate.machinetranslate.WEBLATE_MT_SAP_USE_MT }} + WEBLATE_MT_SAP_USE_MT: {{ .Values.weblate.machinetranslate.WEBLATE_MT_SAP_USE_MT | quote }} + {{- end }} + {{/* Authentication */}} + {{/* LDAP */}} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_SERVER_URI }} + WEBLATE_AUTH_LDAP_SERVER_URI: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_SERVER_URI | quote }} + {{- end }} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_DN_TEMPLATE }} + WEBLATE_AUTH_LDAP_USER_DN_TEMPLATE: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_DN_TEMPLATE | quote }} + {{- end }} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_ATTR_MAP }} + WEBLATE_AUTH_LDAP_USER_ATTR_MAP: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_ATTR_MAP | quote }} + {{- end }} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_BIND_DN }} + WEBLATE_AUTH_LDAP_BIND_DN: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_BIND_DN | quote }} + {{- end }} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_BIND_PASSWORD }} + WEBLATE_AUTH_LDAP_BIND_PASSWORD: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_BIND_PASSWORD | quote }} + {{- end }} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_CONNECTION_OPTION_REFERRALS }} + WEBLATE_AUTH_LDAP_CONNECTION_OPTION_REFERRALS: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_CONNECTION_OPTION_REFERRALS | quote }} + {{- end }} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_SEARCH }} + WEBLATE_AUTH_LDAP_USER_SEARCH: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_SEARCH | quote }} + {{- end }} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_SEARCH_FILTER }} + WEBLATE_AUTH_LDAP_USER_SEARCH_FILTER: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_SEARCH_FILTER | quote }} + {{- end }} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_SEARCH_UNION }} + WEBLATE_AUTH_LDAP_USER_SEARCH_UNION: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_SEARCH_UNION | quote }} + {{- end }} + {{- if .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_SEARCH_UNION_DELIMITER }} + WEBLATE_AUTH_LDAP_USER_SEARCH_UNION_DELIMITER: {{ .Values.weblate.auth.ldap.WEBLATE_AUTH_LDAP_USER_SEARCH_UNION_DELIMITER | quote }} + {{- end }} + {{/* Github */}} + {{- if .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_KEY }} + WEBLATE_SOCIAL_AUTH_GITHUB_KEY: {{ .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_SECRET }} + WEBLATE_SOCIAL_AUTH_GITHUB_SECRET: {{ .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_SECRET | quote }} + {{- end }} + {{- if .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_ORG_KEY }} + WEBLATE_SOCIAL_AUTH_GITHUB_ORG_KEY: {{ .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_ORG_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_ORG_SECRET }} + WEBLATE_SOCIAL_AUTH_GITHUB_ORG_SECRET: {{ .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_ORG_SECRET | quote }} + {{- end }} + {{- if .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_ORG_NAME }} + WEBLATE_SOCIAL_AUTH_GITHUB_ORG_NAME: {{ .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_ORG_NAME | quote }} + {{- end }} + {{- if .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_KEY }} + WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_KEY: {{ .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_SECRET }} + WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_SECRET: {{ .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_SECRET | quote }} + {{- end }} + {{- if .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_ID }} + WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_ID: {{ .Values.weblate.auth.github.WEBLATE_SOCIAL_AUTH_GITHUB_TEAM_ID | quote }} + {{- end }} + {{/* Bitbucket */}} + {{- if .Values.weblate.auth.bitbucket.WEBLATE_SOCIAL_AUTH_BITBUCKET_KEY }} + WEBLATE_SOCIAL_AUTH_BITBUCKET_KEY: {{ .Values.weblate.auth.bitbucket.WEBLATE_SOCIAL_AUTH_BITBUCKET_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.bitbucket.WEBLATE_SOCIAL_AUTH_BITBUCKET_SECRET }} + WEBLATE_SOCIAL_AUTH_BITBUCKET_SECRET: {{ .Values.weblate.auth.bitbucket.WEBLATE_SOCIAL_AUTH_BITBUCKET_SECRET | quote }} + {{- end }} + {{/* Facebook */}} + {{- if .Values.weblate.auth.facebook.WEBLATE_SOCIAL_AUTH_FACEBOOK_KEY }} + WEBLATE_SOCIAL_AUTH_FACEBOOK_KEY: {{ .Values.weblate.auth.facebook.WEBLATE_SOCIAL_AUTH_FACEBOOK_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.facebook.WEBLATE_SOCIAL_AUTH_FACEBOOK_SECRET }} + WEBLATE_SOCIAL_AUTH_FACEBOOK_SECRET: {{ .Values.weblate.auth.facebook.WEBLATE_SOCIAL_AUTH_FACEBOOK_SECRET | quote }} + {{- end }} + {{/* Google */}} + {{- if .Values.weblate.auth.google.WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_KEY }} + WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_KEY: {{ .Values.weblate.auth.google.WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.google.WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET }} + WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET: {{ .Values.weblate.auth.google.WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_SECRET | quote }} + {{- end }} + {{- if .Values.weblate.auth.google.WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_DOMAINS }} + WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_DOMAINS: {{ .Values.weblate.auth.google.WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_DOMAINS | quote }} + {{- end }} + {{- if .Values.weblate.auth.google.WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_EMAILS }} + WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_EMAILS: {{ .Values.weblate.auth.google.WEBLATE_SOCIAL_AUTH_GOOGLE_OAUTH2_WHITELISTED_EMAILS | quote }} + {{- end }} + {{/* GitLab */}} + {{- if .Values.weblate.auth.gitlab.WEBLATE_SOCIAL_AUTH_GITLAB_KEY }} + WEBLATE_SOCIAL_AUTH_GITLAB_KEY: {{ .Values.weblate.auth.gitlab.WEBLATE_SOCIAL_AUTH_GITLAB_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.gitlab.WEBLATE_SOCIAL_AUTH_GITLAB_SECRET }} + WEBLATE_SOCIAL_AUTH_GITLAB_SECRET: {{ .Values.weblate.auth.gitlab.WEBLATE_SOCIAL_AUTH_GITLAB_SECRET | quote }} + {{- end }} + {{- if .Values.weblate.auth.gitlab.WEBLATE_SOCIAL_AUTH_GITLAB_API_URL }} + WEBLATE_SOCIAL_AUTH_GITLAB_API_URL: {{ .Values.weblate.auth.gitlab.WEBLATE_SOCIAL_AUTH_GITLAB_API_URL | quote }} + {{- end }} + {{/* Azure Active Directory */}} + {{- if .Values.weblate.auth.azure.WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_KEY }} + WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_KEY: {{ .Values.weblate.auth.azure.WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.azure.WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_SECRET }} + WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_SECRET: {{ .Values.weblate.auth.azure.WEBLATE_SOCIAL_AUTH_AZUREAD_OAUTH2_SECRET | quote }} + {{- end }} + {{/* Azure Active Directory with Tenant support */}} + {{- if .Values.weblate.auth.azuretenant.WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY }} + WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY: {{ .Values.weblate.auth.azuretenant.WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.azuretenant.WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET }} + WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET: {{ .Values.weblate.auth.azuretenant.WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_SECRET | quote }} + {{- end }} + {{- if .Values.weblate.auth.azuretenant.WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID }} + WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID: {{ .Values.weblate.auth.azuretenant.WEBLATE_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_TENANT_ID | quote }} + {{- end }} + {{/* Keycloak */}} + {{- if .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_KEY }} + WEBLATE_SOCIAL_AUTH_KEYCLOAK_KEY: {{ .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_SECRET }} + WEBLATE_SOCIAL_AUTH_KEYCLOAK_SECRET: {{ .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_SECRET | quote }} + {{- end }} + {{- if .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_PUBLIC_KEY }} + WEBLATE_SOCIAL_AUTH_KEYCLOAK_PUBLIC_KEY: {{ .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_PUBLIC_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_ALGORITHM }} + WEBLATE_SOCIAL_AUTH_KEYCLOAK_ALGORITHM: {{ .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_ALGORITHM | quote }} + {{- end }} + {{- if .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_AUTHORIZATION_URL }} + WEBLATE_SOCIAL_AUTH_KEYCLOAK_AUTHORIZATION_URL: {{ .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_AUTHORIZATION_URL | quote }} + {{- end }} + {{- if .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_ACCESS_TOKEN_URL }} + WEBLATE_SOCIAL_AUTH_KEYCLOAK_ACCESS_TOKEN_URL: {{ .Values.weblate.auth.keycloak.WEBLATE_SOCIAL_AUTH_KEYCLOAK_ACCESS_TOKEN_URL | quote }} + {{- end }} + {{/* Linux vendors */}} + {{- if .Values.weblate.auth.linux.WEBLATE_SOCIAL_AUTH_FEDORA }} + WEBLATE_SOCIAL_AUTH_FEDORA: {{ .Values.weblate.auth.linux.WEBLATE_SOCIAL_AUTH_FEDORA | quote }} + {{- end }} + {{- if .Values.weblate.auth.linux.WEBLATE_SOCIAL_AUTH_OPENSUSE }} + WEBLATE_SOCIAL_AUTH_OPENSUSE: {{ .Values.weblate.auth.linux.WEBLATE_SOCIAL_AUTH_OPENSUSE | quote }} + {{- end }} + {{- if .Values.weblate.auth.linux.WEBLATE_SOCIAL_AUTH_UBUNTU }} + WEBLATE_SOCIAL_AUTH_UBUNTU: {{ .Values.weblate.auth.linux.WEBLATE_SOCIAL_AUTH_UBUNTU | quote }} + {{- end }} + {{/* Slack */}} + {{- if .Values.weblate.auth.slack.WEBLATE_SOCIAL_AUTH_SLACK_KEY }} + WEBLATE_SOCIAL_AUTH_SLACK_KEY: {{ .Values.weblate.auth.slack.WEBLATE_SOCIAL_AUTH_SLACK_KEY | quote }} + {{- end }} + {{- if .Values.weblate.auth.slack.SOCIAL_AUTH_SLACK_SECRET }} + SOCIAL_AUTH_SLACK_SECRET: {{ .Values.weblate.auth.slack.SOCIAL_AUTH_SLACK_SECRET }} + {{- end }} + {{/* SAML */}} + {{- if .Values.weblate.auth.saml.WEBLATE_SAML_IDP_ENTITY_ID }} + WEBLATE_SAML_IDP_ENTITY_ID: {{ .Values.weblate.auth.saml.WEBLATE_SAML_IDP_ENTITY_ID | quote }} + {{- end }} + {{- if .Values.weblate.auth.saml.WEBLATE_SAML_IDP_URL }} + WEBLATE_SAML_IDP_URL: {{ .Values.weblate.auth.saml.WEBLATE_SAML_IDP_URL | quote }} + {{- end }} + {{- if .Values.weblate.auth.saml.WEBLATE_SAML_IDP_X509CERT }} + WEBLATE_SAML_IDP_X509CERT: {{ .Values.weblate.auth.saml.WEBLATE_SAML_IDP_X509CERT | quote }} + {{- end }} + {{/* Email Server */}} + {{- if .Values.weblate.email.WEBLATE_EMAIL_HOST }} + WEBLATE_EMAIL_HOST: {{ .Values.weblate.email.WEBLATE_EMAIL_HOST | quote }} + {{- end }} + {{- if .Values.weblate.email.WEBLATE_EMAIL_PORT }} + WEBLATE_EMAIL_PORT: {{ .Values.weblate.email.WEBLATE_EMAIL_PORT | quote }} + {{- end }} + {{- if .Values.weblate.email.WEBLATE_EMAIL_HOST_USER }} + WEBLATE_EMAIL_HOST_USER: {{ .Values.weblate.email.WEBLATE_EMAIL_HOST_USER | quote }} + {{- end }} + {{- if .Values.weblate.email.WEBLATE_EMAIL_HOST_PASSWORD }} + WEBLATE_EMAIL_HOST_PASSWORD: {{ .Values.weblate.email.WEBLATE_EMAIL_HOST_PASSWORD | quote }} + {{- end }} + {{- if .Values.weblate.email.WEBLATE_EMAIL_USE_SSL }} + WEBLATE_EMAIL_USE_SSL: {{ .Values.weblate.email.WEBLATE_EMAIL_USE_SSL | quote }} + {{- end }} + {{- if .Values.weblate.email.WEBLATE_EMAIL_USE_TLS }} + WEBLATE_EMAIL_USE_TLS: {{ .Values.weblate.email.WEBLATE_EMAIL_USE_TLS | quote }} + {{- end }} + {{- if .Values.weblate.email.WEBLATE_EMAIL_BACKEND }} + WEBLATE_EMAIL_BACKEND: {{ .Values.weblate.email.WEBLATE_EMAIL_BACKEND | quote }} + {{- end }} + {{/* Site Integration */}} + {{- if .Values.weblate.siteintegration.WEBLATE_GET_HELP_URL }} + WEBLATE_GET_HELP_URL: {{ .Values.weblate.siteintegration.WEBLATE_GET_HELP_URL | quote }} + {{- end }} + {{- if .Values.weblate.siteintegration.WEBLATE_STATUS_URL }} + WEBLATE_STATUS_URL: {{ .Values.weblate.siteintegration.WEBLATE_STATUS_URL | quote }} + {{- end }} + {{- if .Values.weblate.siteintegration.WEBLATE_LEGAL_URL }} + WEBLATE_LEGAL_URL: {{ .Values.weblate.siteintegration.WEBLATE_LEGAL_URL | quote }} + {{- end }} + {{- if .Values.weblate.siteintegration.WEBLATE_PRIVACY_URL }} + WEBLATE_PRIVACY_URL: {{ .Values.weblate.siteintegration.WEBLATE_PRIVACY_URL | quote }} + {{- end }} + {{/* Error Reporting */}} + {{- if .Values.weblate.errorreport.ROLLBAR_KEY }} + ROLLBAR_KEY: {{ .Values.weblate.REPALCEME.ROLLBAR_KEY | quote }} + {{- end }} + {{- if .Values.weblate.errorreport.ROLLBAR_ENVIRONMENT }} + ROLLBAR_ENVIRONMENT: {{ .Values.weblate.REPALCEME.ROLLBAR_ENVIRONMENT | quote }} + {{- end }} + {{- if .Values.weblate.errorreport.SENTRY_DSN }} + SENTRY_DSN: {{ .Values.weblate.REPALCEME.SENTRY_DSN | quote }} + {{- end }} + {{- if .Values.weblate.errorreport.SENTRY_ENVIRONMENT }} + SENTRY_ENVIRONMENT: {{ .Values.weblate.REPALCEME.SENTRY_ENVIRONMENT | quote }} + {{- end }} + {{/* Localization CDN */}} + {{- if .Values.weblate.localization.WEBLATE_LOCALIZE_CDN_URL }} + WEBLATE_LOCALIZE_CDN_URL: {{ .Values.weblate.localization.WEBLATE_LOCALIZE_CDN_URL | quote }} + {{- end }} + {{- if .Values.weblate.localization.WEBLATE_LOCALIZE_CDN_PATH }} + WEBLATE_LOCALIZE_CDN_PATH: {{ .Values.weblate.localization.WEBLATE_LOCALIZE_CDN_PATH | quote }} + {{- end }} +{{- end -}} diff --git a/incubator/weblate/0.0.1/templates/common.yaml b/incubator/weblate/0.0.1/templates/common.yaml new file mode 100644 index 00000000000..9da2e155178 --- /dev/null +++ b/incubator/weblate/0.0.1/templates/common.yaml @@ -0,0 +1,8 @@ +{{/* Make sure all variables are set properly */}} +{{ include "common.setup" . }} + +{{/* Render configmap for weblate */}} +{{- include "weblate.configmap" . }} + +{{/* Render the templates */}} +{{ include "common.postSetup" . }} diff --git a/incubator/weblate/0.0.1/values.yaml b/incubator/weblate/0.0.1/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/incubator/weblate/item.yaml b/incubator/weblate/item.yaml new file mode 100644 index 00000000000..04a52e6f160 --- /dev/null +++ b/incubator/weblate/item.yaml @@ -0,0 +1,4 @@ +icon_url: https://truecharts.org/_static/img/appicons/weblate-icon.png +categories: +- media +